SlideShare una empresa de Scribd logo
1 de 19
IBM Internet Security Systems

                                         Cecilia Quintanilla
                                         Business Development Manager - Multicountries




                                                             THE VEHICLE     THE SKILL      THE SOLUTION

IBM ISS Professional Security Services


                                                                                         © 2007 IBM Corporation
IBM Internet Security Systems

    Indice


     1) IBM ISS : Quiénes somos?

     2) Productos y Servicios




2    Template Documentation                         © 2007 IBM Corporation
IBM Internet Security Systems




                        1. Internet Security Systems




3   IBM ISS Professional Security Services             © 2007 IBM Corporation
IBM Internet Security Systems

IBM Internet Security Systems Overview

 Fundada in 1994
 Cotiza en NASDAQ desde 1998                 National Infrastructure White House
 Adquirida por IBM en 2006                     Advisory Council
                                                                      Task Force

 Reconocido mundialmente como lider en tecnologías de protección e
  inteligencia de seguridad.
 Foco principal en seguridad empresarial
 Más de 11,000 empresas clientes a nivel mundial
 Lider indiscutible en tecnologías IPS/IDS
 X-Force detecta más de la mitad
  de las vulnerabilidades a nivel mundial




                                                                       © 2007 IBM Corporation
IBM Internet Security Systems

    The Annual X-Force 2008 Trend & Risk Report
                                                                The report data by the numbers…

                 The mission of the                             9.1B      analyzed Web pages & images

           IBM Internet Security Systems™                       150M      intrusion attempts daily
          X-Force® research and development                     40M       spam & phishing attacks
                      team is to:
                                                                40K       documented vulnerabilities

   Research and evaluate threat and protection issues           Millions of unique malware samples

   Deliver security protection for today’s security problems
   Develop new technology for tomorrow’s security challenges   Provides Specific Analysis of:
   Educate the media and user communities
                                                                 –   Vulnerabilities & exploits
                                                                 –   Malicious/Unwanted websites
                                                                 –   Spam and phishing
                                                                 –   Malware
                                                                 –   Other emerging trends



      5                                                                                          © 2007 IBM Corporation
IBM Internet Security Systems

IBM Security Framework backed by the X-Force R&D
       IBM: Comprehensive Security
            Risk & Compliance
               Management

- The only security vendor in the market with
  end-to-end coverage of the security
  foundation

- 15,000 researchers, developers and SMEs
  on security initiatives

- 3,000+ security & risk management patents

- Managing more than 4B security events
  per day for clients

- $1.5 Billion security spend in 2008



  6                                                © 2007 IBM Corporation
IBM Internet Security Systems

The IBM ISS X-Force® research and development team drives IBM
Security Innovation

         Research                        Technology                          Solutions

                                    X-Force Protection Engines
  Original Vulnerability
        Research                  Extensions to existing engines
                                  New protection engine creation
   Public Vulnerability
        Analysis                          X-Force XPU’s

                                  Security Content Update
   Malware Analysis                Development
                                  Security Content Update QA
   Threat Landscape
      Forecasting                      X-Force Intelligence

                                  X-Force Database
  Protection Technology           Feed Monitoring and Collection
        Research
                                  Intelligence Sharing


                   The X-Force team delivers reduced operational complexity –
           helping to build integrated technologies that feature “baked-in” simplification

     7                                                                                  © 2007 IBM Corporation
IBM Internet Security Systems

Fortune 500 Clients

       The world’s top 10 banks

                    The world’s top 10 IT companies


       The world’s top 10 telecommunication providers


              9/10 world’s top auto manufacturers


         7/10 world’s top insurance providers


                                                      © 2007 IBM Corporation
IBM Internet Security Systems

IBM ISS Has Great References




     Because of a solid Security Protection Platform
              based on customer need…
9                                             © 2007 IBM Corporation
IBM Internet Security Systems




                          2. Productos y Servicios:




10   IBM ISS Professional Security Services           © 2007 IBM Corporation
IBM Internet Security Systems

                                                                                                                  2.1 Proventia Security
                                                                                                                              Solutions




