SlideShare una empresa de Scribd logo
1 de 30
© 2015 IBM Corporation
IBM Security
1© 2015 IBM Corporation
IBM SECURITY QRADAR FOR SERVICE
PROVIDERS Extending Market Reach Through Multi-
Tenancy & SaaS
Vijay Dheap
Global Product Manager
QRadar
© 2015 IBM Corporation
IBM Security
2
Agenda
 Motivations
 QRadar Multi-Tenancy
 QRadar Master Console
 Security Intelligence on Cloud
 Partnering with IBM
3 © 2014 IBM Corporation
Motivations
Making Security Intelligence Accessible
© 2015 IBM Corporation
IBM Security
4
It’s A Not So Friendly Cyber World…and Many are Ill-Equipped
Risks abound and cost continues to grow
Limitations in even grasping an
organization’s security posture
constraints the ability to adapt it…
© 2015 IBM Corporation
IBM Security
5
Organizations of All Sizes Plan on Raising their Basic Security IQ
Growing Demand needs to be served by the the Best in Class solution – QRadar and Service
Providers provide not just the reach but also the expertise to onboard and support these
organizations on their security intelligence journey
© 2015 IBM Corporation
IBM Security
6
Service Provider Requirements to Serve this Market Demand
 Offer range of security intelligence
capabilities from basic to advanced to meet
diverse spectrum of client needs
• Log Management
• SIEM
• Risk and vulnerability management
• Network, app, and service usage visibility
 Adaptive deployment options depending on
client size and scale
• Dedicated environments for large institutions
• Shared infrastructure for small/mid-size
organizations
 Deliver rapid time-to-value
• Quick deployment
• Built-in intelligence
• Out-of-the-box integrations
 Minimize operational infrastructure costs
and improve staff productivity
• Multi-tenancy
• Cloud delivery options
• Centralized dashboard
© 2015 IBM Corporation
IBM Security
7
Helping Service Providers Broaden Reach of Security Intelligence
Service Providers can extend Tier 1 security
intelligence capabilities to small & mid-size
organizations leveraging multi-tenancy
Customer A Customer B Customer C
Customer D
Master Console
Service Providers can gain
centralized visibility to multiple,
diverse QRadar deployments – multi-
tenant, or dedicated
Customer E
Service Providers can either deploy QRadar
in the cloud or resell IBM Security
Intelligence on Cloud Offering to minimize
capital expenditures and offer an operating
expense model for security intelligence for
their customers
NewNew
NewNew
NewNew
8 © 2014 IBM Corporation
QRadar Multi-Tenancy
© 2015 IBM Corporation
IBM Security
9
MULTI-TENANT
enables secure, rapid
and cost effective
delivery of security
intelligence services
Multi-Tenant QRadar for Managed Security Service Providers
Scalable appliance
architecture
Shared modular
infrastructure
 New centralized views and incident management
 Mixed single- and multi-tenanted deployment options
 True horizontal, snap-on scalability capabilities
 Extensive APIs for enterprise integration
 System configuration template support
 Cloud ready with support for 400+ out-of-the-box devices
Significant new capabilities
to help Service Providers
bring security to customers
IBM Security QRadar is:
AUTOMATED
drives simplicity and
accelerates time-to-
value for service
providers
SCALABLE
scales from smallest to
largest customers with
centralized management
of single- and multi-
tenanted systems
INTELLIGENT AUTOMATED INTEGRATED
© 2015 IBM Corporation
IBM Security
10
Introducing the Domain Concept
Domains are building blocks for multi-tenant QRadar
Allows for segregating overlapping IPs
Enables categorizing sources of security data (ex. events, flows) into different sets
Facilitates monitoring and analysis of one or more subsets to attain granular visibility
Domains can be defined at three levels:
Domain ADomain A Domain BDomain B
Collector-level
Collectors (events or flows) are
used to distinguish among domains
Source-level
Domain ADomain A
Source 1Source 1
Source 2Source 2
Domain BDomain B
Source 3Source 3
Properties-level
Log Source 4Log Source 4
Domain ADomain A
Property iProperty i
Domain BDomain B
Property iiProperty ii
Property iiiProperty iii
Sources (log or flow) possibly
aggregated by the same collector
can be specified as belonging to
different domains
Specific events within a log source
can be associated to various
domains
Increasing Priority
