SlideShare una empresa de Scribd logo
1 de 33
© 2015 IBM Corporation
The Total Economic Impact™ of IBM Security Network Protection (XGS)
Ben Harris
Business Technology Strategy Consultant
Forrester Consulting
Paul Griswold
Program Director, Strategy & Product Management
Threat Protection & X-Force
IBM Security
The ROI on Intrusion Prevention:
Protecting Both Your Network & Investment
2© 2015 IBM Corporation
Threat Management.NEXT
New protection and integration capabilities
to stay ahead of the threat
Advanced Malware Defense
Blocks malware
infections
on the
network
The history of IBM Security Network Protection (XGS)
Evolving beyond intrusion prevention to provide greater value
SSL Inspection
Protects against attacks
hidden inside
encrypted
traffic
URL/App Control
Protects users from
visiting
risky sites
on the web
Web App Protection
Heuristically protects
against common
app-based
attacks
Behavioral Defense
Protects against
attacks based
on behavior,
not specific
vulnerabilities
Intrusion Prevention
Protects
attacks on
vulnerabilities,
not exploits
Intrusion
Detection
Evolutionbasedonclientneeds
1997+ 2002+ 2005+ 2008+ 2012+ 2013+ 2014+ Future
3© 2015 IBM Corporation
XGS appliance models
IBM Network Protection XGS
Capabilities per Model XGS 3100 XGS 4100 XGS 5100 XGS 7100 XGS Virtual
Inspected Throughput Up to 800 Mbps Up to 1.5 Gbps Up to 7.0 Gbps Up to 25 Gbps Up to 1 Gbps
Flexible Performance
Levels
400 and 800 Mbps
750 Mbps and
1.5 Gbps
2.5, 4.0,
5.5, and 7.0 Gbps
5, 10, 15,
20, and 25 Gbps
600 Mbps and
1 GBps
Inspected Throughput
(with SSL/TLS)
Up to 500 Mbps (in)
Up to 400 Mbps (out)
Up to 900 Mbps (in)
Up to 700 Mbps (out)
Up to 4.5 Gbps (in)
Up to 2.5 Gbps (out)
Up to 12 Gbps (in)
Up to 7.5 Gbps (out)
Up to 500 Mbps (in)
Up to 400 Mbps (out)
Pluggable Network
Interface Modules
0 1 2 4 0
Protected Segments 2 Up to 6 Up to 10 Up to 16 Up to 4
XGS 5100
XGS 4100
XGS 7100
XGS 3100
4© 2015 IBM Corporation
In the past two years, IBM has introduced:
 Five new XGS models, covering throughput from 400 Mbps to 25 Gbps + virtual environments
 On-appliance inbound and outbound SSL inspection
 IP reputation, including intelligence from 270M hosts via Trusteer
 Industry-first Flexible Performance Licensing, allowing customers to increase inspected throughput
via a software license
 IBM Threat Protection System, including integrations with IBM products + FireEye, Damballa, and
Trend Micro (with more to come)
 Enhanced QRadar integration, including layer 7 flow data and right-click quarantine to block operator-
detected threats
 OpenSignature support, which allows users to detect and block custom traffic patterns using the
SNORT syntax
5© 2015 IBM Corporation
Ahead of the Threat Protection by IBM X-Force
Shellshock
CVE 2014-6271
MS OLE Remote
Code Execution
CVE-2014-6332
MS SharePoint
Priv Escalation
CVE-2015-1640
IE Cross-Domain
Info Disclosure
CVE-2015-0070
Cisco Prime
SQL Injection
CVE-2015-6350
DisclosedIBM Protection
2007 2015
Sept 2014Jun 2007
(10 other vulnerabilities covered)
Shell_Command_Injection
7.3 years ahead
Oct 2014
6.8 years ahead
(201 other vulnerabilities covered)
CompoundFile_Shellcode_DetectedFeb 2008
Apr 2015
(31 other vulnerabilities covered)
HTTP_HTML_Tag_InjectionNov 2008
6.4 years ahead
Feb 2015Nov 2008
(10,000+ other vulnerabilities covered)
Cross_Site_Scripting
6.3 years ahead
Oct 2015Jun 2007
(9,500+ other vulnerabilities covered)
SQL_Injection
6.9 years ahead
6© 2015 IBM Corporation
Backed by the reputation and
scale of IBM X-Force
IBM X-Force Exchange
Research and collaboration platform and API
Security
Analysts and
Researchers
Security
Operations Centers
(SOCs)
Security
Products and
Technologies
OPEN
a robust platform with access to
a wealth of threat intelligence
data
SOCIAL
a collaborative platform for
sharing threat intelligence
ACTIONABLE
an integrated solution to help
quickly stop threats
A new platform to consume, share, and
act on threat intelligence
IBM X-Force Exchange is:
Try it today at http://xforce.ibmcloud.com
7© 2015 IBM Corporation
Learn more about IBM Security Network Protection (XGS)
countries where IBM delivers
managed security services
industry analyst reports rank
IBM Security as a LEADER
enterprise security vendor
in total revenue
clients protected
including…
130+
25
No. 1
12K+
90% of the Fortune 100
companies
Visit the website
IBM Security Network Protection
Watch the videos
IBM Security Network Protection
Read new blog posts
SecurityIntelligence.com
Follow us on Twitter
@ibmsecurity
Join IBM X-Force Exchange
xforce.ibmcloud.com
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any
kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor
shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use
of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or
capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product
or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries
or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside
your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks
on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access.
IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other
systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE
IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
THANK YOU
www.ibm.com/security
The Total Economic Impact™ Of
IBM Security Network Protection
(XGS) Webinar
Forrester Consulting
Ben Harris
Consultant
February 10, 2016
© 2016 Forrester Research, Inc. Reproduction Prohibited
11
Source: The Total Economic Impact of IBM Security Network Protection (XGS), February 2016
Agenda
›What is TEI?
›Executive summary
›Analysis
›Financial summary
›Question and answer
Please note:
This slide presentation is an abridged,
graphical, and complementary
representation of a case study.
For a full explanation of methodology
and details on model calculations,
please refer to the full case study IBM
Security Network Protection (XGS)
February 2016
© 2016 Forrester Research, Inc. Reproduction Prohibited 12
What is TEI?
Background and methodology
© 2016 Forrester Research, Inc. Reproduction Prohibited
13
Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016
“Next level” business case justifications are increasingly
vital for critical investments
Somewhat
important
33%
Somewhat
unimportant
4%
Not at all
important
3%
Very
important
60%
TCO ROI TEI
IT Impact
IT costs   
IT cost
savings
  