  Proventia
  Network Mail Security
  Solución completa de
  control de contenido                   Proventia Network MFS             Proventia ADS Series –
  sobre correo electrónico               MX5010, MX4006,MX3006,            “Anomalia/Comportamiento”
  (antivirus y antispam)                 MX1004, MX0804                    Appliances de Proteccion y                                  Proventia Desktop
                                                                                                            Proventia Server           Agente de Protección
                                         Appliance de Proteccion           visibilidad de la red.
                                                                                                            Agente de Proteccion         “Todo-en-uno”
                                         “Todo-en-uno”
                                                                                                            “Multi-capas”              - Firewall
                                           - IDS/IPS
                                                                                                            – Windows                  - Virus Prevention System
     Proventia                             - FW / VPN
                                                                                                            – Linux                    - Intrusion Prevention
     Web Filter                            - AntiVirus
                                                                          Proventia Network IPS             RealSecure Server Sensor   - VPN Enforcer
     Solucion de filtrado de contenido        (Firmas & comportamiento)
                                                                          Seguridad Preventiva para redes   – Windows                  - Buffer Overflow Protection
     para bloquear y monitorear            - AntiSpam
                                                                          empresariales GX3002,GX4002,      – Solaris
     contenido no deseado de Internet      - Web Filter
                                                                          GX4004, GX5008, GX5108,           – AIX
     (http).                               - Spyware
                                                                          GX5206, GX6116                    – HP-UX


        11
IBM Proprietary and Confidential Information - 2007                                                                                             © 2007 IBM Corporation
IBM Internet Security Systems



     Key Points
        Administración centralizada a través del IBM SiteProtector, que integra y
          correlaciona los eventos con eventos generados por otros agentes de seguridad
          de red, servidores, estaciones, detección de vulnerabilidades, firewall, antivirus y
          otros productos de seguridad de IBM Internet Security Systems
        Algoritmos y contenido de seguridad actualizado por el X-Force – el equipo de
          investigación e inteligencia en seguridad de IBM, considerado como el principal
          grupo de investigación del mercado
        Administración remota a través de IBM Managed Security Services




 Mitigate, monitor and                       IBM ISS Proventia Portfolio: IBM ISS provides the industry’s
   manage the latest                         leading portfolio of infrastructure security solutions, all driven by
   security threats and                      IBM’s vaunted X-Force research, protecting your network,
   vulnerabilities                           servers, endpoints, and applications



12    Customer Presentation | October 2007                                                           © 2007 IBM Corporation
IBM Internet Security Systems
Complementary Technologies, Comprehensive
Protection

                                                                                                FW




                             Complementary technologies
                          -   IBM ISS Proventia™ prevents intrusions, attacks and compromises
                          -   Fidelis XPS™ prevents leakage of sensitive content
                          -   PGP Encrypts critical data where possible
                             Comprehensive protection
                          -   Inbound and outbound security for enterprise networks
                          -   Asymmetrical depth of defense




13
     13                                                                                         © 2007 IBM Corporation
IBM Internet Security Systems

                                                        2.2 Professional Security Services



               Phase 5. EDUCACIÓN                                                         Fase 1. EVALUACIÓN

             • IBM ISS Product Training                                                  • Evaluación de la seguridad de aplicaciónes
             • Security Awareness Training                                               • Evaluación de lseguridad de la información
                                                                                         • Test de Penetración (Mejor a Hackeo Etico)
                                                                                         • PCI Assessment (US and International)
                                                                                         • SCADA Assessment
                                                                                         • Policy and ISO 17799 Gap Analysis
                                                                                         • Evaluación de riesgos
                                                                                         • Evaluación de cumplimiento de regulaciones

      Phase 4. SOPORTE Y
       ADMINISTRACIÓN                                                                        Fase 2. DISEÑO

     • Servicios de respuesta a emergencias                                         • Plan de implementación de seguridad

     • Servicios de análisis forense                                                • Diseño de la estructura de seguridad de la red.
                                                                                    • Desarrollo y diseño de Políticas de seguridad.
     • Incremento del staff de soporte
                                                                                    • Desarrollo de estándares y procedimientos.




                                                        Phase 3. DESPLIEGUE
                                                        • Servicios de despliegue
                                                        • Servicios de Migración


14                                                                                                                 © 2007 IBM Corporation
IBM Internet Security Systems

                                                                  2.3 Managed Security Services



 Managed Protection Services                                         Vulnerability Management Service
     Offers the most comprehensive protection services for          Performs regularly-scheduled, automated scans of
     networks, servers, and desktops, featuring the industry's
     only money-back cash payment.                                    internal and external devices for hundreds of
                                                                              known security vulnerabilities.

