SlideShare a Scribd company logo
1 of 14
© 2015 IBM Corporation
Familia Guardium, Machine Learning y Outliers
Fernando Imperiale
Preventa Técnico
Security Advisor Argentina
October 6, 2015
La aguja en el pajar
2© 2015 IBM Corporation
Agenda
 IBM Infosphere Guardium Family
 Machine Learning y Outliers
 ¿Cómo nos ayuda?
 ¿Qué debo monitorear?
© 2015 IBM Corporation
IBM Infosphere Guardium Family
4© 2015 IBM Corporation
IBM Infosphere Guardium Family
 Los productos IBM InfoSphere Guardium
garantizan la seguridad, la privacidad y la
integridad de la información de sus centros de
datos.
 Estos productos de seguridad de datos admiten
entornos heterogéneos que incluyen bases de
datos, almacenes de datos, sistemas basados
en Hadoop y uso compartido de archivos para
aplicaciones empaquetadas y personalizadas
en todas las plataformas operativas líderes.
 IBM Security Guardium Data Activity Monitor
 IBM Security Guardium Data Encryption
 IBM Security Guardium Data Redaction
 IBM Security Guardium Vulnerability Assessment
© 2015 IBM Corporation
Machine Learning y Outliers
6© 2015 IBM Corporation
Machine Learning y Outliers
 Machine Learning o Aprendizaje automático:
– Modelos Geométricos
– Modelos Probabilísticos
– Modelos Lógicos
– Modelos de Agrupamiento
– Modelos de Gradiente
 Outliers o Valores Atípicos
– Indicativos
– Media
– Mediana
– Muestra al azar
© 2015 IBM Corporation
¿Cómo nos ayuda?
8© 2015 IBM Corporation
¿Cómo nos ayuda?
 Transacciones. (Actividades, Contextos, Grupo de comandos)
 Usando CRM. (Información de clientes, oportunidades)
 Usando SAP. (G/L Transactions, 1=52)
 Cumpliendo con SOX, HIPAA, FISMA, SAS, CMS, DISA S-TIG, PCI o
Leyes de privacidad de Datos.
 Oracle, Microsoft SQL Server, IBM DB2, Informix, Sybase ASE, and
Sybase IQ.
 What, Who, Where, When…
 Impacto < 5%
© 2015 IBM Corporation
¿Qué debo monitorear?
10© 2015 IBM Corporation
¿Qué debo monitorear?
 ¿Qué pasa si sólo superviso a los usuarios de privilegio?
 ¿Qué tipo de "valores atípicos" puedo obtener?
– Usted puede obtener buenos conocimientos sobre los patrones y el uso de los usuarios privilegiados.
• Elimina los datos sobrantes y mejora el enfoque.
• Lo usuarios que NO deben acceder a determinados datos de aplicación.
• ¿Qué usuarios privilegiados están "disfrazando" su actividad en SQL, que se ve "anormal“.
• Tiempo y horarios atípicos.
 ¿Qué pasa si sólo superviso objetos "sensibles"?
– Usted puede obtener buenos conocimientos sobre los patrones y el uso de "quién" esta accediendo a
estos objetos "sensibles".
• Patrones inusuales de acceso a estos objetos
• Horarios "atípicos“
• ¿Qué utilitarios, aplicaciones acceden a estos objetos?
11© 2015 IBM Corporation
Preguntas frecuentes
 ¿Cómo funciona la tecnología?
– Esta tecnología fue desarrollada en un centro de investigación de IBM. Esta lata de algoritmos, trabaja
en los datos "genéricos", como los registros de la máquina, etc. Sin embargo, han mejorado esta
tecnología para monitoreo de la actividad de base de datos.
– Se trata de un algoritmo propietario
 ¿Cuánto tiempo de una muestra tengo que correr para conseguir buenos resultados?
– En promedio, obtendrá buenos resultados después de cerca de 3 semanas de actividad, pero cuanto
más tiempo el sistema se ejecuta, el mayor tamaño de la muestra el algoritmo tiene de digerir.
– Esto significa que será tan preciso como el tamaño de muestra.
 Workflow Esperado:
– Alertas: Establecer alertas para horarios Anómalos (basado en Outliers Analytic).
– Auditoría: asignar Review Outliers (Definir proceso de auditoría en los reportes de Outliers Analítica) y
asignar a las funciones apropiadas para los grupos de usuarios.
© 2015 IBM Corporation
Call to action
 ¿Podemos hoy, con las herramientas disponibles, realizar todo esto?
¿Automáticamente?
 ¿Protejo la imagen de mi compañía, mis negocios y los datos de mis
clientes correctamente?
¿Soy vulnerable?
 ¿Puedo probarlo fácilmente?
¿Qué necesito?
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any
kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor
shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use
of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or
capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product
or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries
or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside
your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks
on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access.
IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other
systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE
IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
THANK YOU
www.ibm.com/security
Information concerning non-IBM products was obtained from the suppliers of those
products, their published announcements or other publicly available sources. IBM has
not tested those products in connection with this publication and cannot confirm the
accuracy of performance, compatibility or any other claims related to non-IBM products.
Questions on the capabilities of non-IBM products should be addressed to the suppliers
of those products. IBM does not warrant the quality of any third-party products, or the
ability of any such third-party products to interoperate with IBM’s products. IBM
EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED,
INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
The provision of the information contained herein is not intended to, and does not, grant
any right or license under any IBM patents, copyrights, trademarks or other intellectual
property right.
Other company, product, or service names may be trademarks or service marks of
others. A current list of IBM trademarks is available at “Copyright and
trademark information” www.ibm.com/legal/copytrade.shtml
Copyright © 2015 by International Business Machines Corporation (IBM). No part of this
document may be reproduced or transmitted in any form without written permission from
IBM.
U.S. Government Users Restricted Rights – Use, duplication or disclosure restricted by
GSA ADP Schedule Contract with IBM.
Information in these presentations (including information relating to products that have
not yet been announced by IBM) has been reviewed for accuracy as of the date of initial
publication and could include unintentional technical or typographical errors. IBM shall
have no responsibility to update this information. THIS document is distributed "AS IS"
without any warranty, either express or implied. In no event shall IBM be liable for any
damage arising from the use of this information, including but not limited to, loss of data,
business interruption, loss of profit or loss of opportunity.
IBM products and services are warranted according to the terms and conditions of the
agreements under which they are provided.
Any statements regarding IBM’s future direction, intent or product plans are subject to
change or withdrawal without notice. Performance data contained herein was generally
obtained in a controlled, isolated environments. Customer examples are presented as
illustrations of how those customers have used IBM products and the results they may
have achieved. Actual performance, cost, savings or other results in other operating
environments may vary. References in this document to IBM products, programs, or
services does not imply that IBM intends to make such products, programs or services
available in all countries in which IBM operates or does business.
Workshops, sessions and associated materials may have been prepared by independent
session speakers, and do not necessarily reflect the views of IBM. All materials and
discussions are provided for informational purposes only, and are neither intended to,
nor shall constitute legal or other guidance or advice to any individual participant or their
specific situation.
It is the customer’s responsibility to insure its own compliance with legal requirements
and to obtain advice of competent legal counsel as to the identification and interpretation
of any relevant laws and regulatory requirements that may affect the customer’s business
and any actions the customer may need to take to comply with such laws. IBM does not
provide legal advice or represent or warrant that its services or products will ensure that
the customer is in compliance with any law.
Legal notices and disclaimers