Business
Impact
User
efficiency
 
Business
effectiveness
 
Risk/
uncertainty
Risk
mitigation

Risk versus
reward

Strategic
Impact
Scalability 
Flexibility 
Base: 825 IT decision-makers at North American enterprises
Do I need a business case? What is an effective business case?
• Over 90% of IT decision-makers
find value in a business case
• TEI adjusts for risks and factors the flexibility
of a product into the case study
© 2016 Forrester Research, Inc. Reproduction Prohibited
14
Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016
The TEI framework centers on quantifying benefits,
capturing costs, evaluating flexibility, and adjusting risk
Benefits
Costs
Flexibility
Total
Economic
ImpactTM
(TEI)
R
i
s
k
© 2016 Forrester Research, Inc. Reproduction Prohibited
15
Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016
The TEI approach involves key stakeholders at Forrester,
IBM, and IBM’s customers
Perform due
diligence
Conduct
customer
interview
Construct
financial
model
Write
case
study
Deliver
webinar
• Consult
Forrester
Analyst
• Interview IBM
stakeholders
• Interview with
IBM customer
• Collect data
• Populate
model
• Describe the
model
• Review with
interviewee
• Webinars
• Presentation
© 2016 Forrester Research, Inc. Reproduction Prohibited
16
Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016
Disclosures
The audience should be aware of the following:
› This document is an abridged webinar version of a full case study (Forrester Total Economic
Impact of IBM Security Network Protection (XGS), February 2016).
› The study is commissioned by IBM and delivered by the Forrester Consulting group.
› Forrester makes no assumptions as to the potential return on investment that other
organizations will receive. Forrester strongly advises that readers should use their own
estimates within the framework provided in the report to determine the appropriateness of an
investment in IBM
› IBM reviewed and provided feedback to Forrester, but Forrester maintains editorial control
over the study and its findings and does not accept changes to the study that contradict
Forrester’s findings or obscure the meaning of the study.
› The customer name for the interview was provided by IBM.
› Forrester does not endorse IBM.
© 2016 Forrester Research, Inc. Reproduction Prohibited 17
Executive summary
High level findings
© 2016 Forrester Research, Inc. Reproduction Prohibited
18
Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016
XGS delivers security and performance as well as an
attractive ROI
Return on
Investment: 340%
Net Present Value:
$1,075,592
Payback Period:
1.9 months
Based on an analysis of IBM XGS’s customer feedback, Forrester has determined XGS has
the following three-year risk-adjusted financial impact:
EXECUTIVE SUMMARY
XGS Interviewed organization Robust security and
desirable performance
© 2016 Forrester Research, Inc. Reproduction Prohibited 19
Analysis
Interview highlights and model
© 2016 Forrester Research, Inc. Reproduction Prohibited
20
Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016
Forrester interviewed one organization, who shared their
challenges and objectives prior to using XGS
Small security team Required high availability
Network performance critical Security attacks common to region
© 2016 Forrester Research, Inc. Reproduction Prohibited
21
Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016
The interviewed organization noted several key results
from its investment in XGS
“Choosing XGS was a no-brainer because of the ability to utilize
the SSL decryption for inbound traffic.”
- Deputy chief security officer
“Configuring the rules is incredibly easy.”
- Deputy chief security officer
“We deployed the configuration that actually blocks the regions
that are known for their hostility against our country’s
organizations.”
- Deputy chief security officer
© 2016 Forrester Research, Inc. Reproduction Prohibited
22
Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016
The interviewed organization quantified key benefits
resulting from its investment in XGS
NETWORK
PERFORMANCE
No degradation in
network speed
SECURITY
Financial impact of
a breach
AVAILABILITY
Highly available
network
MANAGEMENT
&
CONFIDENCE
Manage access