 Managed and Monitored Firewall Services
     Offers 24/7/365 expert daily management of a variety of        Security Event and Log Management
     firewall platforms.                                                            Services
                                                                       Provides all the benefits of a security event
                                                                    management product suite without the expensive
 Managed IDS / IPS Services                                        upfront capital investments and on-going overhead.
     Provides 24/7/365 monitoring, intrusion detection, and
     prevention, as well as incident response services for
     networks and servers.                                       Managed E-mail and Web Security Services
                                                                      Is designed to provide a variety of solutions to
                                                                     enhance clients’ existing security posture, help
                                                                    prevent viruses, and spam, and control unwanted
                                                                                     content in e-mail.




15                                                                                                         © 2007 IBM Corporation
IBM Internet Security Systems

IBM Managed Security Services
 •Security Event & Log Management Services
 •Managed Intrusion Detection/Prevention Services
 •Managed Firewall Services




  IBM ISS provides the          IBM ISS provides         Customers               Customer can
    ability to manage,           customers with     can access secure     leverage combined trouble
  monitor, or view all of         a consolidated     log/event archival     ticketing capabilities to
 the customer's firewall,       security view and     of all aggregated      track issue resolution
          IDS and                  full reporting   security events for       transparently across
      IPS devices.                 capabilities.        up to 7 years.    managed and unmanaged
                                                                                    devices.




    16                                                                                © 2007 IBM Corporation
IBM Internet Security Systems


Servicios Administrados de Seguridad




05/0   17                                   © 2007 IBM Corporation
IBM Internet Security Systems

The Security Dashboard
Virtual Security Operations Center (VSOC)




                                               Daily Threat Assessment

                                               Recent Security Incidents &
                                                Service Requests

                                               7 Day Attack Trends

                                               Security News, Bulletins and
                                                Intelligence Quick Links

                                               Full Portal Searching




    18                                                              © 2007 IBM Corporation
IBM Internet Security Systems

The SOC has a Global Extensive Infrastructure

         8 Security          9 Security     133         20,000+         3,700+      4 Billion+
         Operations          Research     Monitored   Devices under   MSS Clients    Events
          Centers             Centers     Countries     Contract      Worldwide     Per Day




                    IBM has the unmatched global and local expertise to deliver
                 complete solutions – and manage the cost and complexity of security

    19                                                                                    © 2007 IBM Corporation

Más contenido relacionado

La actualidad más candente

Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudData Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudTrend Micro (EMEA) Limited
 
Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011Filip Maertens
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationAriel Martin Beliera
 
Oded Tsur - Ca Cloud Security
Oded Tsur - Ca Cloud SecurityOded Tsur - Ca Cloud Security
Oded Tsur - Ca Cloud SecurityCSAIsrael
 
Complete Security
Complete SecurityComplete Security
Complete SecuritySophos
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company PresentationChaitanyaS
 
Thread Fix Tour Presentation Final Final
Thread Fix Tour Presentation Final FinalThread Fix Tour Presentation Final Final
Thread Fix Tour Presentation Final FinalRobin Lutchansky
 
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...Skybox Security
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataIBM Security
 
分会场八云及虚拟环境安全防护
分会场八云及虚拟环境安全防护分会场八云及虚拟环境安全防护
分会场八云及虚拟环境安全防护ITband
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't StopSophos
 
IBM Smarter Business 2012 - IBM Security: Threat landscape
IBM Smarter Business 2012 - IBM Security: Threat landscapeIBM Smarter Business 2012 - IBM Security: Threat landscape
IBM Smarter Business 2012 - IBM Security: Threat landscapeIBM Sverige
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancementsNarenda Wicaksono
 
Virtualisation: Pitfalls in Corporate VMware Implementations
Virtualisation: Pitfalls in Corporate VMware ImplementationsVirtualisation: Pitfalls in Corporate VMware Implementations
Virtualisation: Pitfalls in Corporate VMware ImplementationsJason Edelstein
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012Symantec
 
