SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
IBM Global Technology Services
Data Sheet




                                                        Data security strategy
                                                        and assessment
                                                        services
                                                        Integrate enterprise data security into your business
                                                        strategy


                                                        As your business grows and evolves, so does the amount of sensitive
               Highlights                               data that you need to protect. Knowing where sensitive data resides
                                                        within your organization and having the right risk mitigation and data
           ●   Helps reduce risk and improve compli-    protection measures in place is crucial to the success of your business.
               ance with a data protection strategy
               aligned to your business requirements    You need to leverage the protection technologies you already have and
                                                        optimize future IT spending to mitigate both existing and projected
           ●   Facilitates optimized data security
                                                        risks. But without a proactive data protection strategy in place, you
               spending with an integrated, proactive
               data protection road map                 may be scrambling to implement tactical solutions as problems arise,
                                                        costing you money and productivity.
           ●   Helps limit data loss by identifying
               where data resides, how it is used and
               its risk of exposure                     IBM Data Security Services – data security strategy and assessment
                                                        provides a comprehensive IBM expert assessment of your current data
                                                        protection capabilities. We help you pinpoint where sensitive data
                                                        resides within your infrastructure and how your business uses it. We
                                                        also work with you to assess your unique needs and data security
                                                        requirements and develop a holistic data protection strategy aimed at
                                                        minimizing the impact to business productivity. With a business-
                                                        aligned data security road map in place, you can feel more confident
                                                        that your business is better protected from data loss.

                                                        Identifying where your sensitive data exists and
                                                        how well it is protected
                                                        Through interviews, on-site workshops and market-leading data dis-
                                                        covery tools, our expert IBM consultants help you discover where your
                                                        sensitive data resides and how it is used in the business. We also review
                                                        your existing data protection capabilities and perform a comprehensive
                                                        assessment of the data risks that your organization currently faces.

                                                        Helping you develop a business-aligned data
                                                        protection strategy
                                                        We then work with you to develop a risk-balanced, customized strategy
                                                        to protect your sensitive data. We take into consideration your specific
                                                        business and security needs, compliance requirements and existing data
security technologies. With this unique information about your busi-
ness and available data protection tools, we help you develop a tailored
data security strategy that is weighted to associated business risks. We
leverage our expertise in managing our own sensitive data across a
global business to provide you recommendations on how you can miti-
gate potential exposures and ultimately limit data loss.                     © Copyright IBM Corporation 2010

                                                                             IBM Global Services
Developing a road map to help optimize data                                  Route 100
                                                                             Somers, NY 10589 U.S.A.
security spending
                                                                             Produced in the United States of America
To help you optimize your data security spending, we work with you to        October 2010
develop a data protection road map that is designed to streamline your       All Rights Reserved
existing data security capabilities and help them work together more
                                                                             IBM, the IBM logo, ibm.com, are trademarks or registered
efficiently. To address gaps in your data protection capabilities, we help   trademarks of International Business Machines Corporation
you evaluate alternate data security solutions that meet your specific        in the United States, other countries, or both. If these and
                                                                             other IBM trademarked terms are marked on their first
needs and integrate them into your overall strategy. Our business-
                                                                             occurrence in this information with a trademark symbol
aligned approach helps ensure that you have a strategy in place to min-      (® or ™), these symbols indicate U.S. registered or common
imize the impact to productivity across your organization.                   law trademarks owned by IBM at the time this information
                                                                             was published. Such trademarks may also be registered or
                                                                             common law trademarks in other countries. A current list of
Why IBM?                                                                     IBM trademarks is available on the web at “Copyright and
IBM has extensive knowledge in securing corporate information across         trademark information” at ibm.com/legal/copytrade.shtml

multiple industries along with experience managing our own sensitive         Other company, product or service names may be trademarks
data around the globe. Your organization benefits from our market-            or service marks of others. References in this publication to
                                                                             IBM products or services do not imply that IBM intends to
leading security and cyber threat research, and deep experience in           make them available in all countries in which IBM operates.
industry-specific security requirements. With our enterprise security
                                                                             The customer is responsible for ensuring compliance with
architecture and integration expertise, we can provide holistic solutions    legal requirements. It is the customer’s sole responsibility to
while also addressing your specific data protection needs.                    obtain advice of competent legal counsel as to the
                                                                             identification and interpretation of any relevant laws and
                                                                             regulatory requirements that may affect the customer’s
For more information                                                         business and any actions the reader may have to take to
To learn more about the IBM Data Security Services – data security           comply with such laws. IBM does not provide legal advice or
strategy and assessment, please contact your IBM marketing represen-         represent or warrant that its services or products will ensure
                                                                             that the customer is in compliance with any law or
tative or IBM Business Partner, or visit the following website:              regulation.
ibm.com/services/security

                                                                                      Please Recycle




                                                                                                                     SED03113-USEN-00

Contenu connexe

En vedette

Security analysis and Portfolio Management
Security analysis and Portfolio ManagementSecurity analysis and Portfolio Management
Security analysis and Portfolio Management
Ashutosh Pandey
 
Centralizing security on the mainframe
Centralizing security on the mainframeCentralizing security on the mainframe
Centralizing security on the mainframe
Arun Gopinath
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
Arun Gopinath
 
Securing virtualization in real world environments
Securing virtualization in real world environmentsSecuring virtualization in real world environments
Securing virtualization in real world environments
Arun Gopinath
 
Rewriting the rules of patch management
Rewriting the rules of patch managementRewriting the rules of patch management
Rewriting the rules of patch management
Arun Gopinath
 