and traffic from
one solution
© 2016 Forrester Research, Inc. Reproduction Prohibited
23
Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016
Network performance with robust security
• XGS allows for high productivity without
additional network tuning
• Hardware and software is a one-time
metric
Metric Year 1 Year 2 Year 3
Total population 2500 2500 2500
% of population affected 15% 15% 15%
Time impacted 40 40 40
Productivity factor 20% 20% 20%
FTE cost per hour $60 $60 $60
FTE cost avoidance of network tuning $150,000 $150,000 $150,000
Current HW & SW solution costs, including
maintenance (already purchased)
$200,000
Network performance $530,000 $330,000 $330,000
Network
performance
73%
Three-Year Benefit
© 2016 Forrester Research, Inc. Reproduction Prohibited
24
Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016
The cost avoidance of a security breach
• Assuming one breach in a three-year
period
• Reflects benefit realization in the first
year
Metric Year 1 Year 2 Year 3
Cost of an incident $15,400,000
Probability of breach 9.000%
% reduction 20%
Security $277,200
Security $277,200
Security
17%
Three-Year Benefit
© 2016 Forrester Research, Inc. Reproduction Prohibited
25
Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016
What availability means
• Lost revenue and % reduction are key
drivers
• Variables are based on research
Metric Year 1 Year 2 Year 3
Lost revenue $1,570,000 $1,570,000 $1,570,000
Regulatory fines related to downtime $125,000 $125,000 $125,000
Probability of breach 3.000% 3.000% 3.000%
% reduction 20% 20% 20%
Availability $10,170 $10,170 $10,170
Availability
2%
Three-Year Benefit
© 2016 Forrester Research, Inc. Reproduction Prohibited
26
Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016
Benefits to the technology executives
• Extends security team by taking security
policy updates away
• Allows the team to control access simply
yet effectively
Metric Year 1 Year 2 Year 3
FTE cost avoidance of managing security
policies
$150,000 $150,000 $150,000
% reduction 30% 30% 30%
Management and confidence $45,000 $45,000 $45,000
Management &
Confidence
8%
Three-Year Benefit
© 2016 Forrester Research, Inc. Reproduction Prohibited
27
Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016
Traditional hardware and licensing cost structure
29%
16%
27%
28%
Hardware -- $101,352
Initial costs
• $101,352
Ongoing costs
• N/A
Licensing fees -- $57,680
Initial costs
• N/A
Ongoing costs
• $57,680 in year 2
© 2016 Forrester Research, Inc. Reproduction Prohibited
28
Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016
Modest maintenance and implementation costs
29%
16%
27%
28%
Maintenance -- $95,584
Initial costs
• $22,248
Ongoing costs
• $36,668 in years 2 & 3
Implementation -- $100,000
Initial costs
• N/A
Ongoing costs
• $75,000 in year 1
• $25,000 in year 3
© 2016 Forrester Research, Inc. Reproduction Prohibited
29
Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016
In addition to benefits and costs, TEI includes potential
future “flexibility” options
Flexibility, as defined by TEI, represents the opportunity to
make an investment in additional capacity or capability that
could be turned into future business benefit:
› SLL encryption inspection
› Geo-blocking
© 2016 Forrester Research, Inc. Reproduction Prohibited 30
Financial summary
Results
© 2016 Forrester Research, Inc. Reproduction Prohibited
31
Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016
The three-year cash flow for XGS shows a ROI of 340%, a
NPV of over $1M, and a payback period of 1.9 months
($200,000)
$0
$200,000
$400,000
$600,000
$800,000
$1,000,000
$1,200,000
$1,400,000
Initial Year 1 Year 2 Year 3
Cashflows Financial Analysis (risk-adjusted)
Total costs Total benefits Cumulative total
Cash Flow Analysis
Summary Initial Year 1 Year 2 Year 3 Total
Present
Value
Total costs ($123,600) ($75,000) ($94,348) ($61,668) ($354,616) ($316,087)
Total benefits $0 $862,370 $385,170 $385,170 $1,632,710 $1,391,679
Total ($123,600) $787,370 $290,822 $323,502 $1,278,094 $1,075,592
ROI 334% 340%
Payback period (months) 1.9
© 2016 Forrester Research, Inc. Reproduction Prohibited 32
Question and answer
Thank you
forrester.com
Ben Harris
+1 617.613.6413
bharris@forrester.com