Security model-of-sip-d2-05 at kishore
Security model-of-sip-d2-05 at kishoreSecurity model-of-sip-d2-05 at kishore
Security model-of-sip-d2-05 at kishoreAT Kishore
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS UK
 

La actualidad más candente (20)

Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudData Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the Cloud
 
Cornerstone Networking & Security- Astaro Product Line
Cornerstone Networking & Security- Astaro Product LineCornerstone Networking & Security- Astaro Product Line
Cornerstone Networking & Security- Astaro Product Line
 
Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 
Oded Tsur - Ca Cloud Security
Oded Tsur - Ca Cloud SecurityOded Tsur - Ca Cloud Security
Oded Tsur - Ca Cloud Security
 
Complete Security
Complete SecurityComplete Security
Complete Security
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company Presentation
 
Thread Fix Tour Presentation Final Final
Thread Fix Tour Presentation Final FinalThread Fix Tour Presentation Final Final
Thread Fix Tour Presentation Final Final
 
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
分会场八云及虚拟环境安全防护
分会场八云及虚拟环境安全防护分会场八云及虚拟环境安全防护
分会场八云及虚拟环境安全防护
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop
 
IBM Smarter Business 2012 - IBM Security: Threat landscape
IBM Smarter Business 2012 - IBM Security: Threat landscapeIBM Smarter Business 2012 - IBM Security: Threat landscape
IBM Smarter Business 2012 - IBM Security: Threat landscape
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
 
Virtualisation: Pitfalls in Corporate VMware Implementations
Virtualisation: Pitfalls in Corporate VMware ImplementationsVirtualisation: Pitfalls in Corporate VMware Implementations
Virtualisation: Pitfalls in Corporate VMware Implementations
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
Security model-of-sip-d2-05 at kishore
Security model-of-sip-d2-05 at kishoreSecurity model-of-sip-d2-05 at kishore
Security model-of-sip-d2-05 at kishore
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
 
Protecting Data on Laptops
Protecting Data on LaptopsProtecting Data on Laptops
Protecting Data on Laptops
 

Similar a IBM Security Day, Cuenca - Ecuador

McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceAndris Soroka
 
NetSafe - 11nov2011
NetSafe - 11nov2011NetSafe - 11nov2011
NetSafe - 11nov2011Agora Group
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceAberla
 
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...Kaspersky
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012Agora Group
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions Thierry Matusiak
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introductionJimmy Saigon
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentationsathiyamaha
 
B sep ds-21194634.en-us
B sep ds-21194634.en-usB sep ds-21194634.en-us
B sep ds-21194634.en-usPelos TCHIKAYA
 
BIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionBIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionF5 Networks
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Securityanniebrowny
 

Similar a IBM Security Day, Cuenca - Ecuador (20)

Nebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi VerzeNebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi Verze
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
NetSafe - 11nov2011
NetSafe - 11nov2011NetSafe - 11nov2011
NetSafe - 11nov2011
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a Service
 
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introduction
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentation
 
B sep ds-21194634.en-us
B sep ds-21194634.en-usB sep ds-21194634.en-us
B sep ds-21194634.en-us
 
El Futuro de la Cibersegu
El Futuro de la CiberseguEl Futuro de la Cibersegu
El Futuro de la Cibersegu
 
BIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionBIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall Solution
 
SIEM evolution
SIEM evolutionSIEM evolution
SIEM evolution
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Security
 

Último

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Último (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 