More Related Content

What's hot

Complete Solutions in ECM using IBM, Internal and Third Party, Custom Components
Complete Solutions in ECM using IBM, Internal and Third Party, Custom ComponentsComplete Solutions in ECM using IBM, Internal and Third Party, Custom Components
Complete Solutions in ECM using IBM, Internal and Third Party, Custom ComponentsPyramid Solutions, Inc.
 
OpenWhisk Part 2 Research Day at Interconnect 2017
OpenWhisk Part 2 Research Day at Interconnect 2017OpenWhisk Part 2 Research Day at Interconnect 2017
OpenWhisk Part 2 Research Day at Interconnect 2017Perry Cheng
 
CrossIdeas Roadshow IBM IAM Governance Andrea Rossi
CrossIdeas Roadshow IBM IAM Governance Andrea RossiCrossIdeas Roadshow IBM IAM Governance Andrea Rossi
CrossIdeas Roadshow IBM IAM Governance Andrea RossiIBM Sverige
 
4789 creating production-ready, secure and scalable applications in ibm cloud...
4789 creating production-ready, secure and scalable applications in ibm cloud...4789 creating production-ready, secure and scalable applications in ibm cloud...
4789 creating production-ready, secure and scalable applications in ibm cloud...Shikha Srivastava
 
Improving Software Delivery with Software Defined Environments (IBM Interconn...
Improving Software Delivery with Software Defined Environments (IBM Interconn...Improving Software Delivery with Software Defined Environments (IBM Interconn...
Improving Software Delivery with Software Defined Environments (IBM Interconn...Michael Elder
 
Advanced Mobile Content Collaboration with BOX.NET
Advanced Mobile Content Collaboration with BOX.NETAdvanced Mobile Content Collaboration with BOX.NET
Advanced Mobile Content Collaboration with BOX.NETAGILLY
 
OpenWhisk ChatBot InterConnect 2017
OpenWhisk ChatBot InterConnect 2017OpenWhisk ChatBot InterConnect 2017
OpenWhisk ChatBot InterConnect 2017Perry Cheng
 