Más contenido relacionado

La actualidad más candente

Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itIBM Security
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"IBM Security
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomIBM Security
 
4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to CyberthreatsIBM Security
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?IBM Security
 
Attack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack ChainAttack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack ChainIBM Security
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsIBM Security
 
Security Trends in the Retail Industry
Security Trends in the Retail IndustrySecurity Trends in the Retail Industry
Security Trends in the Retail IndustryIBM Security
 
Malware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthMalware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthIBM Security
 
Uncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerIBM Security
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016IBM Security
 
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...IBM Security
 
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...IBM Security
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware IBM Security
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?IBM Security
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIBM Security
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart ThemIBM Security
 
Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!IBM Security
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyIBM Security
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM Security
 

La actualidad más candente (20)

Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?
 
Attack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack ChainAttack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack Chain
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control Costs
 
Security Trends in the Retail Industry
Security Trends in the Retail IndustrySecurity Trends in the Retail Industry
Security Trends in the Retail Industry
 
Malware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthMalware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient Truth
 
Uncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a Hacker
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016
 
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
 
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 
Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach Study
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
 

Destacado

Return on Security Investment
Return on Security InvestmentReturn on Security Investment
Return on Security InvestmentConferencias FIST
 
The Total Economic Impact of IBM Connections
The Total Economic Impact of IBM ConnectionsThe Total Economic Impact of IBM Connections
The Total Economic Impact of IBM ConnectionsCasey Lucas
 
Alfresco - Forrester TEI Study
Alfresco - Forrester TEI StudyAlfresco - Forrester TEI Study
Alfresco - Forrester TEI StudyPaul Hampton
 
The ROI of Collaboration featuring research from Forrester
The ROI of Collaboration featuring research from ForresterThe ROI of Collaboration featuring research from Forrester
The ROI of Collaboration featuring research from Forrestertibbr
 
Forrester Research on Optimizing Globally Distributed Software Development Us...
Forrester Research on Optimizing Globally Distributed Software Development Us...Forrester Research on Optimizing Globally Distributed Software Development Us...
Forrester Research on Optimizing Globally Distributed Software Development Us...WANdisco Plc
 
NetScout nGeniusONE overview
NetScout nGeniusONE overviewNetScout nGeniusONE overview
NetScout nGeniusONE overviewBAKOTECH
 
Failed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated RansomwareFailed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated RansomwareIBM Security
 
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...ShortestPathFirst
 

Destacado (9)

Return on Security Investment
Return on Security InvestmentReturn on Security Investment
Return on Security Investment
 
The Total Economic Impact of IBM Connections
The Total Economic Impact of IBM ConnectionsThe Total Economic Impact of IBM Connections
The Total Economic Impact of IBM Connections
 
Alfresco - Forrester TEI Study
Alfresco - Forrester TEI StudyAlfresco - Forrester TEI Study
Alfresco - Forrester TEI Study
 
Presentation of TEI Crete
Presentation of TEI CretePresentation of TEI Crete
Presentation of TEI Crete
 
The ROI of Collaboration featuring research from Forrester
The ROI of Collaboration featuring research from ForresterThe ROI of Collaboration featuring research from Forrester
The ROI of Collaboration featuring research from Forrester
 
Forrester Research on Optimizing Globally Distributed Software Development Us...
Forrester Research on Optimizing Globally Distributed Software Development Us...Forrester Research on Optimizing Globally Distributed Software Development Us...
Forrester Research on Optimizing Globally Distributed Software Development Us...
 
