SlideShare una empresa de Scribd logo
1 de 31
© 2015 IBM Corporation
The Case for Next-Generation Managed Security Services
Speakers:
Leslie Kittredge – IBM Security
Mike Montecillo – IBM Security
Don’t Let Hybrid IT Be a Haven for Hackers:
2© 2015 IBM Corporation
Today’s panelists
Leslie Kittredge
Portfolio Marketing Manager
IBM Security Services
Linked In: https://www.linkedin.com/in/lkittredge
Mike Montecillo
Director of Security Intelligence, North America
IBM Security Services
Twitter: @Montejam
3© 2015 IBM Corporation
Agenda  Security Challenges of the New Hybrid IT Environment
 Optimizing Hybrid IT Operations Means Rethinking IT
Security
 IBM Defines Next-Generation Managed Security
Services
© 2015 IBM Corporation
Security Challenges of the New Hybrid IT
Environment
5© 2015 IBM Corporation
Organizations turn to outside
resources to fill in the gaps
 Integrators
 Managed Service Providers
 Contractors
 Consultants
Hybrid IT operations mean greater
flexibility and innovation
But what about security?
Increasingly, enterprise IT complexity demands a hybrid
approach
6© 2015 IBM Corporation
Security is a compound challenge
Attacks are increasing1….
More than 81,000,000security events
More than 1,000,000,000records leaked
…as the security skills shortage
is becoming more acute2
7© 2015 IBM Corporation
Conventional practices and processes have reached their limit
Traditional single-threaded response is reactive
—and is becoming over-taxed in a real-time, high-
volume threat environment
Security administration is a growing burden
Hybrid IT also means hybrid security—with “point”
solutions from dozens of vendors
 Different expertise required for each vendor
 Conflicting policies that create security gaps
 Monitoring it all is a challenge
 More complicated audit process
8© 2015 IBM Corporation
The urgent need for rapid response and better intelligence
Security attacks are a certainty
 Attacks are increasing in frequency and
sophistication
 No longer a matter of if or when—but how often
and how severe?
 How to respond faster and more effectively to
protect sensitive data and systems?
 How to better anticipate—and avert—attacks?
9© 2015 IBM Corporation
The upward creep of IT security budgets continues
Security budgets increase by double-
digits—even as IT budgets remain nearly
flat overall
46%of IT leaders said that they
will invest more in 2015 on security
Source: 2014 Deloitte-NASCIO Cybersecurity Study
Hybrid IT operations cannot be fully
optimized unless security spending is
stabilized
© 2015 IBM Corporation
Optimizing Hybrid IT Operations Means
Rethinking IT Security
11© 2015 IBM Corporation
The “have-it-all” security wish list
It must be open, yet secure: technology- and
data-agnostic, and extensible to securely incorporate cloud, the Internet of
Things, and mobile and social platforms
It must be dynamic, yet with industrial
strength: on-demand hybrid security, with the ability to provide
security anywhere, anytime, anyway—and a flexible level of management that
can provide hardened support
It must be global, yet personal: accessing
capabilities and security intelligence at a global level, which can be applied
to optimize a client’s security posture at a personal level
12© 2015 IBM Corporation
On-premise, managed, and hosted security functions should
perform like they are all part of a single platform
The ideal unified hybrid platform:
 Aggregates, normalizes and presents
data from hundreds of different
platforms
 Unifies the view of all security
functions—presenting them via a
“single pane of glass,”
 Integrates global threat research and
intelligence
 Enables simple and affordable
upgrades to SIEM and other big-
insight and visualizations capabilities,
including Cognos, Hadoop and other
advanced solutions
13© 2015 IBM Corporation
The answer: a next-gen MSS model with four essential
components
1. Comprehensive Threat Insight
Combine advanced solutions of Big Data, visualization
and analytics to proactively manage and avert threats.
 Access to comprehensive global intelligence on
current and emerging threats
 Research and threat analysis
– Combines human expertise with advanced
research tools
– Correlates intelligence findings with evidence
of malicious activity around the world into an
actionable plan
– Yields dramatically improved risk and threat
prioritization
 Cross-enterprise data capability
• Stores and retrieves structured and
unstructured data sets related to threats
• Provides a platform for advanced data
analytics capabilities
 Real-time hybrid data integration
14© 2015 IBM Corporation
2. On-demand services/expertise
