Enviar búsqueda
Cargar
IBM Security Day, Cuenca - Ecuador
•
Descargar como PPSX, PDF
•
1 recomendación
•
849 vistas
Olmedo Abril Arboleda
Seguir
Presentación del evento organizado por IBM, Tallard y Coresolutions en Cuenca - Ecuador
Leer menos
Leer más
Educación
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 19
Descargar ahora
Recomendados
Ibm security virtual server protection
Ibm security virtual server protection
E-Government Center Moldova
Mcafee ips nsp-2011
Mcafee ips nsp-2011
Luluk Kristiawan
Refense Security Risk Briefing July 2009
Refense Security Risk Briefing July 2009
apompliano
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
IBM Danmark
Trend micro deep security
Trend micro deep security
Trend Micro
BYOD - Protecting Your School
BYOD - Protecting Your School
Sophos
Complete Security with Sophos and Softchoice
Complete Security with Sophos and Softchoice
Softchoice Corporation
Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012
Symantec
Recomendados
Ibm security virtual server protection
Ibm security virtual server protection
E-Government Center Moldova
Mcafee ips nsp-2011
Mcafee ips nsp-2011
Luluk Kristiawan
Refense Security Risk Briefing July 2009
Refense Security Risk Briefing July 2009
apompliano
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
IBM Danmark
Trend micro deep security
Trend micro deep security
Trend Micro
BYOD - Protecting Your School
BYOD - Protecting Your School
Sophos
Complete Security with Sophos and Softchoice
Complete Security with Sophos and Softchoice
Softchoice Corporation
Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012
Symantec
Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the Cloud
Trend Micro (EMEA) Limited
Cornerstone Networking & Security- Astaro Product Line
Cornerstone Networking & Security- Astaro Product Line
Cornerstone Networking & Security, LLC.
Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011
Filip Maertens
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
Ariel Martin Beliera
Oded Tsur - Ca Cloud Security
Oded Tsur - Ca Cloud Security
CSAIsrael
Complete Security
Complete Security
Sophos
Watchguard security proposal 2012
Watchguard security proposal 2012
Jimmy Saigon
Cy Cops Company Presentation
Cy Cops Company Presentation
ChaitanyaS
Thread Fix Tour Presentation Final Final
Thread Fix Tour Presentation Final Final
Robin Lutchansky
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Skybox Security
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
IBM Security
分会场八云及虚拟环境安全防护
分会场八云及虚拟环境安全防护
ITband
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop
Sophos
IBM Smarter Business 2012 - IBM Security: Threat landscape
IBM Smarter Business 2012 - IBM Security: Threat landscape
IBM Sverige
Windows 7 security enhancements
Windows 7 security enhancements
Narenda Wicaksono
Virtualisation: Pitfalls in Corporate VMware Implementations
Virtualisation: Pitfalls in Corporate VMware Implementations
Jason Edelstein
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
Symantec
Security model-of-sip-d2-05 at kishore
Security model-of-sip-d2-05 at kishore
AT Kishore
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS UK
Protecting Data on Laptops
Protecting Data on Laptops
Product Marketing Services
Nebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi Verze
TUESDAY Business Network
VSD Infotech
VSD Infotech
VSD infotech
Más contenido relacionado
La actualidad más candente
Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the Cloud
Trend Micro (EMEA) Limited
Cornerstone Networking & Security- Astaro Product Line
Cornerstone Networking & Security- Astaro Product Line
Cornerstone Networking & Security, LLC.
Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011
Filip Maertens
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
Ariel Martin Beliera
Oded Tsur - Ca Cloud Security
Oded Tsur - Ca Cloud Security
CSAIsrael
Complete Security
Complete Security
Sophos
Watchguard security proposal 2012
Watchguard security proposal 2012
Jimmy Saigon
Cy Cops Company Presentation
Cy Cops Company Presentation
ChaitanyaS
Thread Fix Tour Presentation Final Final
Thread Fix Tour Presentation Final Final
Robin Lutchansky
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Skybox Security
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
IBM Security
分会场八云及虚拟环境安全防护
分会场八云及虚拟环境安全防护
ITband
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop
Sophos
IBM Smarter Business 2012 - IBM Security: Threat landscape
IBM Smarter Business 2012 - IBM Security: Threat landscape
IBM Sverige
Windows 7 security enhancements
Windows 7 security enhancements
Narenda Wicaksono
Virtualisation: Pitfalls in Corporate VMware Implementations
Virtualisation: Pitfalls in Corporate VMware Implementations
Jason Edelstein
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
Symantec
Security model-of-sip-d2-05 at kishore
Security model-of-sip-d2-05 at kishore
AT Kishore
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS UK
Protecting Data on Laptops
Protecting Data on Laptops
Product Marketing Services
La actualidad más candente
(20)
Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the Cloud
Cornerstone Networking & Security- Astaro Product Line
Cornerstone Networking & Security- Astaro Product Line
Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
Oded Tsur - Ca Cloud Security
Oded Tsur - Ca Cloud Security
Complete Security
Complete Security
Watchguard security proposal 2012
Watchguard security proposal 2012
Cy Cops Company Presentation
Cy Cops Company Presentation
Thread Fix Tour Presentation Final Final
Thread Fix Tour Presentation Final Final
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
分会场八云及虚拟环境安全防护
分会场八云及虚拟环境安全防护
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop
IBM Smarter Business 2012 - IBM Security: Threat landscape
IBM Smarter Business 2012 - IBM Security: Threat landscape
Windows 7 security enhancements
Windows 7 security enhancements
Virtualisation: Pitfalls in Corporate VMware Implementations
Virtualisation: Pitfalls in Corporate VMware Implementations
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
Security model-of-sip-d2-05 at kishore
Security model-of-sip-d2-05 at kishore
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Protecting Data on Laptops
Protecting Data on Laptops
Similar a IBM Security Day, Cuenca - Ecuador
Nebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi Verze
TUESDAY Business Network
VSD Infotech
VSD Infotech
VSD infotech
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
Işınsu Akçetin
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
Andris Soroka
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
IBM Thailand Co Ltd
NetSafe - 11nov2011
NetSafe - 11nov2011
Agora Group
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a Service
Aberla
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
Kaspersky
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Amazon Web Services
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
Internap
NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012
Agora Group
IBM Security Software Solutions
IBM Security Software Solutions
Thierry Matusiak
F5 - BigIP ASM introduction
F5 - BigIP ASM introduction
Jimmy Saigon
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
Amazon Web Services Korea
Cyber security-briefing-presentation
Cyber security-briefing-presentation
sathiyamaha
B sep ds-21194634.en-us
B sep ds-21194634.en-us
Pelos TCHIKAYA
El Futuro de la Cibersegu
El Futuro de la Cibersegu
Cristian Garcia G.
BIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall Solution
F5 Networks
SIEM evolution
SIEM evolution
Stijn Vande Casteele
Take Control of End User Security
Take Control of End User Security
anniebrowny
Similar a IBM Security Day, Cuenca - Ecuador
(20)
Nebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi Verze
VSD Infotech
VSD Infotech
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
NetSafe - 11nov2011
NetSafe - 11nov2011
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a Service
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012
IBM Security Software Solutions
IBM Security Software Solutions
F5 - BigIP ASM introduction
F5 - BigIP ASM introduction
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
Cyber security-briefing-presentation
Cyber security-briefing-presentation
B sep ds-21194634.en-us
B sep ds-21194634.en-us
El Futuro de la Cibersegu
El Futuro de la Cibersegu
BIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall Solution
SIEM evolution
SIEM evolution
Take Control of End User Security
Take Control of End User Security
Último
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
GaneshChakor2
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
pboyjonauth
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
eniolaolutunde
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
RaunakKeshri1
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology ( Production , Purification , and Application )
Sakshi Ghasle
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
pboyjonauth
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
ssuser54595a
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
NirmalaLoungPoorunde1
microwave assisted reaction. General introduction
microwave assisted reaction. General introduction
Maksud Ahmed
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
JemimahLaneBuaron
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
RAM LAL ANAND COLLEGE, DELHI UNIVERSITY.
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
FatimaKhan178732
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
sanyamsingh5019
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
Steve Thomason
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
dawncurless
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
Celine George
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
Maestría en Comunicación Digital Interactiva - UNR
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
National Information Standards Organization (NISO)
mini mental status format.docx
mini mental status format.docx
PoojaSen20
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
SafetyChain Software
Último
(20)
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology ( Production , Purification , and Application )
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
microwave assisted reaction. General introduction
microwave assisted reaction. General introduction
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
mini mental status format.docx
mini mental status format.docx
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
IBM Security Day, Cuenca - Ecuador
1.
IBM Internet Security
Systems Cecilia Quintanilla Business Development Manager - Multicountries THE VEHICLE THE SKILL THE SOLUTION IBM ISS Professional Security Services © 2007 IBM Corporation
2.
