SlideShare una empresa de Scribd logo
1 de 22
Descargar para leer sin conexión
© 2015 IBM Corporation
How Secure is Your Data?
Eric Offenberg
WW Sales Enablement Leader
IBM Security Guardium
2© 2015 IBM Corporation
A Short Video to Get Us Started
3© 2015 IBM Corporation
Are you doing enough to protect data that runs your organization?
Damaging security incidents
involve loss or illicit modification
or destruction of sensitive data
Yet many security programs forget
to protect the data
70%
Customer data, product designs,
sales information, proprietary
algorithms, communications, etc.
Source: TechRadar
of your
organization’s
value likely lies in
intellectual property
4© 2015 IBM Corporation
Data is the key target for security breaches…..
… and Database Servers Are The Primary Source of Breached Data
http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf2012 Data Breach Report from Verizon Business RISK Team
 Database servers contain your
constituents’s most valuable
information
– Financial records
– Customer information
– Credit card and other account
records
– Personally identifiable information
– Patient records
 High volumes of structured data
 Easy to access
“Go where the money is… and go there often.”
- Willie Sutton
WHY?
5© 2015 IBM Corporation
40%
Yearly growth
of the Digital
Universe over
the next
decade
80%
Unstructured
data in the
enterprise
46%
Increase in
number of
data breaches
from 2013 to
2014
256
Number of
days it can
take to
identify
malicious
attacks
23%
Organizations STILL struggle with security
Unstructured Data Security
Increase in
Total Cost of
a data
breach since
2013
6© 2015 IBM Corporation
$3.5M
Yearly average cost of
compliance
Company Data
Security approach
Audit
events/year
Average cost/
audit
Data loss
events/year
Average cost/
data loss
Total cost
(adjusted per TB)
w/o data security 6.3
$24K
2.3
$130K
$449K/TB
w/ data security 1.7 1.4 $223K/TB
Annual Cost of not implementing data security $226K/TB
Total annual cost of doing nothing in BIG DATA compliance:
(for average Big Data organization with 180 TB of business data) $40+ M
Source: Aberdeen Group. Why Information Governance Must be Addressed Right Now. 2012
Doing nothing about data compliance is not optional
Current models don’t scale
Source: The True Cost of Compliance, The
Cost of a Data Breach, Ponemon Institute,
7© 2015 IBM Corporation
Data is challenging to secure
DYNAMIC
Data multiplies
continuously and
moves quickly
DISTRIBUTED
Data is everywhere,
across applications
and infrastructure
IN DEMAND
Users need to constantly access
and share data to do their jobs
8© 2015 IBM Corporation
Most Organizations Have Weak Controls
 94% of breaches involved database servers
 85% of victims were unaware of the compromise for
weeks to months.
 97% of data breaches were avoidable through
simple or intermediate controls.
 98% of data breaches stemmed from external agents
 92% of victims were notified by 3rd parties
of the breach.
 96% of victims were not PCI DSS-compliant
at the time of the breach.
Source: 2012 Verizon Data Breach Investigations Report
http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf
Key findings:855 incidents reported
174 million compromised records
9© 2015 IBM Corporation
Top Data Protection Challenges
Where is my sensitive data - and who’s
accessing it (including privileged users)?
How can I enforce access control &
change control policies for databases?
How do I check for vulnerabilities and
lock-down database configurations?
How do I reduce costs by automating &
centralizing compliance controls?
What sensitive data does my organization
possess?
© 2015 IBM Corporation
Finding a Solution
11© 2015 IBM Corporation
File and Data Activity Monitoring: 3 Key Business Drivers
1. Internal threats
• Identify unauthorized
changes (governance)
• Prevent data leakage
2. External threats
• Prevent theft
3. Compliance
• Simplify processes
• Reduce costs
12© 2015 IBM Corporation
Guardium uses intelligence and automation to safeguard data
PROTECT
Complete protection for sensitive
data, including compliance automation
ADAPT
Seamlessly handle
changes within your IT
environment
ANALYZE
Automatically
discover critical data
and uncover risk
13© 2015 IBM Corporation
Guardium for Databases/
Database Activity Monitor (DAM)
• Assure compliance with
regulatory mandates
• Protect against threats
from legitimate users and
potential hackers
• Minimize operational
costs through automated
and centralized controls
• Continuous, real-time
database access and activity
monitoring
• Policy-based controls to
detect unauthorized or
suspicious activity
• Prevention of data loss
Data Access Protection and
Compliance Made Simple
Requirements
Benefits
Guardium
14© 2015 IBM Corporation14
EmployeeTable
SELECT
Fine-Grained Policies with Real-Time Alerts
Application
Server
10.10.9.244
Database
Server
10.10.9.56
Included with DAM
Heterogeneous
support including
System z and
IBM i data servers
15© 2015 IBM Corporation
Guardium helps support the most complex of IT environments …
