La seguridad y los requerimientos regulatorios en las Casas de Bolsa Mexicanas Juan Carlos Carrillo Security Sales Leader ...
agenda 6 5 IBM Security Framework 4 La regulación y los riesgos para Casas de Bolsa 2 X-Force® 2009 Trend & Risk Report Hi...
X-Force® 2009 Trend & Risk Report
The mission of the IBM Internet Security Systems ™  X-Force ®  research and development  team is to: <ul><li>Research and ...
Report Summary: Attacks Continue Across all Security Domains <ul><li>Attackers have turned to hiding exploits in malicious...
The Economics of Attacker Exploitation <ul><ul><li>Economics continue to play heavily into the exploitation probability of...
2009 Attacker Motivation is to Gain Access and Manipulate Data <ul><ul><li>“ Gain access” remains the primary consequence ...
Application & Processes: Web App Vulnerabilities Continue to Dominate <ul><ul><li>50.4%  of all vulnerabilities are Web ap...
Application & Processes: Web App Vulnerabilities Continue to Dominate Security and Spending are Unbalanced “ The cleanup c...
Application & Processes: Cross Site Scripting and Injection Attacks Continue to Dominate   <ul><ul><li>90%  of injection a...
Data & Information: Vulnerabilities in Document Readers Skyrocket <ul><ul><li>Portable Document Format (PDF) vulnerabiliti...
 
 
 
La regulación y los riesgos para Casas de Bolsa
Artículos de CNBV <ul><li>Articulo 113 fracción V: “Control Interno” </li></ul><ul><ul><li>Medidas necesarias para preveni...
Los riesgos del sector financiero
 
IBM Security Framework
The IBM Security framework <ul><li>Is the only security vendor in the market with a end-to-end coverage of the security fo...
IBM ISS Solutions 07/09/10 IBM has the unmatched local and global expertise to deliver complete solutions and manage the c...
IBM ISS security consulting solutions
Why IBM ISS Professional Security Services? <ul><li>Exclusive security focus and expertise  </li></ul><ul><ul><li>Senior-L...
¿Cuánto vale su identidad? “ La identidad de Everardo Rodríguez fue robada, pero se la devolvieron”
Un Club Para Evitar http://www.privacyrights.org/ar/ChronDataBreaches.htm Organización Registros Comprometidos Colorado He...
Penetration Testing <ul><li>Quantifies risk to customer information, financial transactions, online applications and other...
Information Security Assessment <ul><li>Review of Network Security Architecture </li></ul><ul><ul><li>Assessment of curren...
Information Security Assessment II <ul><li>Physical Security Assessment </li></ul><ul><ul><li>Determination of how physica...
Application Security Assessment <ul><li>Identifies application security issues before they are exploited </li></ul><ul><li...
IBM ISS product solutions
The X-Force Difference -  Preemptive Protection & PSS
Microsoft Security Bulletins coverage by IBM ISS products <ul><li>http://xforce.iss.net/BulletinSummary.do?y=2009 </li></ul>
Performance Flexibility: IPS beyond the perimeter “… It is important to mandate that all ingress (inbound) traffic run thr...
IPS Proventia GX Appliances <ul><li>Solution to stop automatically intrusion attacks either internal or external, also the...
PAM drives security convergence in a single solution & eliminates point products <ul><li>Virtual Patch ™ :  Shielding a vu...
Managing the agent overload
Proventia Desktop/Phoenix Rising Comparison Feature Proventia Desktop ESC Firewall   IPS   Behavioral AV   Signature...
Case Study in Proventia ESC Savings: Financial Customer Moved from low 80% success rate to 95% success rate with real-time...
IBM ISS service solutions
Virtual Security Operations Center (VSOC)
X-Force Protection System How IBM ISS Managed Security Services Work
Source: IBM Internet Security Systems, 2008 Security Management Monthly Annual Assumes full security staff of 10 providing...
Q&A
Thanks Juan Carlos Carrillo [email_address] 5270-6226 @juan_carrillo
Upcoming SlideShare
Loading in …5
×

Presentación AMIB Los Cabos

949 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
949
On SlideShare
0
From Embeds
0
Number of Embeds
10
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • To replace the title / subtitle with your own: Click on the title block -&gt; select all the text by pressing Ctrl+A -&gt; press Delete key -&gt; type your own text
  • Speaker’s notes: We take data from a lot of various disciplines including the Web filtering database second only to Google that provides analysis for more than 9 billion Web sites and images, we also see what kind of intrusion attempts the managed services team sees across its customer base currently tracking at 150 million per day, we have more than 40 million documented spam attacks, and 40,000 documented vulnerabilities from both internal research and external disclosures. This report is unique in the fact that the sources listed above provide varying perspectives on the threat landscape to together provide a cohesive look at the industry based on factual data from the various research functions within the broader X-force team and databases.