© 2015 IBM Corporation
IBM Security
11
Automatic Detection & The Default Domain
When no dedicated event collectors are assigned, new log
sources are automatically detected and assigned to the default
domain allowing Service Provider admin or global admin to make
the domain assignment (if desired)
Prevents data leakage and enforces data separation across
domains
When dedicated event
collectors are assigned to a
unique domain, new log
sources are automatically
detected and assigned to that
domain
Domain ADomain A Domain BDomain B
Collector-level Source-level
Domain ADomain A
Source 1Source 1
Source 2Source 2
Domain BDomain B
Source 3Source 3
Properties-level
Log Source 4Log Source 4
Domain ADomain A
Property iProperty i
Domain BDomain B
Property iiProperty ii
Property iiiProperty iii
© 2015 IBM Corporation
IBM Security
12
Domain Data Available in QRadar
© 2015 IBM Corporation
IBM Security
13
Domain Support in Rules
 Custom rules engine is now
domain-aware,
automatically isolating
correlations from different
domains
 New domain test allows for
cross domain correlations if
desired or necessary
© 2015 IBM Corporation
IBM Security
14
Domain Support in Offenses
 Domain information carried all the way through offense
© 2015 IBM Corporation
IBM Security
15
Domain Support Within Asset Model
 Each asset is assigned to a domain
 Assets can have overlapping IP addresses
© 2015 IBM Corporation
IBM Security
16
Domain Support for Security Profiles
 Security Profile can be
restricted to one or
more domains
 Security Profile will
restrict access to
flows, events, assets,
and offenses based on
domain
© 2015 IBM Corporation
IBM Security
17
Controlled Access to Domains
New User Security Profiles can be instantiated to control access to domain data:
Enables defining user access rights to one or more domains
Allows for delegation of responsibilities across domains
Facilitates defining domain specific visibility
Domain ADomain A Domain BDomain B
Once domains are defined, the next step is to control user privileges to those domains
Process in the QRadar Admin Console:
1.Define Security Profiles for the Domains
2.Associate users from those domains to the appropriate security profiles
© 2015 IBM Corporation
IBM Security
18
Vulnerability Management on a Domain Level
QRadar Vulnerability Manager allows asset
profiles to be denoted with domain
categorizations for exported scan results
Domain is defined per scanner for dynamic
scanning
Domain is a selectable criteria when filtering
results
Credentials controlled through the user’s
security profile relating to the domain specified
Saved searches for scan results will return
assets that also match domain visibility of the
user
Note a key value proposition of QRadar Vulnerability Manager is that scanners can be enabled
on the deployed QRadar infrastructure without incurring additional infrastructure overhead.
© 2015 IBM Corporation
IBM Security
19
Summarizing QRadar Multi-Tenancy Capabilities for Service Providers
 Supports multiple customers within single QRadar
instance
 Guarantees separate correlation processing for each
client’s security data
 Restricts client visibility to only their security data –
logs, flows, offenses etc.
 Permits vulnerability scan data sharing across all
clients associated within common domain
 Facilitates simplified system administration of all
client domains
20 © 2014 IBM Corporation
QRadar Master Console
© 2015 IBM Corporation
IBM Security
21
Master Console: A Single View Across Multiple QRadar Deployments
Centralized health view and system
monitoring
Additional planned capabilities:
• Centralized offense view and management
• Content Management
o Log Source Management
o Rules
o Reports
o Saved Searches
o Dashboards
• User Accounts
• Federated Search
• Seat Management
Network A Network B Network C Network D Network E
Multi-tenant QRadar deployment
IBM Security Intelligence on Cloud
© 2015 IBM Corporation
IBM Security
22
Facilitating Access to Underlying QRadar Deployments
Pass-through APIs
Customer A
Customer B
Analyst
Service Provider analyst can
employ Master Console Pass-
through APIs to programmatically
invoke QRadar APIs and build
custom applications
Click-through Log-in
Customer A
Customer B
Service Provider analyst can
log-in to specific QRadar
deployment (managed from the
Master Console) to get