Examples of supported databases, Big Data environments, file shares, etc
Applications Databases
DB2
Informix
IMS
Data Warehouses
Netezza
PureData for
Analytics
DB2 BLU
CICS
WebSphere
Siebel
PeopleSoft
E-Business
Database Tools
Enterprise
Content Managers
Big Data Environments
Files
VSAM
z/OS Datasets FTP
DB
Cloud Environments
Windows, Linux,
Unix
16© 2015 IBM Corporation
• Scripting maintenance
• Expertise to parse logs
• Centralize collection
• Stove-piped approach
Typical home grown compliance is costly and ineffective
Create
reports
Manual review
• Approval
• Reject
• Escalate
Manual
remediation
dispatch
and tracking
Native Data
Logging
Data Compliance Burden
Spreadsheet
Evaluation
17© 2015 IBM Corporation
Protect critical files and documents
Protect Files
Protect
Databases & Big Data
Guardium
Protect
Web Applications  Classify files and understand
sensitive data exposure
 Visualize ownership and access
for your files
 Control access to critical data
through blocking and alerting
 Monitor all file access, and review
in a built-in compliance workflow
 Detect anomalous activity and
investigate outliers
IBM Security Guardium Activity Monitor for FilesNEW!
18© 2015 IBM Corporation
… and eases integration across the broader environment as well
SNMP Dashboards
Tivoli Netcool, HP Openview, etc.
Change Ticketing Systems
Tivoli Request Manager, Tivoli Maximo, Remedy, Peregrine, etc.
Endpoint Management
BigFix
Security Intelligence and Management
QRadar SIEM, SiteProtector, QRadar Log Manager, zSecure
Audit, ArcSight, RSA Envision, McAfee ePO, etc.
Business application integrations
PeopleSoft, Siebel, SAP
Load Balancers
F5, CISCO Endpoint Management
BigFix
Long Term Storage
IBM TSM, IBM PureData-Nettezza,
Optim Archive, EMC Centers, FTP,
SCP, etc.
Vulnerability Standards
CVE, STIG, CIS Benchmark, SCAP
Streamline Processes
Reduce Costs Increase Security
Long Term Storage
IBM TSM, IBM PureData-Nettezza,
Optim Archive, EMC Centers, FTP, SCP Application Security
AppScan, Policy Manager
Data Protection on z
zSecure zSystems SIEM,
zSecure zAdmin and RACF
Web Application Firewalls
F5 ASM and ISMIBM Security Guardium
Directory Services
Security Directory Service,
Active Directory, LDAP
Identity Management
Privileged Identity Manager,
Identity and Access Management
Authentication
RSA SecureID, Radius, Kerberos, LDAP
Reduce Costs, Streamline Processes
& Increase Security
Classification & Leak Protection
InfoSphere Discovery, Information
Governance Catalog, Optim Data
Masking - Credit Card, Social
Security number, phone, custom, etc.
19© 2015 IBM Corporation
ANALYZE
A leading organization uses
Guardium to analyze and protect
data in a dynamic environment
using real-time monitoring of more
than 5K heterogeneous data
sources, including Big Data
sources, without affecting the
performance of critical apps.
Client success stories
PROTECT
Another organization uses
Guardium to analyze and protect
data by monitoring and auditing
500 production databases.
They have increased security, while
reducing staff security requirements
from 10 FTEs to 1 FTE.
ADAPT
A healthcare company deployed
IBM Security Guardium across 130
databases in just 3 weeks.
They can now get compliance
reports for PCI, SOX, and HIPAA
in just a few moments.
20© 2015 IBM Corporation
Guardium supports the whole data protection journey
Perform vulnerability assessment, discovery
and classification
Dynamic blocking, alerting, quarantine, encryption
and integration with security intelligence
Comprehensive
data protection
Big data platforms, file systems or other platforms
also require monitoring, blocking, reporting
Find and address PII, determine who is reading
data, leverage masking
Database monitoring focused on changed data,
automated reporting
Acute
compliance
need
Expand
platform coverage
Address
data privacy
Sensitive
data discovery
21© 2015 IBM Corporation
133 countries where IBM delivers
managed security services
20 industry analyst reports rank
IBM Security as a LEADER
TOP 3 enterprise security software
vendor in total revenue
10K clients protected including…
24 of the top 33 banks in Japan,
North America, and Australia
Learn more about IBM Security
Visit our website
ibm.com/guardium
Watch our videos
https://ibm.biz/youtubeguardium
Read new blog posts
SecurityIntelligence.com
Follow us on Twitter
@ibmsecurity
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any
kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor
shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use
of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or
capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product
or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries
or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside
your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks
on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access.
IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other
systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE
IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
THANK YOUwww.ibm.com/security