NetScout nGeniusONE overview
NetScout nGeniusONE overviewNetScout nGeniusONE overview
NetScout nGeniusONE overview
 
Failed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated RansomwareFailed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated Ransomware
 
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...
 

Similar a The ROI on Intrusion Prevention: Protecting Both Your Network & Investment

Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.netBig Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.netxband
 
An Integrated, Intelligent Approach to Security
An Integrated, Intelligent Approach to SecurityAn Integrated, Intelligent Approach to Security
An Integrated, Intelligent Approach to SecurityGerard McNamee
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services OverviewCasey Lucas
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareSarah Freemantle
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...IBM Security
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planetVincent Kwon
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure EnterpriseIBM Security
 
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개ArumIm
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...AGILLY
 
Security Principles for CEOs
Security Principles for CEOsSecurity Principles for CEOs
Security Principles for CEOsMorten Bjørklund
 
MaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense ManagementMaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense ManagementDarryl Miles
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud accessAGILLY
 
Mobility 201 : Productivity
Mobility 201 : ProductivityMobility 201 : Productivity
Mobility 201 : ProductivityAGILLY
 
Mobility 101 : Provision
Mobility 101 : ProvisionMobility 101 : Provision
Mobility 101 : ProvisionAGILLY
 
Desvendando o desenvolvimento seguro de software
Desvendando o desenvolvimento seguro de softwareDesvendando o desenvolvimento seguro de software
Desvendando o desenvolvimento seguro de softwareAllyson Chiarini
 

Similar a The ROI on Intrusion Prevention: Protecting Both Your Network & Investment (20)

Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.netBig Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
 
An Integrated, Intelligent Approach to Security
An Integrated, Intelligent Approach to SecurityAn Integrated, Intelligent Approach to Security
An Integrated, Intelligent Approach to Security
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
 
Mitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-RadarMitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-Radar
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
 
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
 
Security Principles for CEOs
Security Principles for CEOsSecurity Principles for CEOs
Security Principles for CEOs
 
MaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense ManagementMaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense Management
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud access
 
Mobility 201 : Productivity
Mobility 201 : ProductivityMobility 201 : Productivity
Mobility 201 : Productivity
 
Mobility 101 : Provision
Mobility 101 : ProvisionMobility 101 : Provision
Mobility 101 : Provision
 
IBM Cloud Security Enforcer
IBM Cloud Security EnforcerIBM Cloud Security Enforcer
IBM Cloud Security Enforcer
 
Desvendando o desenvolvimento seguro de software
Desvendando o desenvolvimento seguro de softwareDesvendando o desenvolvimento seguro de software
Desvendando o desenvolvimento seguro de software
 

Más de IBM Security

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackIBM Security
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationIBM Security
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?IBM Security
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...IBM Security
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowIBM Security
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats IBM Security
 

Más de IBM Security (20)

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 

Último

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Último (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