 Intelligent, Cloud-based Log Management
Capabilities
– Hybrid IT-friendly, on-demand
– Support for hundreds of platforms
 Full spectrum of security services (application
security, endpoint, mobile, etc.)
– Most current technologies
– Incorporating industry best practices
 Depth/breadth of IT security skills for all services
– Analysis
– Integration
– Monitoring
– Response Management
– Incident response planning and remediation
The answer: a next-gen MSS model with four essential
components
15© 2015 IBM Corporation
The answer: a next-gen MSS model with four essential
components
3. Multiple delivery options
By offering improved flexibility in choosing the “how,
when and who” of security deployment, the new MSS
model can allow enterprises to maximize efficiencies
and control costs.
Options should include:
 Systems Integration
 Software as a Service (SaaS)
 Customer Premise Equipment (CPE)
 Consulting
 Any combination of the above
16© 2015 IBM Corporation
4. Unified Visibility and Control of the
Security Environment
 The new generation of hybrid IT security must be
viewed and managed as coherent, unified
enterprise system
 Must eliminate administrative complexity
 Should offer consistency, regardless of changes
and upgrades throughout the hybrid security
infrastructure
The answer: a next-gen MSS model with four essential
components
© 2015 IBM Corporation
IBM Defines Next-Generation Managed
Security Services
18© 2015 IBM Corporation
Introducing The
IBM Threat Insight Platform
The next-generation Managed Security Services model
19© 2015 IBM Corporation
The managed security approach that enables and optimizes hybrid IT operations
 Combines IBM global research, patents, consulting and security analyst expertise
 Uses common standards, a common language and architecture to support 400 platforms and
a large variety of third-party threat intelligence feeds
 Requires less security hardware, licenses, maintenance and expert security resources for
management and monitoring
 Provides a “single pane of glass” to view the entire enterprise security posture
 Provides a gateway to increasingly sophisticated SIEM capabilities, without requiring full
implementation of a SIEM solution
 Enterprises can pay for the level of security they use as an operational expense, eliminating
the need for hardware and other capital expenditures for log management
The IBM Threat Insight Platform
20© 2015 IBM Corporation
• Security devices
• Servers and mainframes
• Network and virtual activity
• Data and application activity
• Configuration information
• Vulnerabilities and threats
• Users and identities
CloudOn Premise
At the heart – IBM Intelligent Log Management
 A gateway to increasingly sophisticated SIEM
capabilities, without requiring the
implementation of a full SIEM solution.
 Enterprises pay for the level of security they
use as an operational expense—eliminating the
need for hardware and other capital
expenditures for log management.
 Scalable deployment options designed to meet
the needs of dynamic, hybrid IT environments.
The IBM Threat Insight Platform
21© 2015 IBM Corporation
Comprehensive, centralized functionality
1. Real-time hybrid data integration – Real-time collection, integration and monitoring across a global data
volume of billions of events per day
2. Global cross-enterprise visibility – Affords massive scale and versatility to store and retrieve structured
and unstructured data sets; provides a platform for advanced data science capabilities
3. Threat research and visualization – Dynamic, visual investigative interface; enables dynamic relationship
building and new insights
4. Intelligence, insight and Analytics –
Combines human expertise with
IBM advanced research tools;
correlates intelligence findings with
evidence of malicious activity
among IBM customers worldwide
5. Customer Security Center –
Acts as the user interface for all
security services, providing
dashboards, analytics, logs,
reporting, security management
and chat functions for both mobile
and desktop users expenditures
for log management
The IBM Threat Insight Platform
22© 2015 IBM Corporation
At the heart – IBM Intelligent Log Management
 The ability to quickly identify and remediate events with robust security intelligence and
incident forensics
 An integrated solution that collects, correlates and reports security data from various
siloes
 Reduced cost and more accurate risk predictions
 Offloaded security event monitoring and device management, enabling internal
resources to focus on expanding business capabilities