Más contenido relacionado

La actualidad más candente

Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planetVincent Kwon
 
Understanding Zero Day Recovery - Your last defence against ransomware attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacksUnderstanding Zero Day Recovery - Your last defence against ransomware attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacksMarie Wilcox
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0Rasmi Swain
 
Raz-Lee Security Corporate Profile
Raz-Lee Security Corporate ProfileRaz-Lee Security Corporate Profile
Raz-Lee Security Corporate ProfileRaz-Lee Security
 
IBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewIBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewnazeer325
 
Achieving Effective IT Security with Continuous ISO 27001 Compliance
Achieving Effective IT Security with Continuous ISO 27001 ComplianceAchieving Effective IT Security with Continuous ISO 27001 Compliance
Achieving Effective IT Security with Continuous ISO 27001 ComplianceTripwire
 
IT Asset Management by Miradore
IT Asset Management by MiradoreIT Asset Management by Miradore
IT Asset Management by MiradoreMiradore
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Securityebuc
 
Extending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixExtending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixLuigi Delgrosso
 
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...CSA Argentina
 

La actualidad más candente (19)

Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
Understanding Zero Day Recovery - Your last defence against ransomware attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacksUnderstanding Zero Day Recovery - Your last defence against ransomware attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacks
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Raz-Lee Security Corporate Profile
Raz-Lee Security Corporate ProfileRaz-Lee Security Corporate Profile
Raz-Lee Security Corporate Profile
 
IBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewIBM InfoSphere Guardium overview
IBM InfoSphere Guardium overview
 
Leveraging Log Management to provide business value
Leveraging Log Management to provide business valueLeveraging Log Management to provide business value
Leveraging Log Management to provide business value
 
Achieving Effective IT Security with Continuous ISO 27001 Compliance
Achieving Effective IT Security with Continuous ISO 27001 ComplianceAchieving Effective IT Security with Continuous ISO 27001 Compliance
Achieving Effective IT Security with Continuous ISO 27001 Compliance
 
IT Asset Management by Miradore
IT Asset Management by MiradoreIT Asset Management by Miradore
IT Asset Management by Miradore
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 
Extending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixExtending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFix
 
Security - A Digital Transformation Enabler
Security - A Digital Transformation EnablerSecurity - A Digital Transformation Enabler
Security - A Digital Transformation Enabler
 