IBM Security Day, Cuenca - Ecuador

  • 1. IBM Internet Security Systems Cecilia Quintanilla Business Development Manager - Multicountries THE VEHICLE THE SKILL THE SOLUTION IBM ISS Professional Security Services © 2007 IBM Corporation
  • 2. IBM Internet Security Systems Indice 1) IBM ISS : Quiénes somos? 2) Productos y Servicios 2 Template Documentation © 2007 IBM Corporation
  • 3. IBM Internet Security Systems 1. Internet Security Systems 3 IBM ISS Professional Security Services © 2007 IBM Corporation
  • 4. IBM Internet Security Systems IBM Internet Security Systems Overview  Fundada in 1994  Cotiza en NASDAQ desde 1998 National Infrastructure White House  Adquirida por IBM en 2006 Advisory Council Task Force  Reconocido mundialmente como lider en tecnologías de protección e inteligencia de seguridad.  Foco principal en seguridad empresarial  Más de 11,000 empresas clientes a nivel mundial  Lider indiscutible en tecnologías IPS/IDS  X-Force detecta más de la mitad de las vulnerabilidades a nivel mundial © 2007 IBM Corporation
  • 5. IBM Internet Security Systems The Annual X-Force 2008 Trend & Risk Report The report data by the numbers… The mission of the 9.1B analyzed Web pages & images IBM Internet Security Systems™ 150M intrusion attempts daily X-Force® research and development 40M spam & phishing attacks team is to: 40K documented vulnerabilities  Research and evaluate threat and protection issues  Millions of unique malware samples  Deliver security protection for today’s security problems  Develop new technology for tomorrow’s security challenges Provides Specific Analysis of:  Educate the media and user communities – Vulnerabilities & exploits – Malicious/Unwanted websites – Spam and phishing – Malware – Other emerging trends 5 © 2007 IBM Corporation
  • 6. IBM Internet Security Systems IBM Security Framework backed by the X-Force R&D IBM: Comprehensive Security Risk & Compliance Management - The only security vendor in the market with end-to-end coverage of the security foundation - 15,000 researchers, developers and SMEs on security initiatives - 3,000+ security & risk management patents - Managing more than 4B security events per day for clients - $1.5 Billion security spend in 2008 6 © 2007 IBM Corporation
  • 7. IBM Internet Security Systems The IBM ISS X-Force® research and development team drives IBM Security Innovation Research Technology Solutions X-Force Protection Engines Original Vulnerability Research  Extensions to existing engines  New protection engine creation Public Vulnerability Analysis X-Force XPU’s  Security Content Update Malware Analysis Development  Security Content Update QA Threat Landscape Forecasting X-Force Intelligence  X-Force Database Protection Technology  Feed Monitoring and Collection Research  Intelligence Sharing The X-Force team delivers reduced operational complexity – helping to build integrated technologies that feature “baked-in” simplification 7 © 2007 IBM Corporation
  • 8. IBM Internet Security Systems Fortune 500 Clients The world’s top 10 banks The world’s top 10 IT companies The world’s top 10 telecommunication providers 9/10 world’s top auto manufacturers 7/10 world’s top insurance providers © 2007 IBM Corporation
  • 9. IBM Internet Security Systems IBM ISS Has Great References Because of a solid Security Protection Platform based on customer need… 9 © 2007 IBM Corporation
  • 10. IBM Internet Security Systems 2. Productos y Servicios: 10 IBM ISS Professional Security Services © 2007 IBM Corporation
  • 11. IBM Internet Security Systems 2.1 Proventia Security Solutions Proventia Network Mail Security Solución completa de control de contenido Proventia Network MFS Proventia ADS Series – sobre correo electrónico MX5010, MX4006,MX3006, “Anomalia/Comportamiento” (antivirus y antispam) MX1004, MX0804 Appliances de Proteccion y Proventia Desktop Proventia Server Agente de Protección Appliance de Proteccion visibilidad de la red. Agente de Proteccion “Todo-en-uno” “Todo-en-uno” “Multi-capas” - Firewall - IDS/IPS – Windows - Virus Prevention System Proventia - FW / VPN – Linux - Intrusion Prevention Web Filter - AntiVirus Proventia Network IPS RealSecure Server Sensor - VPN Enforcer Solucion de filtrado de contenido (Firmas & comportamiento) Seguridad Preventiva para redes – Windows - Buffer Overflow Protection para bloquear y monitorear - AntiSpam empresariales GX3002,GX4002, – Solaris contenido no deseado de Internet - Web Filter GX4004, GX5008, GX5108, – AIX (http). - Spyware GX5206, GX6116 – HP-UX 11 IBM Proprietary and Confidential Information - 2007 © 2007 IBM Corporation