Cloud computing white paper who do you trust
Cloud computing white paper who do you trustCloud computing white paper who do you trust
Cloud computing white paper who do you trust
Arun Gopinath
 
Ibm xiv storage your ideal cloud building block
Ibm xiv storage   your ideal cloud building blockIbm xiv storage   your ideal cloud building block
Ibm xiv storage your ideal cloud building block
Arun Gopinath
 

En vedette (12)

Protecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software TechnologyProtecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software Technology
 
Security analysis and Portfolio Management
Security analysis and Portfolio ManagementSecurity analysis and Portfolio Management
Security analysis and Portfolio Management
 
Enterprise Strategy Group: The Big Data Security Analytics Era is Here
Enterprise Strategy Group: The Big Data Security Analytics Era is HereEnterprise Strategy Group: The Big Data Security Analytics Era is Here
Enterprise Strategy Group: The Big Data Security Analytics Era is Here
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Centralizing security on the mainframe
Centralizing security on the mainframeCentralizing security on the mainframe
Centralizing security on the mainframe
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Securing virtualization in real world environments
Securing virtualization in real world environmentsSecuring virtualization in real world environments
Securing virtualization in real world environments
 
Rewriting the rules of patch management
Rewriting the rules of patch managementRewriting the rules of patch management
Rewriting the rules of patch management
 
Secure by design
Secure by designSecure by design
Secure by design
 
Cloud computing white paper who do you trust
Cloud computing white paper who do you trustCloud computing white paper who do you trust
Cloud computing white paper who do you trust
 
Ibm xiv storage your ideal cloud building block
Ibm xiv storage   your ideal cloud building blockIbm xiv storage   your ideal cloud building block
Ibm xiv storage your ideal cloud building block
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Data security strategy-and-assessment-services

  • 1. IBM Global Technology Services Data Sheet Data security strategy and assessment services Integrate enterprise data security into your business strategy As your business grows and evolves, so does the amount of sensitive Highlights data that you need to protect. Knowing where sensitive data resides within your organization and having the right risk mitigation and data ● Helps reduce risk and improve compli- protection measures in place is crucial to the success of your business. ance with a data protection strategy aligned to your business requirements You need to leverage the protection technologies you already have and optimize future IT spending to mitigate both existing and projected ● Facilitates optimized data security risks. But without a proactive data protection strategy in place, you spending with an integrated, proactive data protection road map may be scrambling to implement tactical solutions as problems arise, costing you money and productivity. ● Helps limit data loss by identifying where data resides, how it is used and its risk of exposure IBM Data Security Services – data security strategy and assessment provides a comprehensive IBM expert assessment of your current data protection capabilities. We help you pinpoint where sensitive data resides within your infrastructure and how your business uses it. We also work with you to assess your unique needs and data security requirements and develop a holistic data protection strategy aimed at minimizing the impact to business productivity. With a business- aligned data security road map in place, you can feel more confident that your business is better protected from data loss. Identifying where your sensitive data exists and how well it is protected Through interviews, on-site workshops and market-leading data dis- covery tools, our expert IBM consultants help you discover where your sensitive data resides and how it is used in the business. We also review your existing data protection capabilities and perform a comprehensive assessment of the data risks that your organization currently faces. Helping you develop a business-aligned data protection strategy We then work with you to develop a risk-balanced, customized strategy to protect your sensitive data. We take into consideration your specific business and security needs, compliance requirements and existing data
  • 2. security technologies. With this unique information about your busi- ness and available data protection tools, we help you develop a tailored data security strategy that is weighted to associated business risks. We leverage our expertise in managing our own sensitive data across a global business to provide you recommendations on how you can miti- gate potential exposures and ultimately limit data loss. © Copyright IBM Corporation 2010 IBM Global Services Developing a road map to help optimize data Route 100 Somers, NY 10589 U.S.A. security spending Produced in the United States of America To help you optimize your data security spending, we work with you to October 2010 develop a data protection road map that is designed to streamline your All Rights Reserved existing data security capabilities and help them work together more IBM, the IBM logo, ibm.com, are trademarks or registered efficiently. To address gaps in your data protection capabilities, we help trademarks of International Business Machines Corporation you evaluate alternate data security solutions that meet your specific in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first needs and integrate them into your overall strategy. Our business- occurrence in this information with a trademark symbol aligned approach helps ensure that you have a strategy in place to min- (® or ™), these symbols indicate U.S. registered or common imize the impact to productivity across your organization. law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of Why IBM? IBM trademarks is available on the web at “Copyright and IBM has extensive knowledge in securing corporate information across trademark information” at ibm.com/legal/copytrade.shtml multiple industries along with experience managing our own sensitive Other company, product or service names may be trademarks data around the globe. Your organization benefits from our market- or service marks of others. References in this publication to IBM products or services do not imply that IBM intends to leading security and cyber threat research, and deep experience in make them available in all countries in which IBM operates. industry-specific security requirements. With our enterprise security The customer is responsible for ensuring compliance with architecture and integration expertise, we can provide holistic solutions legal requirements. It is the customer’s sole responsibility to while also addressing your specific data protection needs. obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s For more information business and any actions the reader may have to take to To learn more about the IBM Data Security Services – data security comply with such laws. IBM does not provide legal advice or strategy and assessment, please contact your IBM marketing represen- represent or warrant that its services or products will ensure that the customer is in compliance with any law or tative or IBM Business Partner, or visit the following website: regulation. ibm.com/services/security Please Recycle SED03113-USEN-00