Dit yvol2iss37
Dit yvol2iss37Dit yvol2iss37
Dit yvol2iss37
 
Tanium Overview
Tanium OverviewTanium Overview
Tanium Overview
 
Digital documents & e-discovery
Digital documents & e-discovery Digital documents & e-discovery
Digital documents & e-discovery
 
IT ASSET MANAGEMENT
IT ASSET MANAGEMENTIT ASSET MANAGEMENT
IT ASSET MANAGEMENT
 
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
 

Destacado

Welcome to JoomShaper
Welcome to JoomShaperWelcome to JoomShaper
Welcome to JoomShaperKowshar Ahmed
 
268. la falta de comprensión de los padres de familia hacia los adolescentes
268. la falta de comprensión de los padres de familia hacia los adolescentes268. la falta de comprensión de los padres de familia hacia los adolescentes
268. la falta de comprensión de los padres de familia hacia los adolescentesdec-admin
 
339.rescatando espacios
339.rescatando espacios339.rescatando espacios
339.rescatando espaciosdec-admin
 
1st Detect Corp - TEDW 2013 - rev 1
1st Detect Corp - TEDW 2013 - rev 11st Detect Corp - TEDW 2013 - rev 1
1st Detect Corp - TEDW 2013 - rev 1jwylde
 
Rearden_GCC_2015
Rearden_GCC_2015Rearden_GCC_2015
Rearden_GCC_2015jwylde
 
499. mantenimiento del edificio escolar
499. mantenimiento del edificio escolar499. mantenimiento del edificio escolar
499. mantenimiento del edificio escolardec-admin
 
9.tumbate el rollo
9.tumbate el rollo9.tumbate el rollo
9.tumbate el rollodec-admin
 
Public cielution imaps_chip_to_system_codesign
Public cielution imaps_chip_to_system_codesignPublic cielution imaps_chip_to_system_codesign
Public cielution imaps_chip_to_system_codesignKamal Karimanal
 

Destacado (20)

Venture Connected AUG 2016 LITE
Venture Connected AUG 2016 LITEVenture Connected AUG 2016 LITE
Venture Connected AUG 2016 LITE
 
Sección 6. normativa trafico de vida silvestre
Sección 6. normativa trafico de vida silvestreSección 6. normativa trafico de vida silvestre
Sección 6. normativa trafico de vida silvestre
 
CI_CONF 2012: Scaling - Chris Miller
CI_CONF 2012: Scaling - Chris MillerCI_CONF 2012: Scaling - Chris Miller
CI_CONF 2012: Scaling - Chris Miller
 
Welcome to JoomShaper
Welcome to JoomShaperWelcome to JoomShaper
Welcome to JoomShaper
 
Seccion 5. unidad 8
Seccion 5. unidad 8Seccion 5. unidad 8
Seccion 5. unidad 8
 
Sección 2. unidad 8
Sección 2. unidad 8Sección 2. unidad 8
Sección 2. unidad 8
 
268. la falta de comprensión de los padres de familia hacia los adolescentes
268. la falta de comprensión de los padres de familia hacia los adolescentes268. la falta de comprensión de los padres de familia hacia los adolescentes
268. la falta de comprensión de los padres de familia hacia los adolescentes
 
The color purple
The color purpleThe color purple
The color purple
 
Sección 2. unidad 8 corregida1
Sección 2. unidad 8 corregida1Sección 2. unidad 8 corregida1
Sección 2. unidad 8 corregida1
 
Math basketball
Math basketballMath basketball
Math basketball
 
339.rescatando espacios
339.rescatando espacios339.rescatando espacios
339.rescatando espacios
 
Seccion 5
Seccion 5Seccion 5
Seccion 5
 
Sección 3. unidad 8
Sección 3. unidad 8Sección 3. unidad 8
Sección 3. unidad 8
 
Sección 2. unidad 8 corregida
Sección 2. unidad 8 corregidaSección 2. unidad 8 corregida
Sección 2. unidad 8 corregida
 