The ROI on Intrusion Prevention: Protecting Both Your Network & Investment

  • 1. © 2015 IBM Corporation The Total Economic Impact™ of IBM Security Network Protection (XGS) Ben Harris Business Technology Strategy Consultant Forrester Consulting Paul Griswold Program Director, Strategy & Product Management Threat Protection & X-Force IBM Security The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
  • 2. 2© 2015 IBM Corporation Threat Management.NEXT New protection and integration capabilities to stay ahead of the threat Advanced Malware Defense Blocks malware infections on the network The history of IBM Security Network Protection (XGS) Evolving beyond intrusion prevention to provide greater value SSL Inspection Protects against attacks hidden inside encrypted traffic URL/App Control Protects users from visiting risky sites on the web Web App Protection Heuristically protects against common app-based attacks Behavioral Defense Protects against attacks based on behavior, not specific vulnerabilities Intrusion Prevention Protects attacks on vulnerabilities, not exploits Intrusion Detection Evolutionbasedonclientneeds 1997+ 2002+ 2005+ 2008+ 2012+ 2013+ 2014+ Future
  • 3. 3© 2015 IBM Corporation XGS appliance models IBM Network Protection XGS Capabilities per Model XGS 3100 XGS 4100 XGS 5100 XGS 7100 XGS Virtual Inspected Throughput Up to 800 Mbps Up to 1.5 Gbps Up to 7.0 Gbps Up to 25 Gbps Up to 1 Gbps Flexible Performance Levels 400 and 800 Mbps 750 Mbps and 1.5 Gbps 2.5, 4.0, 5.5, and 7.0 Gbps 5, 10, 15, 20, and 25 Gbps 600 Mbps and 1 GBps Inspected Throughput (with SSL/TLS) Up to 500 Mbps (in) Up to 400 Mbps (out) Up to 900 Mbps (in) Up to 700 Mbps (out) Up to 4.5 Gbps (in) Up to 2.5 Gbps (out) Up to 12 Gbps (in) Up to 7.5 Gbps (out) Up to 500 Mbps (in) Up to 400 Mbps (out) Pluggable Network Interface Modules 0 1 2 4 0 Protected Segments 2 Up to 6 Up to 10 Up to 16 Up to 4 XGS 5100 XGS 4100 XGS 7100 XGS 3100
  • 4. 4© 2015 IBM Corporation In the past two years, IBM has introduced:  Five new XGS models, covering throughput from 400 Mbps to 25 Gbps + virtual environments  On-appliance inbound and outbound SSL inspection  IP reputation, including intelligence from 270M hosts via Trusteer  Industry-first Flexible Performance Licensing, allowing customers to increase inspected throughput via a software license  IBM Threat Protection System, including integrations with IBM products + FireEye, Damballa, and Trend Micro (with more to come)  Enhanced QRadar integration, including layer 7 flow data and right-click quarantine to block operator- detected threats  OpenSignature support, which allows users to detect and block custom traffic patterns using the SNORT syntax
  • 5. 5© 2015 IBM Corporation Ahead of the Threat Protection by IBM X-Force Shellshock CVE 2014-6271 MS OLE Remote Code Execution CVE-2014-6332 MS SharePoint Priv Escalation CVE-2015-1640 IE Cross-Domain Info Disclosure CVE-2015-0070 Cisco Prime SQL Injection CVE-2015-6350 DisclosedIBM Protection 2007 2015 Sept 2014Jun 2007 (10 other vulnerabilities covered) Shell_Command_Injection 7.3 years ahead Oct 2014 6.8 years ahead (201 other vulnerabilities covered) CompoundFile_Shellcode_DetectedFeb 2008 Apr 2015 (31 other vulnerabilities covered) HTTP_HTML_Tag_InjectionNov 2008 6.4 years ahead Feb 2015Nov 2008 (10,000+ other vulnerabilities covered) Cross_Site_Scripting 6.3 years ahead Oct 2015Jun 2007 (9,500+ other vulnerabilities covered) SQL_Injection 6.9 years ahead
  • 6. 6© 2015 IBM Corporation Backed by the reputation and scale of IBM X-Force IBM X-Force Exchange Research and collaboration platform and API Security Analysts and Researchers Security Operations Centers (SOCs) Security Products and Technologies OPEN a robust platform with access to a wealth of threat intelligence data SOCIAL a collaborative platform for sharing threat intelligence ACTIONABLE an integrated solution to help quickly stop threats A new platform to consume, share, and act on threat intelligence IBM X-Force Exchange is: Try it today at http://xforce.ibmcloud.com
  • 7. 7© 2015 IBM Corporation Learn more about IBM Security Network Protection (XGS) countries where IBM delivers managed security services industry analyst reports rank IBM Security as a LEADER enterprise security vendor in total revenue clients protected including… 130+ 25 No. 1 12K+ 90% of the Fortune 100 companies Visit the website IBM Security Network Protection Watch the videos IBM Security Network Protection Read new blog posts SecurityIntelligence.com Follow us on Twitter @ibmsecurity Join IBM X-Force Exchange xforce.ibmcloud.com
  • 8. © Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. THANK YOU www.ibm.com/security
  • 9.
  • 10. The Total Economic Impact™ Of IBM Security Network Protection (XGS) Webinar Forrester Consulting Ben Harris Consultant February 10, 2016