IBM Internet Security
Systems Indice 1) IBM ISS : Quiénes somos? 2) Productos y Servicios 2 Template Documentation © 2007 IBM Corporation
3.
IBM Internet Security
Systems 1. Internet Security Systems 3 IBM ISS Professional Security Services © 2007 IBM Corporation
4.
IBM Internet Security
Systems IBM Internet Security Systems Overview Fundada in 1994 Cotiza en NASDAQ desde 1998 National Infrastructure White House Adquirida por IBM en 2006 Advisory Council Task Force Reconocido mundialmente como lider en tecnologías de protección e inteligencia de seguridad. Foco principal en seguridad empresarial Más de 11,000 empresas clientes a nivel mundial Lider indiscutible en tecnologías IPS/IDS X-Force detecta más de la mitad de las vulnerabilidades a nivel mundial © 2007 IBM Corporation
5.
IBM Internet Security
Systems The Annual X-Force 2008 Trend & Risk Report The report data by the numbers… The mission of the 9.1B analyzed Web pages & images IBM Internet Security Systems™ 150M intrusion attempts daily X-Force® research and development 40M spam & phishing attacks team is to: 40K documented vulnerabilities Research and evaluate threat and protection issues Millions of unique malware samples Deliver security protection for today’s security problems Develop new technology for tomorrow’s security challenges Provides Specific Analysis of: Educate the media and user communities – Vulnerabilities & exploits – Malicious/Unwanted websites – Spam and phishing – Malware – Other emerging trends 5 © 2007 IBM Corporation
6.
IBM Internet Security
Systems IBM Security Framework backed by the X-Force R&D IBM: Comprehensive Security Risk & Compliance Management - The only security vendor in the market with end-to-end coverage of the security foundation - 15,000 researchers, developers and SMEs on security initiatives - 3,000+ security & risk management patents - Managing more than 4B security events per day for clients - $1.5 Billion security spend in 2008 6 © 2007 IBM Corporation
7.
IBM Internet Security
Systems The IBM ISS X-Force® research and development team drives IBM Security Innovation Research Technology Solutions X-Force Protection Engines Original Vulnerability Research Extensions to existing engines New protection engine creation Public Vulnerability Analysis X-Force XPU’s Security Content Update Malware Analysis Development Security Content Update QA Threat Landscape Forecasting X-Force Intelligence X-Force Database Protection Technology Feed Monitoring and Collection Research Intelligence Sharing The X-Force team delivers reduced operational complexity – helping to build integrated technologies that feature “baked-in” simplification 7 © 2007 IBM Corporation
8.
IBM Internet Security
Systems Fortune 500 Clients The world’s top 10 banks The world’s top 10 IT companies The world’s top 10 telecommunication providers 9/10 world’s top auto manufacturers 7/10 world’s top insurance providers © 2007 IBM Corporation
9.
IBM Internet Security
Systems IBM ISS Has Great References Because of a solid Security Protection Platform based on customer need… 9 © 2007 IBM Corporation
10.
IBM Internet Security
Systems 2. Productos y Servicios: 10 IBM ISS Professional Security Services © 2007 IBM Corporation
11.
IBM Internet Security
Systems 2.1 Proventia Security Solutions Proventia Network Mail Security Solución completa de control de contenido Proventia Network MFS Proventia ADS Series – sobre correo electrónico MX5010, MX4006,MX3006, “Anomalia/Comportamiento” (antivirus y antispam) MX1004, MX0804 Appliances de Proteccion y Proventia Desktop Proventia Server Agente de Protección Appliance de Proteccion visibilidad de la red. Agente de Proteccion “Todo-en-uno” “Todo-en-uno” “Multi-capas” - Firewall - IDS/IPS – Windows - Virus Prevention System Proventia - FW / VPN – Linux - Intrusion Prevention Web Filter - AntiVirus Proventia Network IPS RealSecure Server Sensor - VPN Enforcer Solucion de filtrado de contenido (Firmas & comportamiento) Seguridad Preventiva para redes – Windows - Buffer Overflow Protection para bloquear y monitorear - AntiSpam empresariales GX3002,GX4002, – Solaris contenido no deseado de Internet - Web Filter GX4004, GX5008, GX5108, – AIX (http). - Spyware GX5206, GX6116 – HP-UX 11 IBM Proprietary and Confidential Information - 2007 © 2007 IBM Corporation
12.