additional details needed for an
investigative process
© 2015 IBM Corporation
IBM Security
23
Deploying Master Console
 Master Console software package included in QRadar ISO at no additional cost –
updates provided via fix central
 Installs on Service Provider’s own hardware, VM or cloud instance using 8500
activation key - recommended specifications equivalent to QRadar 3105 hardware
appliance
24 © 2014 IBM Corporation
IBM Security Intelligence on Cloud
© 2015 IBM Corporation25
IBM Security Systems
IBM Security Intelligence on Cloud
Service Highlights
• Security Intelligence as a Service
• X-Force Exchange integration
• Physically segregated client data
• Real time & historical correlation of
assets, events, and vulnerabilities
• Advanced threat detection
• Configurable SOC and management
dashboards
• Supports integrations of 450+
security & IT solutions
• Seamless integration with IBM
Global SOC for additional Security
Services
Secure
robust
channel
Software
Gateways
Professionally deployed and managed solution
enabling organizations and Service Providers
to focus on monitoring security intelligence
operations
Professionally deployed and managed solution
enabling organizations and Service Providers
to focus on monitoring security intelligence
operations
Security Intelligence
26 © 2014 IBM Corporation
Partnering with IBM
© 2015 IBM Corporation
IBM Security
27
Go-To-Market Options
Application Specific Licensing (ASL)
Appliances or software (including virtual appliances)
Support either perpetual license or monthly payments
• Zero upfront costs – pay only for EPS or Flows consumed
by customers every month or quarterly
• Earn discounts – as business pipeline scales earn
discounted pricing or specify commitments to get
discounted price up front
Removes restriction on how EPS and Flows are
allocated across two or more customers
Current, standard processes remain in place to establish
an ASL agreement
Resell
Appliances, software (including virtual appliances), or
SaaS (IBM Security Intelligence on Cloud)
Collaborate with IBM to design and develop your
marketing material
Realize built-in margin and complement with value
added services
Current, standard processes remain in place to establish
a Reseller agreement
© 2015 IBM Corporation
IBM Security
28
IBM Value Proposition for Service Providers
 Best-in-Class Security Intelligence solution with flexibility to meet
your needs
• Full spectrum of Security Intelligence capabilities
• On-premise or Cloud delivery
• Dedicated environment or multi-tenant
• Horizontally scalable
 Choice of Go-to-Market options to suit various business models
• Minimize up-front costs
• Maximize margins
• Maintain customer relationships
 Rapid Time-to-Value
• Simplified deployment options
• Out-of-the-box security content and integrations
 Platform for adding high-value services in cost-effective and
streamlined fashion
• Tailored security building blocks
• Single Pane of Glass for security monitoring and management
© 2015 IBM Corporation
IBM Security
29
Contact your Local IBM Representative
Middle East & Africa
Jean-Luc Labbe
jean-luc.labbe@it.ibm.com
North America
Chad Kinter
ckinter@us.ibm.com
Europe
Serge Richard
serge.richard@fr.ibm.com
Asia Pacific
John SK Chai
chaiskj@sg.ibm.com
Worldwide Sales
Bill Wallace
bwallac@us.ibm.com
© 2015 IBM Corporation
IBM Security
30
www.ibm.com/security
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes
only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use
of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any
warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement
governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in
all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole
discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any
way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United
States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and
response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed,
misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product
should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper
use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily
involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT
THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE
MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