DESY's new data taking and analysis infrastructure for PETRA III
DESY's new data taking and analysis infrastructure for PETRA IIIDESY's new data taking and analysis infrastructure for PETRA III
DESY's new data taking and analysis infrastructure for PETRA IIIUlf Troppens
 
Why z/OS is a great platform for developing and hosting APIs
Why z/OS is a great platform for developing and hosting APIsWhy z/OS is a great platform for developing and hosting APIs
Why z/OS is a great platform for developing and hosting APIsTeodoro Cipresso
 
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiCrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiIBM Sverige
 
Lotusphere 2007 AD405 -Increase yourIBM Lotus Notes Application ROI through C...
Lotusphere 2007 AD405 -Increase yourIBM Lotus Notes Application ROI through C...Lotusphere 2007 AD405 -Increase yourIBM Lotus Notes Application ROI through C...
Lotusphere 2007 AD405 -Increase yourIBM Lotus Notes Application ROI through C...dominion
 
DEV-1223: Socialytics: Accelerating IBM Connections Adoption with Watson Anal...
DEV-1223: Socialytics: Accelerating IBM Connections Adoption with Watson Anal...DEV-1223: Socialytics: Accelerating IBM Connections Adoption with Watson Anal...
DEV-1223: Socialytics: Accelerating IBM Connections Adoption with Watson Anal...panagenda
 
DEV-1269: Best and Worst Practices for Deploying IBM Connections – IBM Conne...
DEV-1269: Best and Worst Practices for Deploying IBM Connections  – IBM Conne...DEV-1269: Best and Worst Practices for Deploying IBM Connections  – IBM Conne...
DEV-1269: Best and Worst Practices for Deploying IBM Connections – IBM Conne...panagenda
 
IBM UrbanCode Deploy and VMware Integrated OpenStack
IBM UrbanCode Deploy and VMware Integrated OpenStackIBM UrbanCode Deploy and VMware Integrated OpenStack
IBM UrbanCode Deploy and VMware Integrated OpenStackBradDesAulniers2
 
Rapid Deployments of IBM WebSphere ND at Scale
Rapid Deployments of IBM WebSphere ND at ScaleRapid Deployments of IBM WebSphere ND at Scale
Rapid Deployments of IBM WebSphere ND at ScaleYK Chang
 

What's hot (19)

Complete Solutions in ECM using IBM, Internal and Third Party, Custom Components
Complete Solutions in ECM using IBM, Internal and Third Party, Custom ComponentsComplete Solutions in ECM using IBM, Internal and Third Party, Custom Components
Complete Solutions in ECM using IBM, Internal and Third Party, Custom Components
 
OpenWhisk Part 2 Research Day at Interconnect 2017
OpenWhisk Part 2 Research Day at Interconnect 2017OpenWhisk Part 2 Research Day at Interconnect 2017
OpenWhisk Part 2 Research Day at Interconnect 2017
 
CrossIdeas Roadshow IBM IAM Governance Andrea Rossi
CrossIdeas Roadshow IBM IAM Governance Andrea RossiCrossIdeas Roadshow IBM IAM Governance Andrea Rossi
CrossIdeas Roadshow IBM IAM Governance Andrea Rossi
 
Identity Governance Solutions
Identity Governance SolutionsIdentity Governance Solutions
Identity Governance Solutions
 
4789 creating production-ready, secure and scalable applications in ibm cloud...
4789 creating production-ready, secure and scalable applications in ibm cloud...4789 creating production-ready, secure and scalable applications in ibm cloud...
4789 creating production-ready, secure and scalable applications in ibm cloud...
 
Improving Software Delivery with Software Defined Environments (IBM Interconn...
Improving Software Delivery with Software Defined Environments (IBM Interconn...Improving Software Delivery with Software Defined Environments (IBM Interconn...
Improving Software Delivery with Software Defined Environments (IBM Interconn...
 
Why Ibm cloud private
Why Ibm cloud private Why Ibm cloud private
Why Ibm cloud private
 
Advanced Mobile Content Collaboration with BOX.NET
Advanced Mobile Content Collaboration with BOX.NETAdvanced Mobile Content Collaboration with BOX.NET
Advanced Mobile Content Collaboration with BOX.NET
 
OpenWhisk ChatBot InterConnect 2017
OpenWhisk ChatBot InterConnect 2017OpenWhisk ChatBot InterConnect 2017
OpenWhisk ChatBot InterConnect 2017
 
DESY's new data taking and analysis infrastructure for PETRA III
DESY's new data taking and analysis infrastructure for PETRA IIIDESY's new data taking and analysis infrastructure for PETRA III
DESY's new data taking and analysis infrastructure for PETRA III
 