  • 12. IBM Internet Security Systems Key Points  Administración centralizada a través del IBM SiteProtector, que integra y correlaciona los eventos con eventos generados por otros agentes de seguridad de red, servidores, estaciones, detección de vulnerabilidades, firewall, antivirus y otros productos de seguridad de IBM Internet Security Systems  Algoritmos y contenido de seguridad actualizado por el X-Force – el equipo de investigación e inteligencia en seguridad de IBM, considerado como el principal grupo de investigación del mercado  Administración remota a través de IBM Managed Security Services Mitigate, monitor and IBM ISS Proventia Portfolio: IBM ISS provides the industry’s manage the latest leading portfolio of infrastructure security solutions, all driven by security threats and IBM’s vaunted X-Force research, protecting your network, vulnerabilities servers, endpoints, and applications 12 Customer Presentation | October 2007 © 2007 IBM Corporation
  • 13. IBM Internet Security Systems Complementary Technologies, Comprehensive Protection FW  Complementary technologies - IBM ISS Proventia™ prevents intrusions, attacks and compromises - Fidelis XPS™ prevents leakage of sensitive content - PGP Encrypts critical data where possible  Comprehensive protection - Inbound and outbound security for enterprise networks - Asymmetrical depth of defense 13 13 © 2007 IBM Corporation
  • 14. IBM Internet Security Systems 2.2 Professional Security Services Phase 5. EDUCACIÓN Fase 1. EVALUACIÓN • IBM ISS Product Training • Evaluación de la seguridad de aplicaciónes • Security Awareness Training • Evaluación de lseguridad de la información • Test de Penetración (Mejor a Hackeo Etico) • PCI Assessment (US and International) • SCADA Assessment • Policy and ISO 17799 Gap Analysis • Evaluación de riesgos • Evaluación de cumplimiento de regulaciones Phase 4. SOPORTE Y ADMINISTRACIÓN Fase 2. DISEÑO • Servicios de respuesta a emergencias • Plan de implementación de seguridad • Servicios de análisis forense • Diseño de la estructura de seguridad de la red. • Desarrollo y diseño de Políticas de seguridad. • Incremento del staff de soporte • Desarrollo de estándares y procedimientos. Phase 3. DESPLIEGUE • Servicios de despliegue • Servicios de Migración 14 © 2007 IBM Corporation
  • 15. IBM Internet Security Systems 2.3 Managed Security Services Managed Protection Services Vulnerability Management Service Offers the most comprehensive protection services for Performs regularly-scheduled, automated scans of networks, servers, and desktops, featuring the industry's only money-back cash payment. internal and external devices for hundreds of known security vulnerabilities. Managed and Monitored Firewall Services Offers 24/7/365 expert daily management of a variety of Security Event and Log Management firewall platforms. Services Provides all the benefits of a security event management product suite without the expensive Managed IDS / IPS Services upfront capital investments and on-going overhead. Provides 24/7/365 monitoring, intrusion detection, and prevention, as well as incident response services for networks and servers. Managed E-mail and Web Security Services Is designed to provide a variety of solutions to enhance clients’ existing security posture, help prevent viruses, and spam, and control unwanted content in e-mail. 15 © 2007 IBM Corporation
  • 16. IBM Internet Security Systems IBM Managed Security Services •Security Event & Log Management Services •Managed Intrusion Detection/Prevention Services •Managed Firewall Services IBM ISS provides the IBM ISS provides Customers Customer can ability to manage, customers with can access secure leverage combined trouble monitor, or view all of a consolidated log/event archival ticketing capabilities to the customer's firewall, security view and of all aggregated track issue resolution IDS and full reporting security events for transparently across IPS devices. capabilities. up to 7 years. managed and unmanaged devices. 16 © 2007 IBM Corporation
  • 17. IBM Internet Security Systems Servicios Administrados de Seguridad 05/0 17 © 2007 IBM Corporation
  • 18. IBM Internet Security Systems The Security Dashboard Virtual Security Operations Center (VSOC)  Daily Threat Assessment  Recent Security Incidents & Service Requests  7 Day Attack Trends  Security News, Bulletins and Intelligence Quick Links  Full Portal Searching 18 © 2007 IBM Corporation
  • 19. IBM Internet Security Systems The SOC has a Global Extensive Infrastructure 8 Security 9 Security 133 20,000+ 3,700+ 4 Billion+ Operations Research Monitored Devices under MSS Clients Events Centers Centers Countries Contract Worldwide Per Day IBM has the unmatched global and local expertise to deliver complete solutions – and manage the cost and complexity of security 19 © 2007 IBM Corporation