SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
© 2015 IBM Corporation
Antonio Gallotti
Senior Product Manager
Cutting Through the Software
License Jungle: Stay Safe and
Control Costs
2© 2015 IBM Corporation
License,
Contract,
Audit
Security,
Vulnerability,
Stability
Wherever there is a Software there is a Risk and a Cost
3© 2015 IBM Corporation
You can’t protect what you can’t see
Software Compliance and Usage helps reducing risks and improve Incident response
to reduce the cost of a data breach
Software Control helps to know where to protect your environment
Lack of visibility and control contributes to security breaches and financial loss
*Source: 2015 Cost of a Data Breach Study: Global Analysis, Ponemon Institute, May 2015
“Major global bank compromised and
millions of depositor records stolen
due to missed server upgrade cycle”
?
global average cost
of a data breach*
$3.8M
üüü
4© 2015 IBM Corporation
You can’t control what you can’t see
Software Compliance and Usage is the No. 1 factor to reduce the license cost and be
prepared for software audits
Software Control is key to avoid overspending
Lack of visibility and control contributes to unplanned license true-ups and fines
*Source: MarketWatch, April 2015
“most enterprises face frequent,
unbudgeted software license true-up bills
from their vendors -- often to the tune of
millions of dollars annually”
?
average cost of a
license true-up*
$1.0M
üüü
5© 2015 IBM Corporation
IBM BigFix: Bridge the gap between Security and IT Ops
ENDPOINT
SECURITY
Discovery
and Patching
Lifecycle
Management
Software Compliance
and Usage
Continuous
Monitoring
Threat
Protection
Incident
Response
ENDPOINT
MANAGEMENT
IBM BigFix®
FIND IT. FIX IT. SECURE IT.
…FAST
Shared visibility and control
between IT Operations
and Security
IT OPERATIONS SECURITY
Reduce operational costs while improving your security posture
6© 2015 IBM Corporation
Software compliance and usage – BigFix Inventory
Identify what software is installed and how it’s used
!  Discover all licensed and unlicensed software
with in-depth granularity across operating systems
and devices
!  Reduce license compliance exposure and associated fines
!  Decrease software license costs by eliminating unused
or redundant software
!  8,000+ software publishers, 40,000+ software products, 50+
cross OS virtualizations
!  Mitigate risk from unauthorized and malicious software
$
Saved $500K in unused software licenses while avoiding
$1M in non-compliance fines across 15,000+ endpoints
US Foods
SW Catalogue, ISO 19770 enabled
7© 2015 IBM Corporation
Capabilities
IBM BigFix Inventory (AKA - Endpoint Manager for Software Use Analysis)
•  Centralized Reporting Web Portal
•  Health status and Reporting dashboards
•  Virtualization and Cloud awareness
•  Role based user access management
•  REST API for easy integration
•  IBM authorized tool for IBM Capacity
•  Same as IBM License Metric Tool
Product highlights•  So$ware	
  Catalogue	
  with	
  
regular	
  updates	
  
•  ISO	
  19770	
  Tags	
  and	
  
so$ware	
  	
  signatures	
  
•  Catalogue	
  can	
  be	
  
expanded	
  for	
  coverage	
  or	
  
custom	
  applicaBons	
  
•  Supported	
  virtualizaBons	
  
such	
  as	
  	
  vSphere,	
  vCenter,	
  
ESXi,	
  Hyper-­‐V,	
  IBM	
  AIX	
  
LPAR	
  and	
  WPAR,	
  KVM	
  
and	
  more	
  
•  SW	
  Asset	
  Inventory	
  
•  SW	
  Use	
  Metering	
  
•  SW	
  Use	
  ReporBng	
  
•  HW	
  Discovery,	
  
Inventory	
  	
  and	
  
Monitoring	
  of	
  
Capacity	
  Changes	
  
8© 2015 IBM Corporation
BigFix Inventory – Control Software Costs
Compliant?
Buy more?
Detailed, real-time, current inventory and usage reports
to eliminate under used or unnecessary licenses and
reduce maintenance costs
Overspending?
Identify unlicensed computers. Associate SW inventory
with HW data to avoid software license exposures
Accurate inventory data in support of purchasing and
procurement tools and processes
You can’t control what you can’t see
9© 2015 IBM Corporation
BigFix Inventory – Mitigate Security Risks
Needed?
Managed?
Whitelist/Backlist filtering of inventory data to identify
systems where unauthorized software is deployed or
unauthorized processes are running
Authorized?
Usage reports to identify systems where software can
be removed to reduce security exposures
Inventory data and newly discovered system reports to
verify if assets are properly managed or unauthorized
You can’t protect what you can’t see
10© 2015 IBM Corporation
Inventory and status health Dashboards
11© 2015 IBM Corporation
Extensive Hardware Inventory Report
Extensive	
  list	
  of	
  