 Detection of insider fraud with the adoption of next-generation SIEM with identity
correlation
 Automated data collection and configuration audits to more easily address regulatory
The advantages
23© 2015 IBM Corporation
Making security more automated and predictive
The advantages
24© 2015 IBM Corporation
The advantages
Measurable returns
Based on data from IBM client engagements
25© 2015 IBM Corporation
IBM Security is built on the best in global capability and scale
monitored countries (MSS)
service delivery experts
endpoints protected
+
events managed per day
+
IBM Security by the Numbers
+
+
26© 2015 IBM Corporation
Transformation Programs
Security Strategy, Risk and Compliance
Security Intelligence and Optimization
Cyber Security Assessment and Response
Identity and Access Management
Application and Data Security
Infrastructure and Endpoint Security
• Strategy and Planning
• Security Framework and Risk Assessments
• Automated GRC and IT Risk Management
• Security Operations Consulting
• Security Intelligence Programs
• Managed and Monitored SIEM Services
• Penetration Testing
• Incident Response and Planning
• Advanced Threat Assessments
• Identity & Access Strategy & Design
• Managed and Cloud Identity Services
• Identity Governance and Authorization
• Critical Data Protection
• Data Discovery and Classification
• Data Security Design & Deploy
• 24x7 Security Infrastructure Monitoring
• Security Infrastructure Management
• Vulnerability Management
Consulting
Managed
Services
Cloud
Services
System
Integration
IBM
Security
Solutions
Security Services operates as a globally integrated practice
Providing expertise to help clients from strategy through operate
27© 2015 IBM Corporation
Transformation Programs
Security Operations
Modernization
Advanced Threat
Protection
End-to-End
Identity Services
Critical Data
Protection
Automated GRC &
IT Risk Management
Security Strategy,
Assessment & Design
Enabling clients to achieve their critical transformation needs
Delivering end-to-end services with global expertise to address complex security challenges
28© 2015 IBM Corporation
IBM can help chart the course
Learn more! Download the
Optimize Your Security Program white
paper
Contact your IBM sales representative for a consultation on:
 Building a road map to Optimize Your Security Program
Download the infographic
Rethinking IT Security
29© 2015 IBM Corporation
Learn more about IBM Security
V2015-07-29
133 countries where IBM delivers
managed security services
24 industry analyst reports rank
IBM Security as a LEADER
TOP 2 enterprise security software
vendor in total revenue
12K clients protected including…
22 of the top 29 banks in Japan,
North America, and Europe
Visit our website
IBM Security Website
Watch our videos on YouTube
IBM Security Channel
Read new blog posts
SecurityIntelligence.com
Follow us on Twitter
@ibmsecurity
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any
damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and
conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or
capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other
IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being
altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can
be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other
systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF
ANY PARTY.
THANK YOU
www.ibm.com/security
31© 2015 IBM Corporation
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response
to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated
or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure
and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to
be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems,
products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE
MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
© IBM Corporation 2015
 IBM, the IBM logo, ibm.com and X-Force are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other
product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at “Copyright
and trademark information” at www.ibm.com/legal/copytrade.shtml
 Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.
 UNIX is a registered trademark of The Open Group in the United States and other countries.
 Not all offerings are available in every country in which IBM operates. This document is current as of the initial date of publication and may be
changed by IBM at any time.
 THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT
ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-
INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided.
Trademarks and notes
SEP03337-USEN-00