2829 liberty
2829 liberty2829 liberty
2829 liberty
 
Why z/OS is a great platform for developing and hosting APIs
Why z/OS is a great platform for developing and hosting APIsWhy z/OS is a great platform for developing and hosting APIs
Why z/OS is a great platform for developing and hosting APIs
 
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiCrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
 
WOW2016_3963
WOW2016_3963WOW2016_3963
WOW2016_3963
 
Lotusphere 2007 AD405 -Increase yourIBM Lotus Notes Application ROI through C...
Lotusphere 2007 AD405 -Increase yourIBM Lotus Notes Application ROI through C...Lotusphere 2007 AD405 -Increase yourIBM Lotus Notes Application ROI through C...
Lotusphere 2007 AD405 -Increase yourIBM Lotus Notes Application ROI through C...
 
DEV-1223: Socialytics: Accelerating IBM Connections Adoption with Watson Anal...
DEV-1223: Socialytics: Accelerating IBM Connections Adoption with Watson Anal...DEV-1223: Socialytics: Accelerating IBM Connections Adoption with Watson Anal...
DEV-1223: Socialytics: Accelerating IBM Connections Adoption with Watson Anal...
 
DEV-1269: Best and Worst Practices for Deploying IBM Connections – IBM Conne...
DEV-1269: Best and Worst Practices for Deploying IBM Connections  – IBM Conne...DEV-1269: Best and Worst Practices for Deploying IBM Connections  – IBM Conne...
DEV-1269: Best and Worst Practices for Deploying IBM Connections – IBM Conne...
 
IBM UrbanCode Deploy and VMware Integrated OpenStack
IBM UrbanCode Deploy and VMware Integrated OpenStackIBM UrbanCode Deploy and VMware Integrated OpenStack
IBM UrbanCode Deploy and VMware Integrated OpenStack
 
Rapid Deployments of IBM WebSphere ND at Scale
Rapid Deployments of IBM WebSphere ND at ScaleRapid Deployments of IBM WebSphere ND at Scale
Rapid Deployments of IBM WebSphere ND at Scale
 

Viewers also liked

Clustering CDS: algorithms, distances, stability and convergence rates
Clustering CDS: algorithms, distances, stability and convergence ratesClustering CDS: algorithms, distances, stability and convergence rates
Clustering CDS: algorithms, distances, stability and convergence ratesGautier Marti
 
Health & safety officer performance appraisal
Health & safety officer performance appraisalHealth & safety officer performance appraisal
Health & safety officer performance appraisalsandersjamie999
 
Nutrifit parcial vane
Nutrifit parcial vaneNutrifit parcial vane
Nutrifit parcial vanevanessaghia12
 
SuperMaraton - Session 9 - IBM AppScan - Fernando Imperiale v2
SuperMaraton - Session 9 - IBM AppScan - Fernando Imperiale v2SuperMaraton - Session 9 - IBM AppScan - Fernando Imperiale v2
SuperMaraton - Session 9 - IBM AppScan - Fernando Imperiale v2Fernando M. Imperiale
 
International Coaching News article page 3
International Coaching News article page 3International Coaching News article page 3
International Coaching News article page 3Christine Charles
 
Carla Casilli - Cineca + open badges - May 2015
Carla Casilli - Cineca + open badges - May 2015Carla Casilli - Cineca + open badges - May 2015
Carla Casilli - Cineca + open badges - May 2015Bestr
 
On the stability of clustering financial time series
On the stability of clustering financial time seriesOn the stability of clustering financial time series
On the stability of clustering financial time seriesGautier Marti
 
integrating climate risks in agricultural value chains enamul haque
integrating climate risks in agricultural value chains   enamul haqueintegrating climate risks in agricultural value chains   enamul haque
integrating climate risks in agricultural value chains enamul haqueEnamul Haque
 
IBM - Security Intelligence para PYMES
IBM - Security Intelligence para PYMESIBM - Security Intelligence para PYMES
IBM - Security Intelligence para PYMESFernando M. Imperiale
 
Geography 372 Final Presentation
Geography 372 Final PresentationGeography 372 Final Presentation
Geography 372 Final PresentationMac Ferrick
 
National Development 5.15.15
National Development 5.15.15National Development 5.15.15
National Development 5.15.15Jack Murray III
 
Here be dragons
Here be dragonsHere be dragons
Here be dragonsdeelay1
 
Searching for the grey gold - 2013
Searching for the grey gold - 2013Searching for the grey gold - 2013
Searching for the grey gold - 2013Olle Bergendahl
 
2015年3月の中国からGitHubへのDDoS攻撃(MITM)の概要
2015年3月の中国からGitHubへのDDoS攻撃(MITM)の概要2015年3月の中国からGitHubへのDDoS攻撃(MITM)の概要
2015年3月の中国からGitHubへのDDoS攻撃(MITM)の概要Zimb_
 
