SlideShare a Scribd company logo
1 of 3
Download to read offline
1 IBM Security
Security
Analytics
Threat
Intelligence
Mobile
Cloud
Mobile
Cloud
Security
Analytics
Threat
Intelligence
Security
Analytics
An integrated and intelligent security immune system
Indicators of compromise
Firewalls
Incident and threat management
Virtual patching
Sandboxing
Network visibility
Access management
Entitlements and roles
Identity management
Workload
protection
Cloud access
security broker
Privileged identity management
Data access control
Application security management
Application scanning
Data monitoring
Transaction protection
Device management
Content security
IP reputation Threat sharing
Criminal detection
Fraud protection
Endpoint patching and management
Malware protection
Antivirus
Anomaly detection
Vulnerability management Incident response
Log, flow, data analysis
2 IBM Security
SECURITY
ECOSYSTEM
SECURITY TRANSFORMATION SERVICES
Management consulting | Systems integration | Managed security
Security
Analytics
Threat
Intelligence
Mobile
Cloud
IBM has the world’s broadest and deepest security portfolio
Mobile
INFORMATION RISK
AND PROTECTION
Cloud Security Enforcer
Trusteer Rapport
Trusteer Mobile
Privileged Identity Manager
Access Manager
Identity Governance and Intelligence
Key Manager
DataPower
AppScan
Guardium
Trusteer Pinpoint
Cloud
Cloud Identity Service
MaaS360
Security
Analytics
Threat
Intelligence
App Exchange
X-Force Exchange
zSecure
BigFix
QRadar Incident Forensics
Network Protection XGS
Security
Analytics
QRadar Vulnerability Manager
QRadar SIEM QRadar Risk Manager
Resilient Incident Response
SECURITY OPERATIONS
AND RESPONSE
3 IBM Security
Industry analysts rank IBM Security
DOMAIN SEGMENT MARKET SEGMENT / REPORT
ANALYST
RANKINGS
Security Operations
and Response
Security Intelligence Security Information and Event Management (SIEM) LEADER
Network and
Endpoint Protection
Intrusion Prevention Systems (IPS) LEADER
Endpoint: Client Management Tools LEADER
Endpoint Protection Platforms (EPP) Strong Performer
Information Risk
and Protection
Identity Governance
and Access
Management
Federated Identity Management and Single Sign-On LEADER
Identity and Access Governance LEADER
Identity and Access Management as a Service (IDaaS) LEADER
Web Access Management (WAM) LEADER
Mobile Access Management LEADER
Identity Provisioning Management LEADER
Data Security Data Masking LEADER
Application Security Application Security Testing (dynamic and static) LEADER
Mobile Protection Enterprise Mobility Management (MaaS360) LEADER
Fraud Protection Web Fraud Detection (Trusteer) LEADER
Security
Transformation
Services
Consulting and
Managed Services
Managed Security Services (MSS) LEADER
Information Security Consulting Services LEADER
V2016-06-16Note: This is a collective view of top analyst rankings, compiled as of July, 2016

More Related Content

What's hot

Security is Hard
Security is HardSecurity is Hard
Security is HardMike Murray
 
Cybersaftey (1)
Cybersaftey (1)Cybersaftey (1)
Cybersaftey (1)ABELANIL1
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessIBM Security
 
How Cyber Attacks are Changing Security - CSE ISCWest 2017 - Matthew Rosenqui...
How Cyber Attacks are Changing Security - CSE ISCWest 2017 - Matthew Rosenqui...How Cyber Attacks are Changing Security - CSE ISCWest 2017 - Matthew Rosenqui...
How Cyber Attacks are Changing Security - CSE ISCWest 2017 - Matthew Rosenqui...Matthew Rosenquist
 
Security threats and countermeasures in daily life - Symantec
Security threats and countermeasures in daily life - SymantecSecurity threats and countermeasures in daily life - Symantec
Security threats and countermeasures in daily life - SymantecNatarajan V
 
Anatomy of a Targeted Attack against Mobile Device Management (MDM)
Anatomy of a Targeted Attack against Mobile Device Management (MDM)Anatomy of a Targeted Attack against Mobile Device Management (MDM)
Anatomy of a Targeted Attack against Mobile Device Management (MDM)Lacoon Mobile Security
 
The Top Three 2021 Cyber Threats
The Top Three 2021 Cyber ThreatsThe Top Three 2021 Cyber Threats
The Top Three 2021 Cyber ThreatsSai Huda
 