Más contenido relacionado

La actualidad más candente

Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesIvanti
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation finalRizwan S
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehReZa AdineH
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1Priyanka Aash
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 
IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.Avishek Priyadarshi
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilientPrime Infoserv
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services OverviewCasey Lucas
 
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)Iftikhar Ali Iqbal
 
IPS (intrusion prevention system)
IPS (intrusion prevention system)IPS (intrusion prevention system)
IPS (intrusion prevention system)Netwax Lab
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)k33a
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence pptKumar Gaurav
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...Raffael Marty
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityMarketingArrowECS_CZ
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM AlienVault
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتReZa AdineH
 

La actualidad más candente (20)

Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation Slides
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
 
IPS (intrusion prevention system)
IPS (intrusion prevention system)IPS (intrusion prevention system)
IPS (intrusion prevention system)
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud Security
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 

Similar a Extend Your Market Reach with IBM Security QRadar for MSPs

Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityIBM Security
 
QRadar_on_Cloud_client_presentation.PPTX
QRadar_on_Cloud_client_presentation.PPTXQRadar_on_Cloud_client_presentation.PPTX
QRadar_on_Cloud_client_presentation.PPTXNatashaVerma29
 
IBM Softlayer ile bulutta 3. Boyut Bora Taşer IBM
IBM Softlayer ile bulutta 3. Boyut  Bora Taşer IBMIBM Softlayer ile bulutta 3. Boyut  Bora Taşer IBM
IBM Softlayer ile bulutta 3. Boyut Bora Taşer IBMWebrazzi
 
Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...
Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...
Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...hasimatwork
 
Interoute Intelligent Monitoring
Interoute Intelligent MonitoringInteroute Intelligent Monitoring
Interoute Intelligent MonitoringOnomi
 
IBM Softlayer Bluemix Marketplace
IBM Softlayer Bluemix MarketplaceIBM Softlayer Bluemix Marketplace
IBM Softlayer Bluemix MarketplaceSimon Baker
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureStefaan Van daele
 
Cloudy with SaaS-Shine 18march2015
Cloudy with SaaS-Shine 18march2015Cloudy with SaaS-Shine 18march2015
Cloudy with SaaS-Shine 18march2015Simon Baker
 
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019 Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019 Amazon Web Services
 
Webinar Fondazione CRUI e VMware: VMware vRealize Suite
 Webinar Fondazione CRUI e VMware: VMware vRealize Suite Webinar Fondazione CRUI e VMware: VMware vRealize Suite
Webinar Fondazione CRUI e VMware: VMware vRealize SuiteJürgen Ambrosi
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud ApplicationsIBM Security
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonDigital Catapult
 
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021VMware Tanzu
 
Deploying Cloud Use Cases
Deploying Cloud Use CasesDeploying Cloud Use Cases
Deploying Cloud Use CasesJason Singh
 
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Ping Identity
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...Amazon Web Services
 
L105704 ibm-cloud-private-z-cairo-v1902a
L105704 ibm-cloud-private-z-cairo-v1902aL105704 ibm-cloud-private-z-cairo-v1902a
L105704 ibm-cloud-private-z-cairo-v1902aTony Pearson
 
Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachProtecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachCA Technologies
 
PCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudPCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudControlCase
 

Similar a Extend Your Market Reach with IBM Security QRadar for MSPs (20)

Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 
QRadar_on_Cloud_client_presentation.PPTX
QRadar_on_Cloud_client_presentation.PPTXQRadar_on_Cloud_client_presentation.PPTX
QRadar_on_Cloud_client_presentation.PPTX
 
IBM Softlayer ile bulutta 3. Boyut Bora Taşer IBM
IBM Softlayer ile bulutta 3. Boyut  Bora Taşer IBMIBM Softlayer ile bulutta 3. Boyut  Bora Taşer IBM
IBM Softlayer ile bulutta 3. Boyut Bora Taşer IBM
 
Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...
Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...
Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...
 
Check Point and Accenture Webinar
Check Point and Accenture Webinar Check Point and Accenture Webinar
Check Point and Accenture Webinar
 
Interoute Intelligent Monitoring
Interoute Intelligent MonitoringInteroute Intelligent Monitoring
Interoute Intelligent Monitoring
 
IBM Softlayer Bluemix Marketplace
IBM Softlayer Bluemix MarketplaceIBM Softlayer Bluemix Marketplace
IBM Softlayer Bluemix Marketplace
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
 
Cloudy with SaaS-Shine 18march2015
Cloudy with SaaS-Shine 18march2015Cloudy with SaaS-Shine 18march2015
Cloudy with SaaS-Shine 18march2015
 
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019 Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
 