Más contenido relacionado

Destacado

Gamification of your Global Information Security Operations Center - RSA 2015
Gamification of your Global Information Security Operations Center - RSA 2015Gamification of your Global Information Security Operations Center - RSA 2015
Gamification of your Global Information Security Operations Center - RSA 2015Morphick
 
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Kenneth de Brucq
 
Rapid7 NERC-CIP Compliance Guide
Rapid7 NERC-CIP Compliance GuideRapid7 NERC-CIP Compliance Guide
Rapid7 NERC-CIP Compliance GuideRapid7
 
Le gouvernement électronique au Togo : Etat des lieux et prospectives
Le gouvernement électronique au Togo : Etat des lieux et prospectivesLe gouvernement électronique au Togo : Etat des lieux et prospectives
Le gouvernement électronique au Togo : Etat des lieux et prospectivesEASY EGOV
 
Information Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesInformation Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesJorge Sebastiao
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples CounselingAtif Ghauri
 
To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015Paul Hogan
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze DataExchangeAgency
 
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture - Making the Move: Enabling Security in the CloudAlert Logic
 
Data Consult - Managed Security Services
Data Consult - Managed Security ServicesData Consult - Managed Security Services
Data Consult - Managed Security ServicesJad Bejjani
 

Destacado (13)

Gamification of your Global Information Security Operations Center - RSA 2015
Gamification of your Global Information Security Operations Center - RSA 2015Gamification of your Global Information Security Operations Center - RSA 2015
Gamification of your Global Information Security Operations Center - RSA 2015
 
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
 
Forrester Emerging MSSP Wave
Forrester Emerging MSSP WaveForrester Emerging MSSP Wave
Forrester Emerging MSSP Wave
 
Rapid7 NERC-CIP Compliance Guide
Rapid7 NERC-CIP Compliance GuideRapid7 NERC-CIP Compliance Guide
Rapid7 NERC-CIP Compliance Guide
 
Le gouvernement électronique au Togo : Etat des lieux et prospectives
Le gouvernement électronique au Togo : Etat des lieux et prospectivesLe gouvernement électronique au Togo : Etat des lieux et prospectives
Le gouvernement électronique au Togo : Etat des lieux et prospectives
 
Information Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesInformation Security Cost Effective Managed Services
Information Security Cost Effective Managed Services
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples Counseling
 
To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
 
Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
 
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
 
Data Consult - Managed Security Services
Data Consult - Managed Security ServicesData Consult - Managed Security Services
Data Consult - Managed Security Services
 

Más de IBM Security

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackIBM Security
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationIBM Security
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?IBM Security
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...IBM Security
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowIBM Security
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats IBM Security
 

Más de IBM Security (20)

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 

Último

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Último (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Don't Let Hybrid IT be a Haven for Hackers: The Case for Next Generation Managed Security Services