  • Speaker’s notes: Let’s explore the key findings of the report – all mapped back to the IBM Security Framework. The full X-Force Trend &amp; Threat Report is available for download at: http://www-935.ibm.com/services/us/iss/xforce/trendreports/
  • Speaker’s notes: One of the things that we did this year was to take a slightly differently look at how the vulnerabilities are classified and how they are rated by criticality. We’ve noticed that the traditional way to categorize vulnerabilities is not the same criteria by which a hacker or crime organization might classify the vulnerability. What may appear to rate “high” on a traditional scale may never be exploited because it has too small a target audience or doesn’t provide the appropriate financial payout. The grid on the right hand side of the screen shows the Exploitability Probability Quadrant, on the Y axis is the total opportunity size whereas the X axis shows the cost to exploit the vulnerability. Ideally, the criminal community will look for an exploit that falls in the upper right hand “sweet spot” of a vulnerability that is cheap to exploit with lots of targets or opportunity that can result in a high payout.
  • Speaker’s notes: This slide breaks down the motivation of an attacker. You can see that “gain access” and “data manipulation” still rank extremely high as far as motivation for criminal organizations. Gaining access to a system provides an attacker complete control over the affected system, which would allow them to steal data, manipulate the system, or launch other attacks from that system. The category of data manipulation took a plunge but still higher in comparison to 2006 and 2007
  • To replace the title / subtitle with your own: Click on the title block -&gt; select all the text by pressing Ctrl+A -&gt; press Delete key -&gt; type your own text
  • To replace the title / subtitle with your own: Click on the title block -&gt; select all the text by pressing Ctrl+A -&gt; press Delete key -&gt; type your own text
  • To replace the title / subtitle with your own: Click on the title block -&gt; select all the text by pressing Ctrl+A -&gt; press Delete key -&gt; type your own text
  • MOVED THE TEXT AT BOTTOM TO THE LEFT
  • Data from PRIVACY RIGHTS CLEARINGHOUSE A Chronology of Data Breaches 
Reported Since the ChoicePoint Incident (http://www.privacyrights.org/ar/ChronDataBreaches.htm)
  • PAPB (PCI Application Assessments) these are slightly different than the full assessment.
  • To replace the title / subtitle with your own: Click on the title block -&gt; select all the text by pressing Ctrl+A -&gt; press Delete key -&gt; type your own text
  • Architecture of PAM (with highly efficient software) gives Proventia the capacity (CPU utilization) to add new modules of protection without degrading core IPS security effectiveness Client Benefits Security convergence eliminates the costs of deploying and managing point products Increasing value of existing Proventia IPS deployments Example: Proventia Content Analyzer added in Q1 2008 for data security Example: Proventia Web application security add Q2 2009
  • To replace the title / subtitle with your own: Click on the title block -&gt; select all the text by pressing Ctrl+A -&gt; press Delete key -&gt; type your own text
  • There’s always something of our VSOC platform the customer can use… it’s just a question of asking him what they currently have in place security wise and adding our options. Some might have a NOC in place… NOC &lt;&gt; SOC  NOC Merely handles fixed procedures, SOC looks at the possible impact and results of some events All customers’ answers can be address with some service… This is VSOC, the combination of all these concepts – it’s a whole platform. - Left side of the screen, all full blown services by managed products. Customer typically has nothing yet and needs it all. - Right side; the customer might have some products, people, procedures and need parts of the whole services. They’ll want to keep the existing services etc, but need something extra. You’re thus enabling the customer to do the work – whereas they can add something of VSOC Customer might have logs, but nothing to store/analyze them… then why bother keeping logs… We can offer them log management services where we can import logs from about anything. XFTAS is free when you buy anything else, this however might be the only thing they need. Governments love this as they already have something inhouse and can use the intelligence from ISS in addition to their internal service. - The middle part is the initial screen of the portal – don’t sell the customer a single part from the right or left, sell them what they need… The system is the same, same backend – can scale on to any other service.