Bartha_Éva_Lili-A_matroid_és_gráfelmélet_összefüggései - MSc_Diplomamunka
Bartha_Éva_Lili-A_matroid_és_gráfelmélet_összefüggései - MSc_DiplomamunkaBartha_Éva_Lili-A_matroid_és_gráfelmélet_összefüggései - MSc_Diplomamunka
Bartha_Éva_Lili-A_matroid_és_gráfelmélet_összefüggései - MSc_DiplomamunkaLili Eva Bartha
 
Fernando Imperiale - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMESFernando Imperiale - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMESFernando M. Imperiale
 
Neurological considerations
Neurological considerationsNeurological considerations
Neurological considerationsJess Sarabia
 
Fernando Imperiale - Una aguja en el pajar
Fernando Imperiale - Una aguja en el pajarFernando Imperiale - Una aguja en el pajar
Fernando Imperiale - Una aguja en el pajarFernando M. Imperiale
 

Viewers also liked (20)

EColi_CaseStudyRoughDraft.docx
EColi_CaseStudyRoughDraft.docxEColi_CaseStudyRoughDraft.docx
EColi_CaseStudyRoughDraft.docx
 
Cv bank pa
Cv bank paCv bank pa
Cv bank pa
 
Clustering CDS: algorithms, distances, stability and convergence rates
Clustering CDS: algorithms, distances, stability and convergence ratesClustering CDS: algorithms, distances, stability and convergence rates
Clustering CDS: algorithms, distances, stability and convergence rates
 
Health & safety officer performance appraisal
Health & safety officer performance appraisalHealth & safety officer performance appraisal
Health & safety officer performance appraisal
 
Nutrifit parcial vane
Nutrifit parcial vaneNutrifit parcial vane
Nutrifit parcial vane
 
SuperMaraton - Session 9 - IBM AppScan - Fernando Imperiale v2
SuperMaraton - Session 9 - IBM AppScan - Fernando Imperiale v2SuperMaraton - Session 9 - IBM AppScan - Fernando Imperiale v2
SuperMaraton - Session 9 - IBM AppScan - Fernando Imperiale v2
 
International Coaching News article page 3
International Coaching News article page 3International Coaching News article page 3
International Coaching News article page 3
 
Carla Casilli - Cineca + open badges - May 2015
Carla Casilli - Cineca + open badges - May 2015Carla Casilli - Cineca + open badges - May 2015
Carla Casilli - Cineca + open badges - May 2015
 
On the stability of clustering financial time series
On the stability of clustering financial time seriesOn the stability of clustering financial time series
On the stability of clustering financial time series
 
integrating climate risks in agricultural value chains enamul haque
integrating climate risks in agricultural value chains   enamul haqueintegrating climate risks in agricultural value chains   enamul haque
integrating climate risks in agricultural value chains enamul haque
 
IBM - Security Intelligence para PYMES
IBM - Security Intelligence para PYMESIBM - Security Intelligence para PYMES
IBM - Security Intelligence para PYMES
 
Geography 372 Final Presentation
Geography 372 Final PresentationGeography 372 Final Presentation
Geography 372 Final Presentation
 
National Development 5.15.15
National Development 5.15.15National Development 5.15.15
National Development 5.15.15
 
Here be dragons
Here be dragonsHere be dragons
Here be dragons
 
Searching for the grey gold - 2013
Searching for the grey gold - 2013Searching for the grey gold - 2013
Searching for the grey gold - 2013
 
2015年3月の中国からGitHubへのDDoS攻撃(MITM)の概要
2015年3月の中国からGitHubへのDDoS攻撃(MITM)の概要2015年3月の中国からGitHubへのDDoS攻撃(MITM)の概要
2015年3月の中国からGitHubへのDDoS攻撃(MITM)の概要
 
Bartha_Éva_Lili-A_matroid_és_gráfelmélet_összefüggései - MSc_Diplomamunka
Bartha_Éva_Lili-A_matroid_és_gráfelmélet_összefüggései - MSc_DiplomamunkaBartha_Éva_Lili-A_matroid_és_gráfelmélet_összefüggései - MSc_Diplomamunka
Bartha_Éva_Lili-A_matroid_és_gráfelmélet_összefüggései - MSc_Diplomamunka
 
Fernando Imperiale - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMESFernando Imperiale - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMES
 
Neurological considerations
Neurological considerationsNeurological considerations
Neurological considerations
 
Fernando Imperiale - Una aguja en el pajar
Fernando Imperiale - Una aguja en el pajarFernando Imperiale - Una aguja en el pajar
Fernando Imperiale - Una aguja en el pajar
 