  • 1. © 2015 IBM Corporation The Case for Next-Generation Managed Security Services Speakers: Leslie Kittredge – IBM Security Mike Montecillo – IBM Security Don’t Let Hybrid IT Be a Haven for Hackers:
  • 2. 2© 2015 IBM Corporation Today’s panelists Leslie Kittredge Portfolio Marketing Manager IBM Security Services Linked In: https://www.linkedin.com/in/lkittredge Mike Montecillo Director of Security Intelligence, North America IBM Security Services Twitter: @Montejam
  • 3. 3© 2015 IBM Corporation Agenda  Security Challenges of the New Hybrid IT Environment  Optimizing Hybrid IT Operations Means Rethinking IT Security  IBM Defines Next-Generation Managed Security Services
  • 4. © 2015 IBM Corporation Security Challenges of the New Hybrid IT Environment
  • 5. 5© 2015 IBM Corporation Organizations turn to outside resources to fill in the gaps  Integrators  Managed Service Providers  Contractors  Consultants Hybrid IT operations mean greater flexibility and innovation But what about security? Increasingly, enterprise IT complexity demands a hybrid approach
  • 6. 6© 2015 IBM Corporation Security is a compound challenge Attacks are increasing1…. More than 81,000,000security events More than 1,000,000,000records leaked …as the security skills shortage is becoming more acute2
  • 7. 7© 2015 IBM Corporation Conventional practices and processes have reached their limit Traditional single-threaded response is reactive —and is becoming over-taxed in a real-time, high- volume threat environment Security administration is a growing burden Hybrid IT also means hybrid security—with “point” solutions from dozens of vendors  Different expertise required for each vendor  Conflicting policies that create security gaps  Monitoring it all is a challenge  More complicated audit process
  • 8. 8© 2015 IBM Corporation The urgent need for rapid response and better intelligence Security attacks are a certainty  Attacks are increasing in frequency and sophistication  No longer a matter of if or when—but how often and how severe?  How to respond faster and more effectively to protect sensitive data and systems?  How to better anticipate—and avert—attacks?
  • 9. 9© 2015 IBM Corporation The upward creep of IT security budgets continues Security budgets increase by double- digits—even as IT budgets remain nearly flat overall 46%of IT leaders said that they will invest more in 2015 on security Source: 2014 Deloitte-NASCIO Cybersecurity Study Hybrid IT operations cannot be fully optimized unless security spending is stabilized
  • 10. © 2015 IBM Corporation Optimizing Hybrid IT Operations Means Rethinking IT Security
  • 11. 11© 2015 IBM Corporation The “have-it-all” security wish list It must be open, yet secure: technology- and data-agnostic, and extensible to securely incorporate cloud, the Internet of Things, and mobile and social platforms It must be dynamic, yet with industrial strength: on-demand hybrid security, with the ability to provide security anywhere, anytime, anyway—and a flexible level of management that can provide hardened support It must be global, yet personal: accessing capabilities and security intelligence at a global level, which can be applied to optimize a client’s security posture at a personal level
  • 12. 12© 2015 IBM Corporation On-premise, managed, and hosted security functions should perform like they are all part of a single platform The ideal unified hybrid platform:  Aggregates, normalizes and presents data from hundreds of different platforms  Unifies the view of all security functions—presenting them via a “single pane of glass,”  Integrates global threat research and intelligence  Enables simple and affordable upgrades to SIEM and other big- insight and visualizations capabilities, including Cognos, Hadoop and other advanced solutions
  • 13. 13© 2015 IBM Corporation The answer: a next-gen MSS model with four essential components 1. Comprehensive Threat Insight Combine advanced solutions of Big Data, visualization and analytics to proactively manage and avert threats.  Access to comprehensive global intelligence on current and emerging threats  Research and threat analysis – Combines human expertise with advanced research tools – Correlates intelligence findings with evidence of malicious activity around the world into an actionable plan – Yields dramatically improved risk and threat prioritization  Cross-enterprise data capability • Stores and retrieves structured and unstructured data sets related to threats • Provides a platform for advanced data analytics capabilities  Real-time hybrid data integration
  • 14. 14© 2015 IBM Corporation 2. On-demand services/expertise  Intelligent, Cloud-based Log Management Capabilities – Hybrid IT-friendly, on-demand – Support for hundreds of platforms  Full spectrum of security services (application security, endpoint, mobile, etc.) – Most current technologies – Incorporating industry best practices  Depth/breadth of IT security skills for all services – Analysis – Integration – Monitoring – Response Management – Incident response planning and remediation The answer: a next-gen MSS model with four essential components
  • 15. 15© 2015 IBM Corporation The answer: a next-gen MSS model with four essential components 3. Multiple delivery options By offering improved flexibility in choosing the “how, when and who” of security deployment, the new MSS model can allow enterprises to maximize efficiencies and control costs. Options should include:  Systems Integration  Software as a Service (SaaS)  Customer Premise Equipment (CPE)  Consulting  Any combination of the above
  • 16. 16© 2015 IBM Corporation 4. Unified Visibility and Control of the Security Environment  The new generation of hybrid IT security must be viewed and managed as coherent, unified enterprise system  Must eliminate administrative complexity  Should offer consistency, regardless of changes and upgrades throughout the hybrid security infrastructure The answer: a next-gen MSS model with four essential components
  • 17. © 2015 IBM Corporation IBM Defines Next-Generation Managed Security Services
  • 18. 18© 2015 IBM Corporation Introducing The IBM Threat Insight Platform The next-generation Managed Security Services model