IBM Internet Security
Systems Key Points Administración centralizada a través del IBM SiteProtector, que integra y correlaciona los eventos con eventos generados por otros agentes de seguridad de red, servidores, estaciones, detección de vulnerabilidades, firewall, antivirus y otros productos de seguridad de IBM Internet Security Systems Algoritmos y contenido de seguridad actualizado por el X-Force – el equipo de investigación e inteligencia en seguridad de IBM, considerado como el principal grupo de investigación del mercado Administración remota a través de IBM Managed Security Services Mitigate, monitor and IBM ISS Proventia Portfolio: IBM ISS provides the industry’s manage the latest leading portfolio of infrastructure security solutions, all driven by security threats and IBM’s vaunted X-Force research, protecting your network, vulnerabilities servers, endpoints, and applications 12 Customer Presentation | October 2007 © 2007 IBM Corporation
13.
IBM Internet Security
Systems Complementary Technologies, Comprehensive Protection FW Complementary technologies - IBM ISS Proventia™ prevents intrusions, attacks and compromises - Fidelis XPS™ prevents leakage of sensitive content - PGP Encrypts critical data where possible Comprehensive protection - Inbound and outbound security for enterprise networks - Asymmetrical depth of defense 13 13 © 2007 IBM Corporation
14.
IBM Internet Security
Systems 2.2 Professional Security Services Phase 5. EDUCACIÓN Fase 1. EVALUACIÓN • IBM ISS Product Training • Evaluación de la seguridad de aplicaciónes • Security Awareness Training • Evaluación de lseguridad de la información • Test de Penetración (Mejor a Hackeo Etico) • PCI Assessment (US and International) • SCADA Assessment • Policy and ISO 17799 Gap Analysis • Evaluación de riesgos • Evaluación de cumplimiento de regulaciones Phase 4. SOPORTE Y ADMINISTRACIÓN Fase 2. DISEÑO • Servicios de respuesta a emergencias • Plan de implementación de seguridad • Servicios de análisis forense • Diseño de la estructura de seguridad de la red. • Desarrollo y diseño de Políticas de seguridad. • Incremento del staff de soporte • Desarrollo de estándares y procedimientos. Phase 3. DESPLIEGUE • Servicios de despliegue • Servicios de Migración 14 © 2007 IBM Corporation
15.
IBM Internet Security
Systems 2.3 Managed Security Services Managed Protection Services Vulnerability Management Service Offers the most comprehensive protection services for Performs regularly-scheduled, automated scans of networks, servers, and desktops, featuring the industry's only money-back cash payment. internal and external devices for hundreds of known security vulnerabilities. Managed and Monitored Firewall Services Offers 24/7/365 expert daily management of a variety of Security Event and Log Management firewall platforms. Services Provides all the benefits of a security event management product suite without the expensive Managed IDS / IPS Services upfront capital investments and on-going overhead. Provides 24/7/365 monitoring, intrusion detection, and prevention, as well as incident response services for networks and servers. Managed E-mail and Web Security Services Is designed to provide a variety of solutions to enhance clients’ existing security posture, help prevent viruses, and spam, and control unwanted content in e-mail. 15 © 2007 IBM Corporation
16.
IBM Internet Security
Systems IBM Managed Security Services •Security Event & Log Management Services •Managed Intrusion Detection/Prevention Services •Managed Firewall Services IBM ISS provides the IBM ISS provides Customers Customer can ability to manage, customers with can access secure leverage combined trouble monitor, or view all of a consolidated log/event archival ticketing capabilities to the customer's firewall, security view and of all aggregated track issue resolution IDS and full reporting security events for transparently across IPS devices. capabilities. up to 7 years. managed and unmanaged devices. 16 © 2007 IBM Corporation
17.
IBM Internet Security
Systems Servicios Administrados de Seguridad 05/0 17 © 2007 IBM Corporation
18.
IBM Internet Security
Systems The Security Dashboard Virtual Security Operations Center (VSOC) Daily Threat Assessment Recent Security Incidents & Service Requests 7 Day Attack Trends Security News, Bulletins and Intelligence Quick Links Full Portal Searching 18 © 2007 IBM Corporation
19.
IBM Internet Security
Systems The SOC has a Global Extensive Infrastructure 8 Security 9 Security 133 20,000+ 3,700+ 4 Billion+ Operations Research Monitored Devices under MSS Clients Events Centers Centers Countries Contract Worldwide Per Day IBM has the unmatched global and local expertise to deliver complete solutions – and manage the cost and complexity of security 19 © 2007 IBM Corporation
Descargar ahora