Similar to Fernando Imperiale - Una aguja en el pajar

DMT-2467 Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...
DMT-2467	Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...DMT-2467	Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...
DMT-2467 Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...IBM Rational software
 
OpenTechSummit InterConnect2015 DevOps
OpenTechSummit InterConnect2015 DevOpsOpenTechSummit InterConnect2015 DevOps
OpenTechSummit InterConnect2015 DevOpsSanjeev Sharma
 
Insight_Session_2734_Presentation_Final
Insight_Session_2734_Presentation_FinalInsight_Session_2734_Presentation_Final
Insight_Session_2734_Presentation_FinalKaren He
 
Witness the Evolution of Teamwork
Witness the Evolution of TeamworkWitness the Evolution of Teamwork
Witness the Evolution of TeamworkMatt Holitza
 
Aligning the Fast & the Slow: The Reality of Multi-Speed IT
Aligning the Fast & the Slow: The Reality of Multi-Speed ITAligning the Fast & the Slow: The Reality of Multi-Speed IT
Aligning the Fast & the Slow: The Reality of Multi-Speed ITDevOps for Enterprise Systems
 
TI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloudTI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloudVincent Burckhardt
 
4515 Modernize your CICS applications for Mobile and Cloud
4515 Modernize your CICS applications for Mobile and Cloud4515 Modernize your CICS applications for Mobile and Cloud
4515 Modernize your CICS applications for Mobile and Cloudnick_garrod
 
MOB-1298_How to Harness Human Data and Insights to Develop Better Mobile Expe...
MOB-1298_How to Harness Human Data and Insights to Develop Better Mobile Expe...MOB-1298_How to Harness Human Data and Insights to Develop Better Mobile Expe...
MOB-1298_How to Harness Human Data and Insights to Develop Better Mobile Expe...Karen He
 
Capgemini Connected Car Demo Using IBM Internet of Things Foundation on Bluemix
Capgemini Connected Car Demo Using IBM Internet of Things Foundation on BluemixCapgemini Connected Car Demo Using IBM Internet of Things Foundation on Bluemix
Capgemini Connected Car Demo Using IBM Internet of Things Foundation on BluemixCapgemini
 
Vision 2016 fpm 1081 - getting data from sap business warehouse into your ibm...
Vision 2016 fpm 1081 - getting data from sap business warehouse into your ibm...Vision 2016 fpm 1081 - getting data from sap business warehouse into your ibm...
Vision 2016 fpm 1081 - getting data from sap business warehouse into your ibm...paul young cpa, cga
 
Unifying the Silos: Optimize your Data Pipeline for Analytics and AI
Unifying the Silos: Optimize your Data Pipeline for Analytics and AIUnifying the Silos: Optimize your Data Pipeline for Analytics and AI
Unifying the Silos: Optimize your Data Pipeline for Analytics and AIDataWorks Summit
 
IBM Design Thinking + Agile + DevOps Interconnect 2017
IBM Design Thinking + Agile + DevOps Interconnect 2017IBM Design Thinking + Agile + DevOps Interconnect 2017
IBM Design Thinking + Agile + DevOps Interconnect 2017David Luke
 
Big Data Requires Big Protection
Big Data Requires Big ProtectionBig Data Requires Big Protection
Big Data Requires Big ProtectionIBM Security
 
InterConnect 2017 : z/OS-as-a-Service: The Disposable LPAR
InterConnect 2017 : z/OS-as-a-Service: The Disposable LPARInterConnect 2017 : z/OS-as-a-Service: The Disposable LPAR
InterConnect 2017 : z/OS-as-a-Service: The Disposable LPARDevOps for Enterprise Systems
 
Build cognitive Apps that help enhance, scale and accelerate Human Expertise
Build cognitive Apps that help enhance, scale and accelerate Human ExpertiseBuild cognitive Apps that help enhance, scale and accelerate Human Expertise
Build cognitive Apps that help enhance, scale and accelerate Human ExpertiseNiklas Heidloff
 
SAP guided workflow in IBM BPM
SAP guided workflow in IBM BPMSAP guided workflow in IBM BPM
SAP guided workflow in IBM BPMsflynn073
 
App infrastructure &_integration_keynote_final
App infrastructure &_integration_keynote_finalApp infrastructure &_integration_keynote_final
App infrastructure &_integration_keynote_finaleileendohertysmith
 
Enabling Big Data with IBM InfoSphere Optim
Enabling Big Data with IBM InfoSphere OptimEnabling Big Data with IBM InfoSphere Optim
Enabling Big Data with IBM InfoSphere OptimVineet
 

Similar to Fernando Imperiale - Una aguja en el pajar (20)

DMT-2467 Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...
DMT-2467	Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...DMT-2467	Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...
DMT-2467 Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...
 