  • 11. © 2016 Forrester Research, Inc. Reproduction Prohibited 11 Source: The Total Economic Impact of IBM Security Network Protection (XGS), February 2016 Agenda ›What is TEI? ›Executive summary ›Analysis ›Financial summary ›Question and answer Please note: This slide presentation is an abridged, graphical, and complementary representation of a case study. For a full explanation of methodology and details on model calculations, please refer to the full case study IBM Security Network Protection (XGS) February 2016
  • 12. © 2016 Forrester Research, Inc. Reproduction Prohibited 12 What is TEI? Background and methodology
  • 13. © 2016 Forrester Research, Inc. Reproduction Prohibited 13 Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016 “Next level” business case justifications are increasingly vital for critical investments Somewhat important 33% Somewhat unimportant 4% Not at all important 3% Very important 60% TCO ROI TEI IT Impact IT costs    IT cost savings    Business Impact User efficiency   Business effectiveness   Risk/ uncertainty Risk mitigation  Risk versus reward  Strategic Impact Scalability  Flexibility  Base: 825 IT decision-makers at North American enterprises Do I need a business case? What is an effective business case? • Over 90% of IT decision-makers find value in a business case • TEI adjusts for risks and factors the flexibility of a product into the case study
  • 14. © 2016 Forrester Research, Inc. Reproduction Prohibited 14 Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016 The TEI framework centers on quantifying benefits, capturing costs, evaluating flexibility, and adjusting risk Benefits Costs Flexibility Total Economic ImpactTM (TEI) R i s k
  • 15. © 2016 Forrester Research, Inc. Reproduction Prohibited 15 Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016 The TEI approach involves key stakeholders at Forrester, IBM, and IBM’s customers Perform due diligence Conduct customer interview Construct financial model Write case study Deliver webinar • Consult Forrester Analyst • Interview IBM stakeholders • Interview with IBM customer • Collect data • Populate model • Describe the model • Review with interviewee • Webinars • Presentation
  • 16. © 2016 Forrester Research, Inc. Reproduction Prohibited 16 Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016 Disclosures The audience should be aware of the following: › This document is an abridged webinar version of a full case study (Forrester Total Economic Impact of IBM Security Network Protection (XGS), February 2016). › The study is commissioned by IBM and delivered by the Forrester Consulting group. › Forrester makes no assumptions as to the potential return on investment that other organizations will receive. Forrester strongly advises that readers should use their own estimates within the framework provided in the report to determine the appropriateness of an investment in IBM › IBM reviewed and provided feedback to Forrester, but Forrester maintains editorial control over the study and its findings and does not accept changes to the study that contradict Forrester’s findings or obscure the meaning of the study. › The customer name for the interview was provided by IBM. › Forrester does not endorse IBM.
  • 17. © 2016 Forrester Research, Inc. Reproduction Prohibited 17 Executive summary High level findings
  • 18. © 2016 Forrester Research, Inc. Reproduction Prohibited 18 Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016 XGS delivers security and performance as well as an attractive ROI Return on Investment: 340% Net Present Value: $1,075,592 Payback Period: 1.9 months Based on an analysis of IBM XGS’s customer feedback, Forrester has determined XGS has the following three-year risk-adjusted financial impact: EXECUTIVE SUMMARY XGS Interviewed organization Robust security and desirable performance
  • 19. © 2016 Forrester Research, Inc. Reproduction Prohibited 19 Analysis Interview highlights and model
  • 20. © 2016 Forrester Research, Inc. Reproduction Prohibited 20 Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016 Forrester interviewed one organization, who shared their challenges and objectives prior to using XGS Small security team Required high availability Network performance critical Security attacks common to region
  • 21. © 2016 Forrester Research, Inc. Reproduction Prohibited 21 Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016 The interviewed organization noted several key results from its investment in XGS “Choosing XGS was a no-brainer because of the ability to utilize the SSL decryption for inbound traffic.” - Deputy chief security officer “Configuring the rules is incredibly easy.” - Deputy chief security officer “We deployed the configuration that actually blocks the regions that are known for their hostility against our country’s organizations.” - Deputy chief security officer