Mobile Defense Product Overview
Mobile Defense Product OverviewMobile Defense Product Overview
Mobile Defense Product OverviewGriffin
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watsonPrime Infoserv
 
Four Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud GenerationFour Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud GenerationAboutSSL
 
WISER: the European innovative framework on cybersecurity
WISER: the European innovative framework on cybersecurityWISER: the European innovative framework on cybersecurity
WISER: the European innovative framework on cybersecurityCYBERWISER .eu
 
Your Data Is Under Siege: Fortify Your Endpoints
Your Data Is Under Siege: Fortify Your EndpointsYour Data Is Under Siege: Fortify Your Endpoints
Your Data Is Under Siege: Fortify Your EndpointsInsight
 
Time based security for cloud computing
Time based security for cloud computingTime based security for cloud computing
Time based security for cloud computingJorge Sebastiao
 
Application Security
Application SecurityApplication Security
Application Securityonenolesguy
 
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges @AtchisonFrazer Enterprise Mobile Security Trends, Challenges
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges Atchison Frazer
 
Trend Micro - Hosted eMail Security
Trend Micro - Hosted eMail SecurityTrend Micro - Hosted eMail Security
Trend Micro - Hosted eMail SecurityTeddy Wijaya
 
Borderware Security Platform
Borderware Security PlatformBorderware Security Platform
Borderware Security Platformcostigaj
 
Cyber Guru Overview - en v1
Cyber Guru Overview - en v1Cyber Guru Overview - en v1
Cyber Guru Overview - en v1Gruppo Daman
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 

What's hot (20)

Security is Hard
Security is HardSecurity is Hard
Security is Hard
 
Cybersaftey (1)
Cybersaftey (1)Cybersaftey (1)
Cybersaftey (1)
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud Success
 
How Cyber Attacks are Changing Security - CSE ISCWest 2017 - Matthew Rosenqui...
How Cyber Attacks are Changing Security - CSE ISCWest 2017 - Matthew Rosenqui...How Cyber Attacks are Changing Security - CSE ISCWest 2017 - Matthew Rosenqui...
How Cyber Attacks are Changing Security - CSE ISCWest 2017 - Matthew Rosenqui...
 
Security threats and countermeasures in daily life - Symantec
Security threats and countermeasures in daily life - SymantecSecurity threats and countermeasures in daily life - Symantec
Security threats and countermeasures in daily life - Symantec
 
Anatomy of a Targeted Attack against Mobile Device Management (MDM)
Anatomy of a Targeted Attack against Mobile Device Management (MDM)Anatomy of a Targeted Attack against Mobile Device Management (MDM)
Anatomy of a Targeted Attack against Mobile Device Management (MDM)
 
The Top Three 2021 Cyber Threats
The Top Three 2021 Cyber ThreatsThe Top Three 2021 Cyber Threats
The Top Three 2021 Cyber Threats
 
Mobile Defense Product Overview
Mobile Defense Product OverviewMobile Defense Product Overview
Mobile Defense Product Overview
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
 
Four Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud GenerationFour Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud Generation
 
WISER: the European innovative framework on cybersecurity
WISER: the European innovative framework on cybersecurityWISER: the European innovative framework on cybersecurity
WISER: the European innovative framework on cybersecurity
 
Your Data Is Under Siege: Fortify Your Endpoints
Your Data Is Under Siege: Fortify Your EndpointsYour Data Is Under Siege: Fortify Your Endpoints
Your Data Is Under Siege: Fortify Your Endpoints
 
Time based security for cloud computing
Time based security for cloud computingTime based security for cloud computing
Time based security for cloud computing
 
Application Security
Application SecurityApplication Security
Application Security
 
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges @AtchisonFrazer Enterprise Mobile Security Trends, Challenges
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges
 
Trend Micro - Hosted eMail Security
Trend Micro - Hosted eMail SecurityTrend Micro - Hosted eMail Security
Trend Micro - Hosted eMail Security
 
Borderware Security Platform
Borderware Security PlatformBorderware Security Platform
Borderware Security Platform
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Guru Overview - en v1
Cyber Guru Overview - en v1Cyber Guru Overview - en v1
Cyber Guru Overview - en v1
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 

Similar to Security as an Immune System

5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016Francisco González Jiménez
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016IBM Security
 
Force 3 Software Practice Overview
Force 3 Software Practice OverviewForce 3 Software Practice Overview
Force 3 Software Practice OverviewForce 3
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerThierry Matusiak
 
Complete Security
Complete SecurityComplete Security
Complete SecuritySophos
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protectionxband
 