1st Detect Corp - TEDW 2013 - rev 1
1st Detect Corp - TEDW 2013 - rev 11st Detect Corp - TEDW 2013 - rev 1
1st Detect Corp - TEDW 2013 - rev 1
 
Rearden_GCC_2015
Rearden_GCC_2015Rearden_GCC_2015
Rearden_GCC_2015
 
499. mantenimiento del edificio escolar
499. mantenimiento del edificio escolar499. mantenimiento del edificio escolar
499. mantenimiento del edificio escolar
 
9.tumbate el rollo
9.tumbate el rollo9.tumbate el rollo
9.tumbate el rollo
 
Public cielution imaps_chip_to_system_codesign
Public cielution imaps_chip_to_system_codesignPublic cielution imaps_chip_to_system_codesign
Public cielution imaps_chip_to_system_codesign
 
Sección 1c. unidad 11
Sección 1c. unidad 11Sección 1c. unidad 11
Sección 1c. unidad 11
 

Similar a Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg

Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataIBM Security
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big riskIBM Sverige
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8John Palfreyman
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"IBM Security
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
Big Data - Amplifying Security Intelligence
Big Data - Amplifying Security IntelligenceBig Data - Amplifying Security Intelligence
Big Data - Amplifying Security IntelligenceIBM Danmark
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarIBM Security
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM Security
 
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive DataX-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive DataIBM Security
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
 
Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...IBM Security
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 

Similar a Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg (20)

Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Big Data - Amplifying Security Intelligence
Big Data - Amplifying Security IntelligenceBig Data - Amplifying Security Intelligence
Big Data - Amplifying Security Intelligence
 
Mitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-RadarMitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-Radar
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
 
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive DataX-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBMProtecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 

Más de dawnrk

Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdfIbm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdfdawnrk
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergdawnrk
 
Ibm ofa ottawa_analytics_in_gov _campbell_robertson
Ibm  ofa ottawa_analytics_in_gov _campbell_robertsonIbm  ofa ottawa_analytics_in_gov _campbell_robertson
Ibm ofa ottawa_analytics_in_gov _campbell_robertsondawnrk
 
Ibm ofa ottawa_analytics_in_gov _campbell_robertson
Ibm  ofa ottawa_analytics_in_gov _campbell_robertsonIbm  ofa ottawa_analytics_in_gov _campbell_robertson
Ibm ofa ottawa_analytics_in_gov _campbell_robertsondawnrk
 
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdfIbm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdfdawnrk
 
Ibm ofa ottawa_analytics_in_gov _campbell_robertson
Ibm  ofa ottawa_analytics_in_gov _campbell_robertsonIbm  ofa ottawa_analytics_in_gov _campbell_robertson
Ibm ofa ottawa_analytics_in_gov _campbell_robertsondawnrk
 

Más de dawnrk (6)

Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdfIbm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Ibm ofa ottawa_analytics_in_gov _campbell_robertson
Ibm  ofa ottawa_analytics_in_gov _campbell_robertsonIbm  ofa ottawa_analytics_in_gov _campbell_robertson
Ibm ofa ottawa_analytics_in_gov _campbell_robertson
 
Ibm ofa ottawa_analytics_in_gov _campbell_robertson
Ibm  ofa ottawa_analytics_in_gov _campbell_robertsonIbm  ofa ottawa_analytics_in_gov _campbell_robertson
Ibm ofa ottawa_analytics_in_gov _campbell_robertson
 
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdfIbm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
 
Ibm ofa ottawa_analytics_in_gov _campbell_robertson
Ibm  ofa ottawa_analytics_in_gov _campbell_robertsonIbm  ofa ottawa_analytics_in_gov _campbell_robertson
Ibm ofa ottawa_analytics_in_gov _campbell_robertson
 

Último

Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...nirzagarg
 
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...HyderabadDolls
 
Statistics notes ,it includes mean to index numbers
Statistics notes ,it includes mean to index numbersStatistics notes ,it includes mean to index numbers
Statistics notes ,it includes mean to index numberssuginr1
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...nirzagarg
 