aUributes	
  and	
  
configuraBon	
  data	
  
Software Control and Security Risk mitigation use case sample
Which systems/computers are we managing and are they all authorized?
12© 2015 IBM Corporation
what’s deployed and where? Inventory tracking
Software Control and Security Risk mitigation use case sample
13© 2015 IBM Corporation
is the sw used and do I need to continue licensing it or can I optimize?
Is the sw used and needed or can I remove it to reduce security exposures?
Usage metering
Software Control and Security Risk mitigation use case sample
14© 2015 IBM Corporation14
Software Control and Security Risk mitigation use case sample
Which processes are running on my systems?
How long and when was last time they were used?
Process Metering data
Data can be analyzed in order to apply security risk assessments or
blacklisting filter criteria to identify exposures
15© 2015 IBM Corporation15
Software Control and Security Risk mitigation use case sample
Which are the binary files loaded on my systems?
Who they are and where are they located?
File System data
Data can be analyzed in order to apply security risk assessments or can be
feed to blacklist/whitelist security solutions
16© 2015 IBM Corporation
Why is the SW still there and how was discovered?
Are there executables or other left overs that could cause security exposures?
Software Control and Security Risk mitigation use case sample
17© 2015 IBM Corporation
Software Compliance Use case sample
!  Entitled Computers: computers that are entitled to use the particular
software associated with the contract definition, by being a part of the
computer group specified in the contract.
!  Licensed Computers: entitled computers where software is installed.
!  The values in the columns are links to sub-reports that list the computers
what’s the License usage? License usage tracking
18© 2015 IBM Corporation
Software Compliance use case sample
Enhanced Oracle Database features discovery
•  Discovers Oracle DB editions (Standard/Enterprise) and used
database features
•  Discovers Oracle DB instances & installation paths
•  Leverages the original Oracle LMS (License Management Services)
auditing SQL script
•  Relevant also for Processor-based metric
NEW
19© 2015 IBM Corporation
"  Flexible reporting time ranges
"  No data locking (no report signing)
"  Data export with digital signature
"  Visibility of the PVU/RVU peak values
"  Visibility of the PVU/RVU trends
"  Report views accessible during
data processing
"  Flexible report filtering
Trend line & peak value
IBM Capacity Licensing (PVU and RVU) Trend line & peak value
Software Compliance use case sample
Enhanced reporting for IBM
NEW
20© 2015 IBM Corporation
Questions??
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any
kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor
shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use
of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or
capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product
or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or
both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your
enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on
others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM
systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other
systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE
IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
THANK YOU
www.ibm.com/security

Contenu connexe

Tendances

Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
Samuel Kamuli
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
Arrow ECS UK
 

Tendances (19)

QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
IBM Security Immune System
IBM Security Immune SystemIBM Security Immune System
IBM Security Immune System
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
Extend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPs
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions
 
Tolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't SeeTolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't See
 

Similaire à Cutting Through the Software License Jungle: Stay Safe and Control Costs

Fernando Imperiale - Una aguja en el pajar
Fernando Imperiale - Una aguja en el pajarFernando Imperiale - Una aguja en el pajar
Fernando Imperiale - Una aguja en el pajar
Fernando M. Imperiale
 
Fernando Imperiale - Una aguja en el pajar
Fernando Imperiale - Una aguja en el pajarFernando Imperiale - Una aguja en el pajar
Fernando Imperiale - Una aguja en el pajar
Fernando M. Imperiale
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
AGILLY
 

Similaire à Cutting Through the Software License Jungle: Stay Safe and Control Costs (20)

AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...
 
Mitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-RadarMitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-Radar
 
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
 
App store and SAM strategy
App store and SAM strategyApp store and SAM strategy
App store and SAM strategy
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
APM Talk
APM TalkAPM Talk
APM Talk
 
IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)
 
Static Application Security Testing Strategies for Automation and Continuous ...
Static Application Security Testing Strategies for Automation and Continuous ...Static Application Security Testing Strategies for Automation and Continuous ...
Static Application Security Testing Strategies for Automation and Continuous ...
 
Fernando Imperiale - Una aguja en el pajar
Fernando Imperiale - Una aguja en el pajarFernando Imperiale - Una aguja en el pajar
Fernando Imperiale - Una aguja en el pajar
 
Aligning the Fast & the Slow: The Reality of Multi-Speed IT
Aligning the Fast & the Slow: The Reality of Multi-Speed ITAligning the Fast & the Slow: The Reality of Multi-Speed IT
Aligning the Fast & the Slow: The Reality of Multi-Speed IT
 
Fernando Imperiale - Una aguja en el pajar
Fernando Imperiale - Una aguja en el pajarFernando Imperiale - Una aguja en el pajar
Fernando Imperiale - Una aguja en el pajar
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?
 
BigInsights For Telecom
BigInsights For TelecomBigInsights For Telecom
BigInsights For Telecom
 
IBM MQ on cloud and containers
IBM MQ on cloud and containersIBM MQ on cloud and containers
IBM MQ on cloud and containers
 
App infrastructure &_integration_keynote_final
App infrastructure &_integration_keynote_finalApp infrastructure &_integration_keynote_final
App infrastructure &_integration_keynote_final
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem Partners
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
 
Integrate Application Security Testing into your SDLC
Integrate Application Security Testing into your SDLCIntegrate Application Security Testing into your SDLC
Integrate Application Security Testing into your SDLC
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 

Plus de IBM Security

Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
IBM Security
 

Plus de IBM Security (20)