Webinar Fondazione CRUI e VMware: VMware vRealize Suite
 Webinar Fondazione CRUI e VMware: VMware vRealize Suite Webinar Fondazione CRUI e VMware: VMware vRealize Suite
Webinar Fondazione CRUI e VMware: VMware vRealize Suite
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud Applications
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
 
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
 
Deploying Cloud Use Cases
Deploying Cloud Use CasesDeploying Cloud Use Cases
Deploying Cloud Use Cases
 
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
 
L105704 ibm-cloud-private-z-cairo-v1902a
L105704 ibm-cloud-private-z-cairo-v1902aL105704 ibm-cloud-private-z-cairo-v1902a
L105704 ibm-cloud-private-z-cairo-v1902a
 
Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachProtecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data Breach
 
PCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudPCI DSS Compliance in the Cloud
PCI DSS Compliance in the Cloud
 

Más de IBM Security

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackIBM Security
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationIBM Security
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?IBM Security
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...IBM Security
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowIBM Security
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats IBM Security
 

Más de IBM Security (20)

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 

Último

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Último (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Extend Your Market Reach with IBM Security QRadar for MSPs

  • 1. © 2015 IBM Corporation IBM Security 1© 2015 IBM Corporation IBM SECURITY QRADAR FOR SERVICE PROVIDERS Extending Market Reach Through Multi- Tenancy & SaaS Vijay Dheap Global Product Manager QRadar
  • 2. © 2015 IBM Corporation IBM Security 2 Agenda  Motivations  QRadar Multi-Tenancy  QRadar Master Console  Security Intelligence on Cloud  Partnering with IBM
  • 3. 3 © 2014 IBM Corporation Motivations Making Security Intelligence Accessible
  • 4. © 2015 IBM Corporation IBM Security 4 It’s A Not So Friendly Cyber World…and Many are Ill-Equipped Risks abound and cost continues to grow Limitations in even grasping an organization’s security posture constraints the ability to adapt it…
  • 5. © 2015 IBM Corporation IBM Security 5 Organizations of All Sizes Plan on Raising their Basic Security IQ Growing Demand needs to be served by the the Best in Class solution – QRadar and Service Providers provide not just the reach but also the expertise to onboard and support these organizations on their security intelligence journey
  • 6. © 2015 IBM Corporation IBM Security 6 Service Provider Requirements to Serve this Market Demand  Offer range of security intelligence capabilities from basic to advanced to meet diverse spectrum of client needs • Log Management • SIEM • Risk and vulnerability management • Network, app, and service usage visibility  Adaptive deployment options depending on client size and scale • Dedicated environments for large institutions • Shared infrastructure for small/mid-size organizations  Deliver rapid time-to-value • Quick deployment • Built-in intelligence • Out-of-the-box integrations  Minimize operational infrastructure costs and improve staff productivity • Multi-tenancy • Cloud delivery options • Centralized dashboard
  • 7. © 2015 IBM Corporation IBM Security 7 Helping Service Providers Broaden Reach of Security Intelligence Service Providers can extend Tier 1 security intelligence capabilities to small & mid-size organizations leveraging multi-tenancy Customer A Customer B Customer C Customer D Master Console Service Providers can gain centralized visibility to multiple, diverse QRadar deployments – multi- tenant, or dedicated Customer E Service Providers can either deploy QRadar in the cloud or resell IBM Security Intelligence on Cloud Offering to minimize capital expenditures and offer an operating expense model for security intelligence for their customers NewNew NewNew NewNew
  • 8. 8 © 2014 IBM Corporation QRadar Multi-Tenancy
  • 9. © 2015 IBM Corporation IBM Security 9 MULTI-TENANT enables secure, rapid and cost effective delivery of security intelligence services Multi-Tenant QRadar for Managed Security Service Providers Scalable appliance architecture Shared modular infrastructure  New centralized views and incident management  Mixed single- and multi-tenanted deployment options  True horizontal, snap-on scalability capabilities  Extensive APIs for enterprise integration  System configuration template support  Cloud ready with support for 400+ out-of-the-box devices Significant new capabilities to help Service Providers bring security to customers IBM Security QRadar is: AUTOMATED drives simplicity and accelerates time-to- value for service providers SCALABLE scales from smallest to largest customers with centralized management of single- and multi- tenanted systems INTELLIGENT AUTOMATED INTEGRATED