  • This chart is just an example of the cost savings clients find they gain by choosing to partner with us for MSS vs. doing it in-house. Many clients calculate a savings of up to 55%.
  • To replace the title / subtitle with your own: Click on the title block -&gt; select all the text by pressing Ctrl+A -&gt; press Delete key -&gt; type your own text
  • To replace the title / subtitle with your own: Click on the title block -&gt; select all the text by pressing Ctrl+A -&gt; press Delete key -&gt; type your own text
  • Presentación AMIB Los Cabos

    1. 1. La seguridad y los requerimientos regulatorios en las Casas de Bolsa Mexicanas Juan Carlos Carrillo Security Sales Leader viernes 9 de julio de 2010
    2. 2. agenda 6 5 IBM Security Framework 4 La regulación y los riesgos para Casas de Bolsa 2 X-Force® 2009 Trend & Risk Report Highlights 1 3 IBM ISS security consulting solutions IBM ISS product solutions IBM ISS service solutions
    3. 3. X-Force® 2009 Trend & Risk Report
    4. 4. The mission of the IBM Internet Security Systems ™ X-Force ® research and development team is to: <ul><li>Research and evaluate threat and protection issues </li></ul><ul><li>Deliver security protection for today’s security problems </li></ul><ul><li>Develop new technology for tomorrow’s security challenges </li></ul><ul><li>Educate the media and user communities </li></ul><ul><li>X-Force Research </li></ul><ul><li>10B analyzed Web pages & images </li></ul><ul><li>150M intrusion attempts daily </li></ul><ul><li>40M spam & phishing attacks </li></ul><ul><li>43K documented vulnerabilities </li></ul><ul><li>Millions of unique malware samples </li></ul><ul><li>Provides Specific Analysis of: </li></ul><ul><ul><li>Vulnerabilities & exploits </li></ul></ul><ul><ul><li>Malicious/Unwanted websites </li></ul></ul><ul><ul><li>Spam and phishing </li></ul></ul><ul><ul><li>Malware </li></ul></ul><ul><ul><li>Other emerging trends </li></ul></ul>X-Force R&D -- Unmatched Security Leadership
    5. 5. Report Summary: Attacks Continue Across all Security Domains <ul><li>Attackers have turned to hiding exploits in malicious documents that are hosted on Web sites or sent to victims through email (like spam) </li></ul><ul><li>Portable Document Format (PDF) vulnerabilities disclosed in the first half of 2009 have already surpassed disclosures from all of 2008 </li></ul><ul><li>3,240 new vulnerabilities were discovered in the first half of 2009, representing a decrease in comparison to 2008 </li></ul><ul><li>Largest categories of new vuln disclosures, SQL injection and ActiveX exploits, are slowing although exploitation remains strong </li></ul><ul><li>50.4% of all vulnerabilities are Web application vulnerabilities </li></ul><ul><li>Although URL spam (email with links to the spam content) are still the predominant type of spam, image-based spam has started to make a comeback. </li></ul><ul><li>66% of phishing is targeted at the finance industry, 31% targeted at online payment institutions </li></ul>N etwork, Server, and End Point P hysical Infrastructure P eople and Identity D ata and Information A pplication and Process <ul><li>New malicious Web links increased by 508% in comparison to the first half of 2008 </li></ul><ul><li>Attackers are exploiting trusted Web sites to fool users into clicking their malicious links </li></ul><ul><li>Trojans make up 55% of all Malware. Information-stealing Trojans are largest category </li></ul>
    6. 6. The Economics of Attacker Exploitation <ul><ul><li>Economics continue to play heavily into the exploitation probability of a vulnerability </li></ul></ul><ul><ul><li>Recent Document Reader vulnerabilities impacting office documents and PDFs are very profitable and easily executable </li></ul></ul><ul><li>On a basic microeconomic level, an understanding of the opportunity for a computer criminal comes from considering the amount of revenue that can be generated from exploiting a vulnerability relative to the cost of doing so . </li></ul><ul><li>Obviously, vulnerabilities that present a high revenue opportunity at a low cost are likely to be popular with attackers . Both revenue (opportunity) and cost are made up of a complicated set of components, and some of these components can be influenced by the security industry . </li></ul>