OpenTechSummit InterConnect2015 DevOps
OpenTechSummit InterConnect2015 DevOpsOpenTechSummit InterConnect2015 DevOps
OpenTechSummit InterConnect2015 DevOps
 
Insight_Session_2734_Presentation_Final
Insight_Session_2734_Presentation_FinalInsight_Session_2734_Presentation_Final
Insight_Session_2734_Presentation_Final
 
Witness the Evolution of Teamwork
Witness the Evolution of TeamworkWitness the Evolution of Teamwork
Witness the Evolution of Teamwork
 
Aligning the Fast & the Slow: The Reality of Multi-Speed IT
Aligning the Fast & the Slow: The Reality of Multi-Speed ITAligning the Fast & the Slow: The Reality of Multi-Speed IT
Aligning the Fast & the Slow: The Reality of Multi-Speed IT
 
TI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloudTI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloud
 
4515 Modernize your CICS applications for Mobile and Cloud
4515 Modernize your CICS applications for Mobile and Cloud4515 Modernize your CICS applications for Mobile and Cloud
4515 Modernize your CICS applications for Mobile and Cloud
 
MOB-1298_How to Harness Human Data and Insights to Develop Better Mobile Expe...
MOB-1298_How to Harness Human Data and Insights to Develop Better Mobile Expe...MOB-1298_How to Harness Human Data and Insights to Develop Better Mobile Expe...
MOB-1298_How to Harness Human Data and Insights to Develop Better Mobile Expe...
 
IBM Security SaaS IaaS and PaaS
IBM Security SaaS IaaS and PaaSIBM Security SaaS IaaS and PaaS
IBM Security SaaS IaaS and PaaS
 
Session 6050
Session 6050Session 6050
Session 6050
 
Capgemini Connected Car Demo Using IBM Internet of Things Foundation on Bluemix
Capgemini Connected Car Demo Using IBM Internet of Things Foundation on BluemixCapgemini Connected Car Demo Using IBM Internet of Things Foundation on Bluemix
Capgemini Connected Car Demo Using IBM Internet of Things Foundation on Bluemix
 
Vision 2016 fpm 1081 - getting data from sap business warehouse into your ibm...
Vision 2016 fpm 1081 - getting data from sap business warehouse into your ibm...Vision 2016 fpm 1081 - getting data from sap business warehouse into your ibm...
Vision 2016 fpm 1081 - getting data from sap business warehouse into your ibm...
 
Unifying the Silos: Optimize your Data Pipeline for Analytics and AI
Unifying the Silos: Optimize your Data Pipeline for Analytics and AIUnifying the Silos: Optimize your Data Pipeline for Analytics and AI
Unifying the Silos: Optimize your Data Pipeline for Analytics and AI
 
IBM Design Thinking + Agile + DevOps Interconnect 2017
IBM Design Thinking + Agile + DevOps Interconnect 2017IBM Design Thinking + Agile + DevOps Interconnect 2017
IBM Design Thinking + Agile + DevOps Interconnect 2017
 
Big Data Requires Big Protection
Big Data Requires Big ProtectionBig Data Requires Big Protection
Big Data Requires Big Protection
 
InterConnect 2017 : z/OS-as-a-Service: The Disposable LPAR
InterConnect 2017 : z/OS-as-a-Service: The Disposable LPARInterConnect 2017 : z/OS-as-a-Service: The Disposable LPAR
InterConnect 2017 : z/OS-as-a-Service: The Disposable LPAR
 
Build cognitive Apps that help enhance, scale and accelerate Human Expertise
Build cognitive Apps that help enhance, scale and accelerate Human ExpertiseBuild cognitive Apps that help enhance, scale and accelerate Human Expertise
Build cognitive Apps that help enhance, scale and accelerate Human Expertise
 
SAP guided workflow in IBM BPM
SAP guided workflow in IBM BPMSAP guided workflow in IBM BPM
SAP guided workflow in IBM BPM
 
App infrastructure &_integration_keynote_final
App infrastructure &_integration_keynote_finalApp infrastructure &_integration_keynote_final
App infrastructure &_integration_keynote_final
 
Enabling Big Data with IBM InfoSphere Optim
Enabling Big Data with IBM InfoSphere OptimEnabling Big Data with IBM InfoSphere Optim
Enabling Big Data with IBM InfoSphere Optim
 