  • 10. © 2015 IBM Corporation IBM Security 10 Introducing the Domain Concept Domains are building blocks for multi-tenant QRadar Allows for segregating overlapping IPs Enables categorizing sources of security data (ex. events, flows) into different sets Facilitates monitoring and analysis of one or more subsets to attain granular visibility Domains can be defined at three levels: Domain ADomain A Domain BDomain B Collector-level Collectors (events or flows) are used to distinguish among domains Source-level Domain ADomain A Source 1Source 1 Source 2Source 2 Domain BDomain B Source 3Source 3 Properties-level Log Source 4Log Source 4 Domain ADomain A Property iProperty i Domain BDomain B Property iiProperty ii Property iiiProperty iii Sources (log or flow) possibly aggregated by the same collector can be specified as belonging to different domains Specific events within a log source can be associated to various domains Increasing Priority
  • 11. © 2015 IBM Corporation IBM Security 11 Automatic Detection & The Default Domain When no dedicated event collectors are assigned, new log sources are automatically detected and assigned to the default domain allowing Service Provider admin or global admin to make the domain assignment (if desired) Prevents data leakage and enforces data separation across domains When dedicated event collectors are assigned to a unique domain, new log sources are automatically detected and assigned to that domain Domain ADomain A Domain BDomain B Collector-level Source-level Domain ADomain A Source 1Source 1 Source 2Source 2 Domain BDomain B Source 3Source 3 Properties-level Log Source 4Log Source 4 Domain ADomain A Property iProperty i Domain BDomain B Property iiProperty ii Property iiiProperty iii
  • 12. © 2015 IBM Corporation IBM Security 12 Domain Data Available in QRadar
  • 13. © 2015 IBM Corporation IBM Security 13 Domain Support in Rules  Custom rules engine is now domain-aware, automatically isolating correlations from different domains  New domain test allows for cross domain correlations if desired or necessary
  • 14. © 2015 IBM Corporation IBM Security 14 Domain Support in Offenses  Domain information carried all the way through offense
  • 15. © 2015 IBM Corporation IBM Security 15 Domain Support Within Asset Model  Each asset is assigned to a domain  Assets can have overlapping IP addresses
  • 16. © 2015 IBM Corporation IBM Security 16 Domain Support for Security Profiles  Security Profile can be restricted to one or more domains  Security Profile will restrict access to flows, events, assets, and offenses based on domain
  • 17. © 2015 IBM Corporation IBM Security 17 Controlled Access to Domains New User Security Profiles can be instantiated to control access to domain data: Enables defining user access rights to one or more domains Allows for delegation of responsibilities across domains Facilitates defining domain specific visibility Domain ADomain A Domain BDomain B Once domains are defined, the next step is to control user privileges to those domains Process in the QRadar Admin Console: 1.Define Security Profiles for the Domains 2.Associate users from those domains to the appropriate security profiles
  • 18. © 2015 IBM Corporation IBM Security 18 Vulnerability Management on a Domain Level QRadar Vulnerability Manager allows asset profiles to be denoted with domain categorizations for exported scan results Domain is defined per scanner for dynamic scanning Domain is a selectable criteria when filtering results Credentials controlled through the user’s security profile relating to the domain specified Saved searches for scan results will return assets that also match domain visibility of the user Note a key value proposition of QRadar Vulnerability Manager is that scanners can be enabled on the deployed QRadar infrastructure without incurring additional infrastructure overhead.
  • 19. © 2015 IBM Corporation IBM Security 19 Summarizing QRadar Multi-Tenancy Capabilities for Service Providers  Supports multiple customers within single QRadar instance  Guarantees separate correlation processing for each client’s security data  Restricts client visibility to only their security data – logs, flows, offenses etc.  Permits vulnerability scan data sharing across all clients associated within common domain  Facilitates simplified system administration of all client domains