  • 22. © 2016 Forrester Research, Inc. Reproduction Prohibited 22 Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016 The interviewed organization quantified key benefits resulting from its investment in XGS NETWORK PERFORMANCE No degradation in network speed SECURITY Financial impact of a breach AVAILABILITY Highly available network MANAGEMENT & CONFIDENCE Manage access and traffic from one solution
  • 23. © 2016 Forrester Research, Inc. Reproduction Prohibited 23 Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016 Network performance with robust security • XGS allows for high productivity without additional network tuning • Hardware and software is a one-time metric Metric Year 1 Year 2 Year 3 Total population 2500 2500 2500 % of population affected 15% 15% 15% Time impacted 40 40 40 Productivity factor 20% 20% 20% FTE cost per hour $60 $60 $60 FTE cost avoidance of network tuning $150,000 $150,000 $150,000 Current HW & SW solution costs, including maintenance (already purchased) $200,000 Network performance $530,000 $330,000 $330,000 Network performance 73% Three-Year Benefit
  • 24. © 2016 Forrester Research, Inc. Reproduction Prohibited 24 Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016 The cost avoidance of a security breach • Assuming one breach in a three-year period • Reflects benefit realization in the first year Metric Year 1 Year 2 Year 3 Cost of an incident $15,400,000 Probability of breach 9.000% % reduction 20% Security $277,200 Security $277,200 Security 17% Three-Year Benefit
  • 25. © 2016 Forrester Research, Inc. Reproduction Prohibited 25 Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016 What availability means • Lost revenue and % reduction are key drivers • Variables are based on research Metric Year 1 Year 2 Year 3 Lost revenue $1,570,000 $1,570,000 $1,570,000 Regulatory fines related to downtime $125,000 $125,000 $125,000 Probability of breach 3.000% 3.000% 3.000% % reduction 20% 20% 20% Availability $10,170 $10,170 $10,170 Availability 2% Three-Year Benefit
  • 26. © 2016 Forrester Research, Inc. Reproduction Prohibited 26 Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016 Benefits to the technology executives • Extends security team by taking security policy updates away • Allows the team to control access simply yet effectively Metric Year 1 Year 2 Year 3 FTE cost avoidance of managing security policies $150,000 $150,000 $150,000 % reduction 30% 30% 30% Management and confidence $45,000 $45,000 $45,000 Management & Confidence 8% Three-Year Benefit
  • 27. © 2016 Forrester Research, Inc. Reproduction Prohibited 27 Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016 Traditional hardware and licensing cost structure 29% 16% 27% 28% Hardware -- $101,352 Initial costs • $101,352 Ongoing costs • N/A Licensing fees -- $57,680 Initial costs • N/A Ongoing costs • $57,680 in year 2
  • 28. © 2016 Forrester Research, Inc. Reproduction Prohibited 28 Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016 Modest maintenance and implementation costs 29% 16% 27% 28% Maintenance -- $95,584 Initial costs • $22,248 Ongoing costs • $36,668 in years 2 & 3 Implementation -- $100,000 Initial costs • N/A Ongoing costs • $75,000 in year 1 • $25,000 in year 3
  • 29. © 2016 Forrester Research, Inc. Reproduction Prohibited 29 Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016 In addition to benefits and costs, TEI includes potential future “flexibility” options Flexibility, as defined by TEI, represents the opportunity to make an investment in additional capacity or capability that could be turned into future business benefit: › SLL encryption inspection › Geo-blocking
  • 30. © 2016 Forrester Research, Inc. Reproduction Prohibited 30 Financial summary Results
  • 31. © 2016 Forrester Research, Inc. Reproduction Prohibited 31 Source: The Total Economic Impact™ Of IBM Security Network Protection (XGS), February 2016 The three-year cash flow for XGS shows a ROI of 340%, a NPV of over $1M, and a payback period of 1.9 months ($200,000) $0 $200,000 $400,000 $600,000 $800,000 $1,000,000 $1,200,000 $1,400,000 Initial Year 1 Year 2 Year 3 Cashflows Financial Analysis (risk-adjusted) Total costs Total benefits Cumulative total Cash Flow Analysis Summary Initial Year 1 Year 2 Year 3 Total Present Value Total costs ($123,600) ($75,000) ($94,348) ($61,668) ($354,616) ($316,087) Total benefits $0 $862,370 $385,170 $385,170 $1,632,710 $1,391,679 Total ($123,600) $787,370 $290,822 $323,502 $1,278,094 $1,075,592 ROI 334% 340% Payback period (months) 1.9
  • 32. © 2016 Forrester Research, Inc. Reproduction Prohibited 32 Question and answer
  • 33. Thank you forrester.com Ben Harris +1 617.613.6413 bharris@forrester.com