Más contenido relacionado INFOGRAPHIC: 4 Imperatives to Safeguard Your Move to Cloud and Reduce Risk1. Cloud Requires
Dynamic Security
CLOUD SECURITY CONCERNS
Unrestricted
Access to
Cloud
Services
Explosive growth in data
spread across the cloud
New vulnerabilities
introduced by new apps
built outside of IT with
rapid development cycles
Unauthorized or
malicious access by
privileged insiders
Shortage of skilled
security personnel to
monitor, analyze, prioritize
and respond to threats
ACT STRATEGICALLY
Manage
Access Protect
Data
Gain
Visibility
Encrypt and monitor
sensitive data
Scan for
vulnerabilities
Protect virtualized
infrastructure from
network attacks
Optimize Security Operations
USE EXPERTISE TO EXTEND INTEGRATED NEXT-GEN SECURITY
OPERATIONS TO THE CLOUD
Adopt cloud confidently with the
IBM Dynamic Cloud Security Portfolio
A comprehensive set of capabilities that provide access management,
data and application protection, and deep visibility
help protect people, data,
applications and infrastructure
in the cloud, with integrated
solutions and open standards
1. 2013, IDC US Cloud Security Survey
2. Sept 2013, Information Week Cloud Security and Risk Survey
3. Verizon 2014 Data Breach Investigations Report
Monitor cloud activity
Correlate and prioritize
events across
traditional and
cloud environments
Extend compliance
reporting to
cloud infrastructure
Federate and govern
user access to cloud
applications and
infrastructure
Safeguard access
to cloud-deployed
applications
Govern privileged
user access
Data and
Applications
Outside Your
Control
Damaging
Security
Breaches
50%
of firms are worried
73% about unauthorized
75% access or leakage of
of firms discovered
cloud usage outside of
IT or security policies.1
sensitive data.2 of security breaches take
days, weeks, or even
months to discover.3
Users focus
on productivity
and are not aware of
security implications
Unauthorized or
malicious access by
privileged insiders
Lack of visibility
into cloud infrastructure
while compliance needs
are increasing
Four imperatives to safeguard
your move to cloud and reduce risk
Cloud Security
Technologies
Cloud and Managed
Services
Comprehensive
Threat Intelligence
Deliver a consolidated
security view across the
traditional data center
and the cloud
Leverage innovations in
big data, visualization
and analytics to stay
ahead of the threat
Utilize expert
knowledge to respond
to security incidents
with speed and agility
Discover how you can embrace
cloud with confidence today.
http://www.ibm.com/security/cloud
http://www.securityintelligence.com
© Copyright IBM Corporation 2014. All rights reserved.
for flexibility
is embedded into IBM Security
solutions by IBM X-Force®
Research and Development,
one of the oldest and most
respected commercial security
research teams
help secure some of the most
complex cloud networks in the
world — monitoring 15 billion
security events every day for
over 4,000 clients
SAFEGUARD PEOPLE,
APPLICATIONS,
AND DEVICES
connecting to the cloud
with easy-to-use identity
and access management
built for the cloud.
IDENTIFY
VULNERABILITIES AND
PREVENT ATTACKS
targeting sensitive data by
hardening the underlying
cloud infrastructure and the
applications running on them.
MONITOR THE CLOUD
FOR SECURITY
BREACHES
and compliance violations
using advanced security
analytics and threat
intelligence in the cloud.
1
2
3
4