  • 20. 20 © 2014 IBM Corporation QRadar Master Console
  • 21. © 2015 IBM Corporation IBM Security 21 Master Console: A Single View Across Multiple QRadar Deployments Centralized health view and system monitoring Additional planned capabilities: • Centralized offense view and management • Content Management o Log Source Management o Rules o Reports o Saved Searches o Dashboards • User Accounts • Federated Search • Seat Management Network A Network B Network C Network D Network E Multi-tenant QRadar deployment IBM Security Intelligence on Cloud
  • 22. © 2015 IBM Corporation IBM Security 22 Facilitating Access to Underlying QRadar Deployments Pass-through APIs Customer A Customer B Analyst Service Provider analyst can employ Master Console Pass- through APIs to programmatically invoke QRadar APIs and build custom applications Click-through Log-in Customer A Customer B Service Provider analyst can log-in to specific QRadar deployment (managed from the Master Console) to get additional details needed for an investigative process
  • 23. © 2015 IBM Corporation IBM Security 23 Deploying Master Console  Master Console software package included in QRadar ISO at no additional cost – updates provided via fix central  Installs on Service Provider’s own hardware, VM or cloud instance using 8500 activation key - recommended specifications equivalent to QRadar 3105 hardware appliance
  • 24. 24 © 2014 IBM Corporation IBM Security Intelligence on Cloud
  • 25. © 2015 IBM Corporation25 IBM Security Systems IBM Security Intelligence on Cloud Service Highlights • Security Intelligence as a Service • X-Force Exchange integration • Physically segregated client data • Real time & historical correlation of assets, events, and vulnerabilities • Advanced threat detection • Configurable SOC and management dashboards • Supports integrations of 450+ security & IT solutions • Seamless integration with IBM Global SOC for additional Security Services Secure robust channel Software Gateways Professionally deployed and managed solution enabling organizations and Service Providers to focus on monitoring security intelligence operations Professionally deployed and managed solution enabling organizations and Service Providers to focus on monitoring security intelligence operations Security Intelligence
  • 26. 26 © 2014 IBM Corporation Partnering with IBM
  • 27. © 2015 IBM Corporation IBM Security 27 Go-To-Market Options Application Specific Licensing (ASL) Appliances or software (including virtual appliances) Support either perpetual license or monthly payments • Zero upfront costs – pay only for EPS or Flows consumed by customers every month or quarterly • Earn discounts – as business pipeline scales earn discounted pricing or specify commitments to get discounted price up front Removes restriction on how EPS and Flows are allocated across two or more customers Current, standard processes remain in place to establish an ASL agreement Resell Appliances, software (including virtual appliances), or SaaS (IBM Security Intelligence on Cloud) Collaborate with IBM to design and develop your marketing material Realize built-in margin and complement with value added services Current, standard processes remain in place to establish a Reseller agreement
  • 28. © 2015 IBM Corporation IBM Security 28 IBM Value Proposition for Service Providers  Best-in-Class Security Intelligence solution with flexibility to meet your needs • Full spectrum of Security Intelligence capabilities • On-premise or Cloud delivery • Dedicated environment or multi-tenant • Horizontally scalable  Choice of Go-to-Market options to suit various business models • Minimize up-front costs • Maximize margins • Maintain customer relationships  Rapid Time-to-Value • Simplified deployment options • Out-of-the-box security content and integrations  Platform for adding high-value services in cost-effective and streamlined fashion • Tailored security building blocks • Single Pane of Glass for security monitoring and management
  • 29. © 2015 IBM Corporation IBM Security 29 Contact your Local IBM Representative Middle East & Africa Jean-Luc Labbe jean-luc.labbe@it.ibm.com North America Chad Kinter ckinter@us.ibm.com Europe Serge Richard serge.richard@fr.ibm.com Asia Pacific John SK Chai chaiskj@sg.ibm.com Worldwide Sales Bill Wallace bwallac@us.ibm.com
  • 30. © 2015 IBM Corporation IBM Security 30 www.ibm.com/security © Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

Notas del editor

  1. Large vs small customers
  2. Dedicated eC EP auto domain detection …any shared…goes to default
  3. Pass through apis – Click through – log in
  4. Mandatory Thank You Slide (available in English only). URL is hyperlinked to website.