    7. 7. 2009 Attacker Motivation is to Gain Access and Manipulate Data <ul><ul><li>“ Gain access” remains the primary consequence of vulnerability exploitation </li></ul></ul><ul><ul><ul><li>Approaching the 50% mark that was previously seen throughout 2006 and 2007 </li></ul></ul></ul><ul><ul><li>“ Data Manipulation” took a plunge but still higher in comparison to 2006 and 2007 </li></ul></ul><ul><ul><li>“ Bypass Security is increasing </li></ul></ul><ul><li>Are you confident that an attacker can not gain access to your system? </li></ul><ul><li>Is your private data secure? </li></ul><ul><li>IBM Security Offerings: </li></ul><ul><li>IBM Proventia Network, Server and Endpoint Intrusion Detection and Prevention products and services </li></ul><ul><li>IBM Web Application Security </li></ul><ul><li>IBM ISS Data Security products and services </li></ul>
    8. 8. Application & Processes: Web App Vulnerabilities Continue to Dominate <ul><ul><li>50.4% of all vulnerabilities are Web application vulnerabilities </li></ul></ul><ul><ul><li>SQL injection and Cross-Site Scripting are neck and neck in a race for the top spot </li></ul></ul>
    9. 9. Application & Processes: Web App Vulnerabilities Continue to Dominate Security and Spending are Unbalanced “ The cleanup cost for fixing a bug in a homegrown Web application ranges anywhere from $400 to $4,000 to repair, depending on the vulnerability and the way it's fixed.” -Darkreading.com
    10. 10. Application & Processes: Cross Site Scripting and Injection Attacks Continue to Dominate <ul><ul><li>90% of injection attacks are attributed to SQL-related attacks </li></ul></ul><ul><ul><li>Automated toolkits continue to flourish in 2009 </li></ul></ul><ul><ul><li>SQL injection attacks continue to grow up 50% in Q1 2009 vs. Q4 2008 and nearly doubling in Q2 vs. Q1 </li></ul></ul>
    11. 11. Data & Information: Vulnerabilities in Document Readers Skyrocket <ul><ul><li>Portable Document Format (PDF) vulnerabilities disclosed in the first half of 2009 has already surpassed disclosures from all of 2008. </li></ul></ul><ul><ul><li>PDF disclosures traded places with Office document disclosures to take the top spot. </li></ul></ul><ul><li>Users trust .PDF more than .EXE </li></ul><ul><li>PDF exploits becoming a popular method of attack </li></ul>
    12. 15. La regulación y los riesgos para Casas de Bolsa
    13. 16. Artículos de CNBV <ul><li>Articulo 113 fracción V: “Control Interno” </li></ul><ul><ul><li>Medidas necesarias para prevenir y detectar, actos u operaciones con recursos, derechos o bienes que procedan o representen el producto de un probable delito </li></ul></ul><ul><ul><li>Salvaguarda de los activos </li></ul></ul><ul><li>Articulo 142 fracción II: “La administración del riesgo tecnológico” </li></ul><ul><ul><li>Evaluar vulnerabilidades tanto de hardware, software, sistemas, aplicaciones, seguridad, recuperación de información y redes </li></ul></ul><ul><ul><li>Implementación de controles internos </li></ul></ul><ul><ul><li>Mantener la seguridad e integridad de la información </li></ul></ul><ul><ul><li>Asegurar confidencialidad </li></ul></ul><ul><ul><li>Esquemas de control y políticas de operación, autorización y acceso a los sistemas, bases de datos y aplicaciones </li></ul></ul><ul><ul><li>Identificación y resolución de operaciones fraudulentas </li></ul></ul>
    14. 17. Los riesgos del sector financiero
    15. 19. IBM Security Framework
    16. 20. The IBM Security framework <ul><li>Is the only security vendor in the market with a end-to-end coverage of the security foundation </li></ul><ul><li>15,000 researchers, developers and SMEs on security initiatives </li></ul><ul><li>3,000 + security & risk management patents </li></ul><ul><li>200+ security customers reference and 50+ published cases </li></ul><ul><li>40+ years of proven sucess securing the Zseries enviorement </li></ul><ul><li>Already managing more than 2.5 billion security events per day for clients </li></ul><ul><li>$1.5 USD billion security spent in 2008 </li></ul>
    17. 21. IBM ISS Solutions 07/09/10 IBM has the unmatched local and global expertise to deliver complete solutions and manage the cost and complexity of security. In addition, X-force, IBM ISS’ security and development organization, is one of the best-known commercial groups in the world. It discovers 30-60% of all vulnerabilities and captures more than 2 billion events per day
    18. 22. IBM ISS security consulting solutions