Lake Town / Independent Kolkata Call Girls Phone No 8005736733 Elite Escort S...
Lake Town / Independent Kolkata Call Girls Phone No 8005736733 Elite Escort S...Lake Town / Independent Kolkata Call Girls Phone No 8005736733 Elite Escort S...
Lake Town / Independent Kolkata Call Girls Phone No 8005736733 Elite Escort S...HyderabadDolls
 
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制vexqp
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteedamy56318795
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...gajnagarg
 
20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdf20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdfkhraisr
 
7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.pptibrahimabdi22
 
Giridih Escorts Service Girl ^ 9332606886, WhatsApp Anytime Giridih
Giridih Escorts Service Girl ^ 9332606886, WhatsApp Anytime GiridihGiridih Escorts Service Girl ^ 9332606886, WhatsApp Anytime Giridih
Giridih Escorts Service Girl ^ 9332606886, WhatsApp Anytime Giridihmeghakumariji156
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...gajnagarg
 
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...nirzagarg
 
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...nirzagarg
 
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...Elaine Werffeli
 
Vastral Call Girls Book Now 7737669865 Top Class Escort Service Available
Vastral Call Girls Book Now 7737669865 Top Class Escort Service AvailableVastral Call Girls Book Now 7737669865 Top Class Escort Service Available
Vastral Call Girls Book Now 7737669865 Top Class Escort Service Availablegargpaaro
 
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...HyderabadDolls
 
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...SOFTTECHHUB
 
Top profile Call Girls In Rohtak [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Rohtak [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Rohtak [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Rohtak [ 7014168258 ] Call Me For Genuine Models We...nirzagarg
 

Último (20)

Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
 
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
 
Statistics notes ,it includes mean to index numbers
Statistics notes ,it includes mean to index numbersStatistics notes ,it includes mean to index numbers
Statistics notes ,it includes mean to index numbers
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
 
Lake Town / Independent Kolkata Call Girls Phone No 8005736733 Elite Escort S...
Lake Town / Independent Kolkata Call Girls Phone No 8005736733 Elite Escort S...Lake Town / Independent Kolkata Call Girls Phone No 8005736733 Elite Escort S...
Lake Town / Independent Kolkata Call Girls Phone No 8005736733 Elite Escort S...
 
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
 
20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdf20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdf
 
7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
 
Giridih Escorts Service Girl ^ 9332606886, WhatsApp Anytime Giridih
Giridih Escorts Service Girl ^ 9332606886, WhatsApp Anytime GiridihGiridih Escorts Service Girl ^ 9332606886, WhatsApp Anytime Giridih
Giridih Escorts Service Girl ^ 9332606886, WhatsApp Anytime Giridih
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
 
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
 
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
 
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
 
Vastral Call Girls Book Now 7737669865 Top Class Escort Service Available
Vastral Call Girls Book Now 7737669865 Top Class Escort Service AvailableVastral Call Girls Book Now 7737669865 Top Class Escort Service Available
Vastral Call Girls Book Now 7737669865 Top Class Escort Service Available
 
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
 
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
 
Top profile Call Girls In Rohtak [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Rohtak [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Rohtak [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Rohtak [ 7014168258 ] Call Me For Genuine Models We...
 

Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg

  • 1. © 2015 IBM Corporation How Secure is Your Data? Eric Offenberg WW Sales Enablement Leader IBM Security Guardium
  • 2. 2© 2015 IBM Corporation A Short Video to Get Us Started
  • 3. 3© 2015 IBM Corporation Are you doing enough to protect data that runs your organization? Damaging security incidents involve loss or illicit modification or destruction of sensitive data Yet many security programs forget to protect the data 70% Customer data, product designs, sales information, proprietary algorithms, communications, etc. Source: TechRadar of your organization’s value likely lies in intellectual property
  • 4. 4© 2015 IBM Corporation Data is the key target for security breaches….. … and Database Servers Are The Primary Source of Breached Data http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf2012 Data Breach Report from Verizon Business RISK Team  Database servers contain your constituents’s most valuable information – Financial records – Customer information – Credit card and other account records – Personally identifiable information – Patient records  High volumes of structured data  Easy to access “Go where the money is… and go there often.” - Willie Sutton WHY?
  • 5. 5© 2015 IBM Corporation 40% Yearly growth of the Digital Universe over the next decade 80% Unstructured data in the enterprise 46% Increase in number of data breaches from 2013 to 2014 256 Number of days it can take to identify malicious attacks 23% Organizations STILL struggle with security Unstructured Data Security Increase in Total Cost of a data breach since 2013
  • 6. 6© 2015 IBM Corporation $3.5M Yearly average cost of compliance Company Data Security approach Audit events/year Average cost/ audit Data loss events/year Average cost/ data loss Total cost (adjusted per TB) w/o data security 6.3 $24K 2.3 $130K $449K/TB w/ data security 1.7 1.4 $223K/TB Annual Cost of not implementing data security $226K/TB Total annual cost of doing nothing in BIG DATA compliance: (for average Big Data organization with 180 TB of business data) $40+ M Source: Aberdeen Group. Why Information Governance Must be Addressed Right Now. 2012 Doing nothing about data compliance is not optional Current models don’t scale Source: The True Cost of Compliance, The Cost of a Data Breach, Ponemon Institute,
  • 7. 7© 2015 IBM Corporation Data is challenging to secure DYNAMIC Data multiplies continuously and moves quickly DISTRIBUTED Data is everywhere, across applications and infrastructure IN DEMAND Users need to constantly access and share data to do their jobs
  • 8. 8© 2015 IBM Corporation Most Organizations Have Weak Controls  94% of breaches involved database servers  85% of victims were unaware of the compromise for weeks to months.  97% of data breaches were avoidable through simple or intermediate controls.  98% of data breaches stemmed from external agents  92% of victims were notified by 3rd parties of the breach.  96% of victims were not PCI DSS-compliant at the time of the breach. Source: 2012 Verizon Data Breach Investigations Report http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf Key findings:855 incidents reported 174 million compromised records
  • 9. 9© 2015 IBM Corporation Top Data Protection Challenges Where is my sensitive data - and who’s accessing it (including privileged users)? How can I enforce access control & change control policies for databases? How do I check for vulnerabilities and lock-down database configurations? How do I reduce costs by automating & centralizing compliance controls? What sensitive data does my organization possess?
  • 10. © 2015 IBM Corporation Finding a Solution
  • 11. 11© 2015 IBM Corporation File and Data Activity Monitoring: 3 Key Business Drivers 1. Internal threats • Identify unauthorized changes (governance) • Prevent data leakage 2. External threats • Prevent theft 3. Compliance • Simplify processes • Reduce costs
  • 12. 12© 2015 IBM Corporation Guardium uses intelligence and automation to safeguard data PROTECT Complete protection for sensitive data, including compliance automation ADAPT Seamlessly handle changes within your IT environment ANALYZE Automatically discover critical data and uncover risk
  • 13. 13© 2015 IBM Corporation Guardium for Databases/ Database Activity Monitor (DAM) • Assure compliance with regulatory mandates • Protect against threats from legitimate users and potential hackers • Minimize operational costs through automated and centralized controls • Continuous, real-time database access and activity monitoring • Policy-based controls to detect unauthorized or suspicious activity • Prevention of data loss Data Access Protection and Compliance Made Simple Requirements Benefits Guardium