Fernando Imperiale - Una aguja en el pajar

  • 1. © 2015 IBM Corporation Familia Guardium, Machine Learning y Outliers Fernando Imperiale Preventa Técnico Security Advisor Argentina October 6, 2015 La aguja en el pajar
  • 2. 2© 2015 IBM Corporation Agenda  IBM Infosphere Guardium Family  Machine Learning y Outliers  ¿Cómo nos ayuda?  ¿Qué debo monitorear?
  • 3. © 2015 IBM Corporation IBM Infosphere Guardium Family
  • 4. 4© 2015 IBM Corporation IBM Infosphere Guardium Family  Los productos IBM InfoSphere Guardium garantizan la seguridad, la privacidad y la integridad de la información de sus centros de datos.  Estos productos de seguridad de datos admiten entornos heterogéneos que incluyen bases de datos, almacenes de datos, sistemas basados en Hadoop y uso compartido de archivos para aplicaciones empaquetadas y personalizadas en todas las plataformas operativas líderes.  IBM Security Guardium Data Activity Monitor  IBM Security Guardium Data Encryption  IBM Security Guardium Data Redaction  IBM Security Guardium Vulnerability Assessment
  • 5. © 2015 IBM Corporation Machine Learning y Outliers
  • 6. 6© 2015 IBM Corporation Machine Learning y Outliers  Machine Learning o Aprendizaje automático: – Modelos Geométricos – Modelos Probabilísticos – Modelos Lógicos – Modelos de Agrupamiento – Modelos de Gradiente  Outliers o Valores Atípicos – Indicativos – Media – Mediana – Muestra al azar
  • 7. © 2015 IBM Corporation ¿Cómo nos ayuda?
  • 8. 8© 2015 IBM Corporation ¿Cómo nos ayuda?  Transacciones. (Actividades, Contextos, Grupo de comandos)  Usando CRM. (Información de clientes, oportunidades)  Usando SAP. (G/L Transactions, 1=52)  Cumpliendo con SOX, HIPAA, FISMA, SAS, CMS, DISA S-TIG, PCI o Leyes de privacidad de Datos.  Oracle, Microsoft SQL Server, IBM DB2, Informix, Sybase ASE, and Sybase IQ.  What, Who, Where, When…  Impacto < 5%
  • 9. © 2015 IBM Corporation ¿Qué debo monitorear?
  • 10. 10© 2015 IBM Corporation ¿Qué debo monitorear?  ¿Qué pasa si sólo superviso a los usuarios de privilegio?  ¿Qué tipo de "valores atípicos" puedo obtener? – Usted puede obtener buenos conocimientos sobre los patrones y el uso de los usuarios privilegiados. • Elimina los datos sobrantes y mejora el enfoque. • Lo usuarios que NO deben acceder a determinados datos de aplicación. • ¿Qué usuarios privilegiados están "disfrazando" su actividad en SQL, que se ve "anormal“. • Tiempo y horarios atípicos.  ¿Qué pasa si sólo superviso objetos "sensibles"? – Usted puede obtener buenos conocimientos sobre los patrones y el uso de "quién" esta accediendo a estos objetos "sensibles". • Patrones inusuales de acceso a estos objetos • Horarios "atípicos“ • ¿Qué utilitarios, aplicaciones acceden a estos objetos?
  • 11. 11© 2015 IBM Corporation Preguntas frecuentes  ¿Cómo funciona la tecnología? – Esta tecnología fue desarrollada en un centro de investigación de IBM. Esta lata de algoritmos, trabaja en los datos "genéricos", como los registros de la máquina, etc. Sin embargo, han mejorado esta tecnología para monitoreo de la actividad de base de datos. – Se trata de un algoritmo propietario  ¿Cuánto tiempo de una muestra tengo que correr para conseguir buenos resultados? – En promedio, obtendrá buenos resultados después de cerca de 3 semanas de actividad, pero cuanto más tiempo el sistema se ejecuta, el mayor tamaño de la muestra el algoritmo tiene de digerir. – Esto significa que será tan preciso como el tamaño de muestra.  Workflow Esperado: – Alertas: Establecer alertas para horarios Anómalos (basado en Outliers Analytic). – Auditoría: asignar Review Outliers (Definir proceso de auditoría en los reportes de Outliers Analítica) y asignar a las funciones apropiadas para los grupos de usuarios.
  • 12. © 2015 IBM Corporation Call to action  ¿Podemos hoy, con las herramientas disponibles, realizar todo esto? ¿Automáticamente?  ¿Protejo la imagen de mi compañía, mis negocios y los datos de mis clientes correctamente? ¿Soy vulnerable?  ¿Puedo probarlo fácilmente? ¿Qué necesito?
  • 13. © Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. THANK YOU www.ibm.com/security
  • 14. Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right. Other company, product, or service names may be trademarks or service marks of others. A current list of IBM trademarks is available at “Copyright and trademark information” www.ibm.com/legal/copytrade.shtml Copyright © 2015 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM. U.S. Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM. Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS document is distributed "AS IS" without any warranty, either express or implied. In no event shall IBM be liable for any damage arising from the use of this information, including but not limited to, loss of data, business interruption, loss of profit or loss of opportunity. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided. Any statements regarding IBM’s future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation. It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law. Legal notices and disclaimers