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

Cutting Through the Software License Jungle: Stay Safe and Control Costs

  • 1. © 2015 IBM Corporation Antonio Gallotti Senior Product Manager Cutting Through the Software License Jungle: Stay Safe and Control Costs
  • 2. 2© 2015 IBM Corporation License, Contract, Audit Security, Vulnerability, Stability Wherever there is a Software there is a Risk and a Cost
  • 3. 3© 2015 IBM Corporation You can’t protect what you can’t see Software Compliance and Usage helps reducing risks and improve Incident response to reduce the cost of a data breach Software Control helps to know where to protect your environment Lack of visibility and control contributes to security breaches and financial loss *Source: 2015 Cost of a Data Breach Study: Global Analysis, Ponemon Institute, May 2015 “Major global bank compromised and millions of depositor records stolen due to missed server upgrade cycle” ? global average cost of a data breach* $3.8M üüü
  • 4. 4© 2015 IBM Corporation You can’t control what you can’t see Software Compliance and Usage is the No. 1 factor to reduce the license cost and be prepared for software audits Software Control is key to avoid overspending Lack of visibility and control contributes to unplanned license true-ups and fines *Source: MarketWatch, April 2015 “most enterprises face frequent, unbudgeted software license true-up bills from their vendors -- often to the tune of millions of dollars annually” ? average cost of a license true-up* $1.0M üüü
  • 5. 5© 2015 IBM Corporation IBM BigFix: Bridge the gap between Security and IT Ops ENDPOINT SECURITY Discovery and Patching Lifecycle Management Software Compliance and Usage Continuous Monitoring Threat Protection Incident Response ENDPOINT MANAGEMENT IBM BigFix® FIND IT. FIX IT. SECURE IT. …FAST Shared visibility and control between IT Operations and Security IT OPERATIONS SECURITY Reduce operational costs while improving your security posture
  • 6. 6© 2015 IBM Corporation Software compliance and usage – BigFix Inventory Identify what software is installed and how it’s used !  Discover all licensed and unlicensed software with in-depth granularity across operating systems and devices !  Reduce license compliance exposure and associated fines !  Decrease software license costs by eliminating unused or redundant software !  8,000+ software publishers, 40,000+ software products, 50+ cross OS virtualizations !  Mitigate risk from unauthorized and malicious software $ Saved $500K in unused software licenses while avoiding $1M in non-compliance fines across 15,000+ endpoints US Foods SW Catalogue, ISO 19770 enabled
  • 7. 7© 2015 IBM Corporation Capabilities IBM BigFix Inventory (AKA - Endpoint Manager for Software Use Analysis) •  Centralized Reporting Web Portal •  Health status and Reporting dashboards •  Virtualization and Cloud awareness •  Role based user access management •  REST API for easy integration •  IBM authorized tool for IBM Capacity •  Same as IBM License Metric Tool Product highlights•  So$ware  Catalogue  with   regular  updates   •  ISO  19770  Tags  and   so$ware    signatures   •  Catalogue  can  be   expanded  for  coverage  or   custom  applicaBons   •  Supported  virtualizaBons   such  as    vSphere,  vCenter,   ESXi,  Hyper-­‐V,  IBM  AIX   LPAR  and  WPAR,  KVM   and  more   •  SW  Asset  Inventory   •  SW  Use  Metering   •  SW  Use  ReporBng   •  HW  Discovery,   Inventory    and   Monitoring  of   Capacity  Changes  
  • 8. 8© 2015 IBM Corporation BigFix Inventory – Control Software Costs Compliant? Buy more? Detailed, real-time, current inventory and usage reports to eliminate under used or unnecessary licenses and reduce maintenance costs Overspending? Identify unlicensed computers. Associate SW inventory with HW data to avoid software license exposures Accurate inventory data in support of purchasing and procurement tools and processes You can’t control what you can’t see
  • 9. 9© 2015 IBM Corporation BigFix Inventory – Mitigate Security Risks Needed? Managed? Whitelist/Backlist filtering of inventory data to identify systems where unauthorized software is deployed or unauthorized processes are running Authorized? Usage reports to identify systems where software can be removed to reduce security exposures Inventory data and newly discovered system reports to verify if assets are properly managed or unauthorized You can’t protect what you can’t see
  • 10. 10© 2015 IBM Corporation Inventory and status health Dashboards
  • 11. 11© 2015 IBM Corporation Extensive Hardware Inventory Report Extensive  list  of   aUributes  and   configuraBon  data   Software Control and Security Risk mitigation use case sample Which systems/computers are we managing and are they all authorized?
  • 12. 12© 2015 IBM Corporation what’s deployed and where? Inventory tracking Software Control and Security Risk mitigation use case sample
  • 13. 13© 2015 IBM Corporation is the sw used and do I need to continue licensing it or can I optimize? Is the sw used and needed or can I remove it to reduce security exposures? Usage metering Software Control and Security Risk mitigation use case sample
  • 14. 14© 2015 IBM Corporation14 Software Control and Security Risk mitigation use case sample Which processes are running on my systems? How long and when was last time they were used? Process Metering data Data can be analyzed in order to apply security risk assessments or blacklisting filter criteria to identify exposures
  • 15. 15© 2015 IBM Corporation15 Software Control and Security Risk mitigation use case sample Which are the binary files loaded on my systems? Who they are and where are they located? File System data Data can be analyzed in order to apply security risk assessments or can be feed to blacklist/whitelist security solutions
  • 16. 16© 2015 IBM Corporation Why is the SW still there and how was discovered? Are there executables or other left overs that could cause security exposures? Software Control and Security Risk mitigation use case sample
  • 17. 17© 2015 IBM Corporation Software Compliance Use case sample !  Entitled Computers: computers that are entitled to use the particular software associated with the contract definition, by being a part of the computer group specified in the contract. !  Licensed Computers: entitled computers where software is installed. !  The values in the columns are links to sub-reports that list the computers what’s the License usage? License usage tracking
  • 18. 18© 2015 IBM Corporation Software Compliance use case sample Enhanced Oracle Database features discovery •  Discovers Oracle DB editions (Standard/Enterprise) and used database features •  Discovers Oracle DB instances & installation paths •  Leverages the original Oracle LMS (License Management Services) auditing SQL script •  Relevant also for Processor-based metric NEW
  • 19. 19© 2015 IBM Corporation "  Flexible reporting time ranges "  No data locking (no report signing) "  Data export with digital signature "  Visibility of the PVU/RVU peak values "  Visibility of the PVU/RVU trends "  Report views accessible during data processing "  Flexible report filtering Trend line & peak value IBM Capacity Licensing (PVU and RVU) Trend line & peak value Software Compliance use case sample Enhanced reporting for IBM NEW
  • 20. 20© 2015 IBM Corporation Questions??
  • 21. © Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. THANK YOU www.ibm.com/security