IBM Immune System
IBM Immune SystemIBM Immune System
IBM Immune SystemLuke Kenny
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...IBM Danmark
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overviewxband
 
IBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy SectorIBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy SectorFMA Summits
 
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumMobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumZimperium
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete SecurityCTI Group
 
IBM Security Software Solutions - Powerpoint
 IBM Security Software Solutions - Powerpoint IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - PowerpointThierry Matusiak
 
Complete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceComplete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceSoftchoice Corporation
 
Get the Most From Your Firewall
Get the Most From Your FirewallGet the Most From Your Firewall
Get the Most From Your FirewallSophos
 

Similar to Security as an Immune System (20)

5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
Force 3 Software Practice Overview
Force 3 Software Practice OverviewForce 3 Software Practice Overview
Force 3 Software Practice Overview
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One Pager
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Complete Security
Complete SecurityComplete Security
Complete Security
 
IBM Security Strategy
IBM Security StrategyIBM Security Strategy
IBM Security Strategy
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protection
 
IBM Immune System
IBM Immune SystemIBM Immune System
IBM Immune System
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
 
IBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy SectorIBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy Sector
 
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumMobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by Zimperium
 
IBM Security Immune System
IBM Security Immune SystemIBM Security Immune System
IBM Security Immune System
 
Aujas Cyber Security
Aujas Cyber SecurityAujas Cyber Security
Aujas Cyber Security
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete Security
 
IBM Security Software Solutions - Powerpoint
 IBM Security Software Solutions - Powerpoint IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - Powerpoint
 
Complete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceComplete Security with Sophos and Softchoice
Complete Security with Sophos and Softchoice
 
Get the Most From Your Firewall
Get the Most From Your FirewallGet the Most From Your Firewall
Get the Most From Your Firewall
 

Security as an Immune System

  • 1. 1 IBM Security Security Analytics Threat Intelligence Mobile Cloud Mobile Cloud Security Analytics Threat Intelligence Security Analytics An integrated and intelligent security immune system Indicators of compromise Firewalls Incident and threat management Virtual patching Sandboxing Network visibility Access management Entitlements and roles Identity management Workload protection Cloud access security broker Privileged identity management Data access control Application security management Application scanning Data monitoring Transaction protection Device management Content security IP reputation Threat sharing Criminal detection Fraud protection Endpoint patching and management Malware protection Antivirus Anomaly detection Vulnerability management Incident response Log, flow, data analysis
  • 2. 2 IBM Security SECURITY ECOSYSTEM SECURITY TRANSFORMATION SERVICES Management consulting | Systems integration | Managed security Security Analytics Threat Intelligence Mobile Cloud IBM has the world’s broadest and deepest security portfolio Mobile INFORMATION RISK AND PROTECTION Cloud Security Enforcer Trusteer Rapport Trusteer Mobile Privileged Identity Manager Access Manager Identity Governance and Intelligence Key Manager DataPower AppScan Guardium Trusteer Pinpoint Cloud Cloud Identity Service MaaS360 Security Analytics Threat Intelligence App Exchange X-Force Exchange zSecure BigFix QRadar Incident Forensics Network Protection XGS Security Analytics QRadar Vulnerability Manager QRadar SIEM QRadar Risk Manager Resilient Incident Response SECURITY OPERATIONS AND RESPONSE
  • 3. 3 IBM Security Industry analysts rank IBM Security DOMAIN SEGMENT MARKET SEGMENT / REPORT ANALYST RANKINGS Security Operations and Response Security Intelligence Security Information and Event Management (SIEM) LEADER Network and Endpoint Protection Intrusion Prevention Systems (IPS) LEADER Endpoint: Client Management Tools LEADER Endpoint Protection Platforms (EPP) Strong Performer Information Risk and Protection Identity Governance and Access Management Federated Identity Management and Single Sign-On LEADER Identity and Access Governance LEADER Identity and Access Management as a Service (IDaaS) LEADER Web Access Management (WAM) LEADER Mobile Access Management LEADER Identity Provisioning Management LEADER Data Security Data Masking LEADER Application Security Application Security Testing (dynamic and static) LEADER Mobile Protection Enterprise Mobility Management (MaaS360) LEADER Fraud Protection Web Fraud Detection (Trusteer) LEADER Security Transformation Services Consulting and Managed Services Managed Security Services (MSS) LEADER Information Security Consulting Services LEADER V2016-06-16Note: This is a collective view of top analyst rankings, compiled as of July, 2016