  • 19. 19© 2015 IBM Corporation The managed security approach that enables and optimizes hybrid IT operations  Combines IBM global research, patents, consulting and security analyst expertise  Uses common standards, a common language and architecture to support 400 platforms and a large variety of third-party threat intelligence feeds  Requires less security hardware, licenses, maintenance and expert security resources for management and monitoring  Provides a “single pane of glass” to view the entire enterprise security posture  Provides a gateway to increasingly sophisticated SIEM capabilities, without requiring full implementation of a SIEM solution  Enterprises can pay for the level of security they use as an operational expense, eliminating the need for hardware and other capital expenditures for log management The IBM Threat Insight Platform
  • 20. 20© 2015 IBM Corporation • Security devices • Servers and mainframes • Network and virtual activity • Data and application activity • Configuration information • Vulnerabilities and threats • Users and identities CloudOn Premise At the heart – IBM Intelligent Log Management  A gateway to increasingly sophisticated SIEM capabilities, without requiring the implementation of a full SIEM solution.  Enterprises pay for the level of security they use as an operational expense—eliminating the need for hardware and other capital expenditures for log management.  Scalable deployment options designed to meet the needs of dynamic, hybrid IT environments. The IBM Threat Insight Platform
  • 21. 21© 2015 IBM Corporation Comprehensive, centralized functionality 1. Real-time hybrid data integration – Real-time collection, integration and monitoring across a global data volume of billions of events per day 2. Global cross-enterprise visibility – Affords massive scale and versatility to store and retrieve structured and unstructured data sets; provides a platform for advanced data science capabilities 3. Threat research and visualization – Dynamic, visual investigative interface; enables dynamic relationship building and new insights 4. Intelligence, insight and Analytics – Combines human expertise with IBM advanced research tools; correlates intelligence findings with evidence of malicious activity among IBM customers worldwide 5. Customer Security Center – Acts as the user interface for all security services, providing dashboards, analytics, logs, reporting, security management and chat functions for both mobile and desktop users expenditures for log management The IBM Threat Insight Platform
  • 22. 22© 2015 IBM Corporation At the heart – IBM Intelligent Log Management  The ability to quickly identify and remediate events with robust security intelligence and incident forensics  An integrated solution that collects, correlates and reports security data from various siloes  Reduced cost and more accurate risk predictions  Offloaded security event monitoring and device management, enabling internal resources to focus on expanding business capabilities  Detection of insider fraud with the adoption of next-generation SIEM with identity correlation  Automated data collection and configuration audits to more easily address regulatory The advantages
  • 23. 23© 2015 IBM Corporation Making security more automated and predictive The advantages
  • 24. 24© 2015 IBM Corporation The advantages Measurable returns Based on data from IBM client engagements
  • 25. 25© 2015 IBM Corporation IBM Security is built on the best in global capability and scale monitored countries (MSS) service delivery experts endpoints protected + events managed per day + IBM Security by the Numbers + +
  • 26. 26© 2015 IBM Corporation Transformation Programs Security Strategy, Risk and Compliance Security Intelligence and Optimization Cyber Security Assessment and Response Identity and Access Management Application and Data Security Infrastructure and Endpoint Security • Strategy and Planning • Security Framework and Risk Assessments • Automated GRC and IT Risk Management • Security Operations Consulting • Security Intelligence Programs • Managed and Monitored SIEM Services • Penetration Testing • Incident Response and Planning • Advanced Threat Assessments • Identity & Access Strategy & Design • Managed and Cloud Identity Services • Identity Governance and Authorization • Critical Data Protection • Data Discovery and Classification • Data Security Design & Deploy • 24x7 Security Infrastructure Monitoring • Security Infrastructure Management • Vulnerability Management Consulting Managed Services Cloud Services System Integration IBM Security Solutions Security Services operates as a globally integrated practice Providing expertise to help clients from strategy through operate
  • 27. 27© 2015 IBM Corporation Transformation Programs Security Operations Modernization Advanced Threat Protection End-to-End Identity Services Critical Data Protection Automated GRC & IT Risk Management Security Strategy, Assessment & Design Enabling clients to achieve their critical transformation needs Delivering end-to-end services with global expertise to address complex security challenges
  • 28. 28© 2015 IBM Corporation IBM can help chart the course Learn more! Download the Optimize Your Security Program white paper Contact your IBM sales representative for a consultation on:  Building a road map to Optimize Your Security Program Download the infographic Rethinking IT Security
  • 29. 29© 2015 IBM Corporation Learn more about IBM Security V2015-07-29 133 countries where IBM delivers managed security services 24 industry analyst reports rank IBM Security as a LEADER TOP 2 enterprise security software vendor in total revenue 12K clients protected including… 22 of the top 29 banks in Japan, North America, and Europe Visit our website IBM Security Website Watch our videos on YouTube IBM Security Channel Read new blog posts SecurityIntelligence.com Follow us on Twitter @ibmsecurity
  • 30. © Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. THANK YOU www.ibm.com/security
  • 31. 31© 2015 IBM Corporation Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. © IBM Corporation 2015  IBM, the IBM logo, ibm.com and X-Force are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml  Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.  UNIX is a registered trademark of The Open Group in the United States and other countries.  Not all offerings are available in every country in which IBM operates. This document is current as of the initial date of publication and may be changed by IBM at any time.  THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON- INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. Trademarks and notes SEP03337-USEN-00