Ibm security overview 2012 jan-18 sellers deck

Arrow ECS UK
27 Feb 2012
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
1 sur 23

Contenu connexe

Tendances

Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Arrow ECS UK
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativeChris Pepin
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks
IBM Security - 2015 - Client References GuideIBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References GuideFrancisco González Jiménez
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
Bapinger Network SecurityBapinger Network Security
Bapinger Network SecurityDjadja Sardjana

En vedette

CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber ThreatsOCTF Industry Engagement
Global Risks Report 2014Global Risks Report 2014
Global Risks Report 2014ngocjos
Administering windows xpAdministering windows xp
Administering windows xpSamaja
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewOCTF Industry Engagement
Insurance Fraud WhitepaperInsurance Fraud Whitepaper
Insurance Fraud WhitepaperGabriele Stonkute
World Economic Forum Global Risks 2014World Economic Forum Global Risks 2014
World Economic Forum Global Risks 2014haemmerle-consulting

Similaire à Ibm security overview 2012 jan-18 sellers deck

Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planetVincent Kwon
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,Information Security Awareness Group
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
ciso-platform-annual-summit-2013-Hp enterprise security overviewciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewPriyanka Aash
Presentación AMIB Los CabosPresentación AMIB Los Cabos
Presentación AMIB Los CabosJuan Carlos Carrillo
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli

Similaire à Ibm security overview 2012 jan-18 sellers deck(20)

Plus de Arrow ECS UK

Grow your future with leasing.Grow your future with leasing.
Grow your future with leasing.Arrow ECS UK
Arrow are No.1 Juniper Networks Authorised Education PartnerArrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education PartnerArrow ECS UK
Arrow are No.1 Check Point Training CentreArrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training CentreArrow ECS UK
Arrow Live Class LinkArrow Live Class Link
Arrow Live Class LinkArrow ECS UK
Arrow ECS Social Media for Business PartnersArrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business PartnersArrow ECS UK
2014 ofcom communications_market_report_internet2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internetArrow ECS UK

Dernier

Product Research Presentation-Maidy Veloso.pptxProduct Research Presentation-Maidy Veloso.pptx
Product Research Presentation-Maidy Veloso.pptxMaidyVeloso
sap.pptxsap.pptx
sap.pptxSAP
info_session_gdsc_tmsl .pptxinfo_session_gdsc_tmsl .pptx
info_session_gdsc_tmsl .pptxNikitaSingh741518
EuroBSDCon 2023 - (auto)Installing BSD Systems - Cases using pfSense, TrueNAS...EuroBSDCon 2023 - (auto)Installing BSD Systems - Cases using pfSense, TrueNAS...
EuroBSDCon 2023 - (auto)Installing BSD Systems - Cases using pfSense, TrueNAS...Vinícius Zavam
Supplier Sourcing_Cathy.pptxSupplier Sourcing_Cathy.pptx
Supplier Sourcing_Cathy.pptxCatarinaTorrenuevaMa
Webhook Testing StrategyWebhook Testing Strategy
Webhook Testing StrategyDimpy Adhikary

Ibm security overview 2012 jan-18 sellers deck

Notes de l'éditeur

  1. Organizational and Solution Silos: data without context Cost and Complexity of offerings: limited ROI Compliance does not deliver security: budget can enable security intelligence Proliferation of point solutions: too many, not proactive Scale, but at what cost: not architected for new normal
  2. No one is immune and the costs are going up. Take the Sony breaches: Accounts affected: 77M Playstation Network, 25M Sony Online Entertainment Data stolen: Name, address, gender, date of birth, phone number, email address, login name, password, account number Lost revenue: $10M per week Law suits: $100M+ to $Bs Brand reputation: Incalculable
  3. Sources Sony breach: http://www.search.sony.net/result/net/search.x?ie=utf8&site=&pid=ACsW7rd0W_Zt_QIz-sORfA..&qid=rOX1wPP0JvM.&q=security+breach&msk=1#5 HSBC breach: http://news.bbc.co.uk/2/hi/business/8562381.stm Epsilon breach: http://www.securityweek.com/massive-breach-epsilon-compromises-customer-lists-major-brands TJX breach: TJX Companies, Inc. press release, 8/14/2007, http://www.businesswire.com/news/tjx/20070814005701/en Lulzec breach: http://www.reuters.com/article/2011/08/01/us-britain-hacking-lulzsec-idUSTRE7702IL20110801 Zurich Insurance breach: (Financial Services Authority of Britain) http://www.fsa.gov.uk/pubs/final/zurich_plc.pdf
  4. IBM is building integrated security solutions around four domains: People, Data, Applications, and Infrastructure. If you can secure across those domains, not just within each as a stand-alone, siloed area, you can build a secure environment and foster innovative use of technology.
  5. Bringing of IBM’s security software and hardware products into one unified team will enable us to develop the integrated strategy and roadmap needed in today’s world of ever-increasing security complexity. We are building our team to provide and single voice of IBM security for the client and to support the CISO in developing
  6. IBM has security consultancy practices and dedicated security research capabilities across the globe
  7. security has to be everywhere.... layering on security intelligence....
  8. IBM PULSE 2011 Steve Robinson_v11 02/27/12 09:17 Finally, attack sophistication is through the roof. I don ’t at all want to make light of the advanced persistent threat. It’s all of those things: advanced, persistent and threatening. It’s also well funded by state and non-state actors. And regardless, the motivation to break in and grab stuff has risen from just for kicks or money… no notoriety and activism being motivators. 02/27/12
  9. Wherever they are in their current security posture, IBM is helping clients to a new level of security maturity through Security Intelligence.