  • 14. 14© 2015 IBM Corporation14 EmployeeTable SELECT Fine-Grained Policies with Real-Time Alerts Application Server 10.10.9.244 Database Server 10.10.9.56 Included with DAM Heterogeneous support including System z and IBM i data servers
  • 15. 15© 2015 IBM Corporation Guardium helps support the most complex of IT environments … Examples of supported databases, Big Data environments, file shares, etc Applications Databases DB2 Informix IMS Data Warehouses Netezza PureData for Analytics DB2 BLU CICS WebSphere Siebel PeopleSoft E-Business Database Tools Enterprise Content Managers Big Data Environments Files VSAM z/OS Datasets FTP DB Cloud Environments Windows, Linux, Unix
  • 16. 16© 2015 IBM Corporation • Scripting maintenance • Expertise to parse logs • Centralize collection • Stove-piped approach Typical home grown compliance is costly and ineffective Create reports Manual review • Approval • Reject • Escalate Manual remediation dispatch and tracking Native Data Logging Data Compliance Burden Spreadsheet Evaluation
  • 17. 17© 2015 IBM Corporation Protect critical files and documents Protect Files Protect Databases & Big Data Guardium Protect Web Applications  Classify files and understand sensitive data exposure  Visualize ownership and access for your files  Control access to critical data through blocking and alerting  Monitor all file access, and review in a built-in compliance workflow  Detect anomalous activity and investigate outliers IBM Security Guardium Activity Monitor for FilesNEW!
  • 18. 18© 2015 IBM Corporation … and eases integration across the broader environment as well SNMP Dashboards Tivoli Netcool, HP Openview, etc. Change Ticketing Systems Tivoli Request Manager, Tivoli Maximo, Remedy, Peregrine, etc. Endpoint Management BigFix Security Intelligence and Management QRadar SIEM, SiteProtector, QRadar Log Manager, zSecure Audit, ArcSight, RSA Envision, McAfee ePO, etc. Business application integrations PeopleSoft, Siebel, SAP Load Balancers F5, CISCO Endpoint Management BigFix Long Term Storage IBM TSM, IBM PureData-Nettezza, Optim Archive, EMC Centers, FTP, SCP, etc. Vulnerability Standards CVE, STIG, CIS Benchmark, SCAP Streamline Processes Reduce Costs Increase Security Long Term Storage IBM TSM, IBM PureData-Nettezza, Optim Archive, EMC Centers, FTP, SCP Application Security AppScan, Policy Manager Data Protection on z zSecure zSystems SIEM, zSecure zAdmin and RACF Web Application Firewalls F5 ASM and ISMIBM Security Guardium Directory Services Security Directory Service, Active Directory, LDAP Identity Management Privileged Identity Manager, Identity and Access Management Authentication RSA SecureID, Radius, Kerberos, LDAP Reduce Costs, Streamline Processes & Increase Security Classification & Leak Protection InfoSphere Discovery, Information Governance Catalog, Optim Data Masking - Credit Card, Social Security number, phone, custom, etc.
  • 19. 19© 2015 IBM Corporation ANALYZE A leading organization uses Guardium to analyze and protect data in a dynamic environment using real-time monitoring of more than 5K heterogeneous data sources, including Big Data sources, without affecting the performance of critical apps. Client success stories PROTECT Another organization uses Guardium to analyze and protect data by monitoring and auditing 500 production databases. They have increased security, while reducing staff security requirements from 10 FTEs to 1 FTE. ADAPT A healthcare company deployed IBM Security Guardium across 130 databases in just 3 weeks. They can now get compliance reports for PCI, SOX, and HIPAA in just a few moments.
  • 20. 20© 2015 IBM Corporation Guardium supports the whole data protection journey Perform vulnerability assessment, discovery and classification Dynamic blocking, alerting, quarantine, encryption and integration with security intelligence Comprehensive data protection Big data platforms, file systems or other platforms also require monitoring, blocking, reporting Find and address PII, determine who is reading data, leverage masking Database monitoring focused on changed data, automated reporting Acute compliance need Expand platform coverage Address data privacy Sensitive data discovery
  • 21. 21© 2015 IBM Corporation 133 countries where IBM delivers managed security services 20 industry analyst reports rank IBM Security as a LEADER TOP 3 enterprise security software vendor in total revenue 10K clients protected including… 24 of the top 33 banks in Japan, North America, and Australia Learn more about IBM Security Visit our website ibm.com/guardium Watch our videos https://ibm.biz/youtubeguardium Read new blog posts SecurityIntelligence.com Follow us on Twitter @ibmsecurity
  • 22. © Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. THANK YOUwww.ibm.com/security