    19. 23. Why IBM ISS Professional Security Services? <ul><li>Exclusive security focus and expertise </li></ul><ul><ul><li>Senior-Level consultants </li></ul></ul><ul><ul><li>Deep industry experience </li></ul></ul><ul><li>Average of 8.5 years of security experience, 6 years IBM ISS tenure </li></ul><ul><ul><li>Certified security experts with leadership, consulting, investigative, law enforcement and research and development backgrounds </li></ul></ul><ul><ul><li>Big 4, FBI, X-Force R&D, Government Agencies, Former CISOs </li></ul></ul><ul><li>Qualified Incident Response Company </li></ul><ul><ul><li>As a Qualified Incident Response Company, IBM ISS can assist organizations with security incidents involving payment card data </li></ul></ul><ul><li>Leverages security intelligence of IBM X-Force </li></ul><ul><li>Complete, quality deliverables </li></ul><ul><ul><li>Analysis, prioritization and remediation recommendations </li></ul></ul><ul><ul><li>Actionable recommendations </li></ul></ul><ul><ul><li>Results presented in both technical and management terms </li></ul></ul><ul><li>Proven methodology </li></ul>
    20. 24. ¿Cuánto vale su identidad? “ La identidad de Everardo Rodríguez fue robada, pero se la devolvieron”
    21. 25. Un Club Para Evitar http://www.privacyrights.org/ar/ChronDataBreaches.htm Organización Registros Comprometidos Colorado Health Dept 1,600 Eastman Kodak 5,800 MCI 16,500 Bank of America 18,000 CA Dept Health Services 21,600 Oklahoma State University 37,000 US Department of Justice 80,000 Univ of California, Berkley 98,400 San Jose Medical Center 185,000 ChoicePoint 145,000
    22. 26. Penetration Testing <ul><li>Quantifies risk to customer information, financial transactions, online applications and other critical business data and processes </li></ul><ul><li>Increases real-world perspective into hacker techniques and motivations </li></ul><ul><li>Encourages executive support on direction of information security strategy and resources </li></ul><ul><li>Identifies steps needed to effectively reduce risk </li></ul><ul><li>Provides the customer with insight into how technical vulnerabilities can lead to serious risks to their business </li></ul><ul><li>Helps to meet regulatory compliance requirements </li></ul>
    23. 27. Information Security Assessment <ul><li>Review of Network Security Architecture </li></ul><ul><ul><li>Assessment of current network security measures to get a clear picture of the current security state </li></ul></ul><ul><li>Review of Security Policies, Procedures and Practices </li></ul><ul><ul><li>Evaluation of current security processes in relation to ISO 17799 standards, industry best practices and business objectives </li></ul></ul><ul><li>Review of Technical Security Controls and Mechanisms </li></ul><ul><ul><li>Review of the effectiveness of existing security practices and mechanisms to recognize needed improvements </li></ul></ul><ul><li>External Vulnerability Testing </li></ul><ul><ul><li>External network scan to understand network security posture and determine vulnerabilities </li></ul></ul><ul><li>Internal Vulnerability Scan and Testing </li></ul><ul><ul><li>Internal network assessment to provide details on the vulnerability of critical assets </li></ul></ul><ul><li>Social Engineering Assessment </li></ul><ul><ul><li>Attempt to discover sensitive information by acting as a trusted employee or untrusted user </li></ul></ul>
    24. 28. Information Security Assessment II <ul><li>Physical Security Assessment </li></ul><ul><ul><li>Determination of how physical security can impact overall data and system security </li></ul></ul><ul><li>Modem Testing (“War Dialing”) </li></ul><ul><ul><li>Attempt to connect with modems by dialing a range of numbers </li></ul></ul><ul><li>Wireless Penetration Test </li></ul><ul><ul><li>Attempt to penetrate wireless devices to uncover vulnerabilities </li></ul></ul><ul><li>Wireless Assessment </li></ul><ul><ul><li>Test of wireless network environment to assess security </li></ul></ul><ul><li>Application Assessment </li></ul><ul><ul><li>Review of custom client/server applications to provide details on vulnerabilities </li></ul></ul><ul><li>Mainframe Assessment </li></ul><ul><ul><li>Identification of vulnerabilities within the mainframe environment </li></ul></ul>
    25. 29. Application Security Assessment <ul><li>Identifies application security issues before they are exploited </li></ul><ul><li>Prevents application downtime </li></ul><ul><ul><li>Finding and fixing application security weaknesses helps prevent critical business applications from downtime </li></ul></ul><ul><li>Increases real-world perspective into hacker techniques and motivations </li></ul><ul><li>Raises internal awareness of corporate liability and the importance of regulatory compliance </li></ul><ul><li>Encourages executive support on direction of information security strategy and resources </li></ul><ul><li>Helps to meet regulatory compliance requirements </li></ul><ul><li>Also think about PCI and PABP </li></ul>
    26. 30. IBM ISS product solutions
    27. 31. The X-Force Difference - Preemptive Protection & PSS
    28. 32. Microsoft Security Bulletins coverage by IBM ISS products <ul><li>http://xforce.iss.net/BulletinSummary.do?y=2009 </li></ul>
    29. 33. Performance Flexibility: IPS beyond the perimeter “… It is important to mandate that all ingress (inbound) traffic run through a segment of inline network intrusion protection. Trace packet flows to ensure that each packet entering your network passes through at least one IPS sensor… ”
    30. 34. IPS Proventia GX Appliances <ul><li>Solution to stop automatically intrusion attacks either internal or external, also the Proventia GX has the best performance in bandwidth utilization and network availability of the market. </li></ul>Proventia Network Multifunction Security <ul><li>Solution all-in-one to help the enforce the security </li></ul><ul><li>IPS </li></ul><ul><li>Firewall </li></ul><ul><li>Traditional Antivirus </li></ul><ul><li>Heuristic Antivirus </li></ul><ul><li>Anti-Spam </li></ul><ul><li>Filtrado de URL </li></ul><ul><li>VPN estándar y SSL </li></ul>
    31. 35. PAM drives security convergence in a single solution & eliminates point products <ul><li>Virtual Patch ™ : Shielding a vulnerability from exploitation independent of a software patch </li></ul><ul><li>Threat Detection & Prevention: Advanced intrusion prevention for zero-day attacks </li></ul><ul><li>Proventia Content Analysis: Monitors and identifies unencrypted personally identifiable information (PII) and other confidential data </li></ul><ul><li>Proventia Web application security: Protection for web apps, Web 2.0, databases (same protection as web application firewall) </li></ul><ul><li>Network Policy Enforcement: Reclaim bandwidth & block Skype, peer-to-peer networks, tunneling </li></ul>
    32. 36. Managing the agent overload
    33. 37. Proventia Desktop/Phoenix Rising Comparison Feature Proventia Desktop ESC Firewall   IPS   Behavioral AV   Signature AV   Anti-spyware   Extensible framework -  NAC -  DLP -  USB port control -  Patch management -  Asset discovery -  Vulnerability assessment -  Power management -  Configuration management -  Flexible systems management -  Software deployment/removal -  Security policy compliance - 
    34. 38. Case Study in Proventia ESC Savings: Financial Customer Moved from low 80% success rate to 95% success rate with real-time reporting ~5 minutes 1 4 1 week for all infrastructure 800 90,000 After Proventia ESC Key Matrix Before Proventia ESC The Results # of Managed Endpoints 40,000 out of 90,000 50K unknown endpoints Uncovered 50K previously unknown endpoints # of Locations 100+ Expanded locations by 700 Time to Install 8+ months for all infrastructure Saved more than 7 months for new agent installation # of Required Administrators 20 Reduced required admins by 1/5th # of Dedicated Servers 25 Reduced dedicated servers by 24 Time to complete an enterprise wide full discovery, remediation and reporting cycle ~7 days Saved 6 days, 23 hours, and 55 minutes for enterprise wide discovery…
    35. 39. IBM ISS service solutions
    36. 40. Virtual Security Operations Center (VSOC)
    37. 41. X-Force Protection System How IBM ISS Managed Security Services Work
    38. 42. Source: IBM Internet Security Systems, 2008 Security Management Monthly Annual Assumes full security staff of 10 providing 24x7x35 coverage, managing 12 HA Firewalls and 6 IDS engines, attending 2 training classes/yr, 20% employee turnover, equipment costs allocated over 3 years, and maintenance costing15% of total equipment costs. In this example, leveraging a managed protection provider yields a 55% savings over in-house security In-house ISS Managed Security Cost Savings $82,592 $37,671 $44,921 $995,102 $452,051 $543,051 Cost Savings at a Glance
    39. 43. Q&A
    40. 44. Thanks Juan Carlos Carrillo [email_address] 5270-6226 @juan_carrillo

    ×