SlideShare a Scribd company logo
1 of 6
Download to read offline
IBM Global Technology Services                                      IBM Security Services
Thought Leadership White Paper




Leveraging security from the cloud
The who, what, when, why and how of cloud-based security services
2   Leveraging security from the cloud




Introduction                                                        security from the cloud offers customers the best of both
Today’s executives understand the need for information              worlds. They gain access to sophisticated security technology
security but still struggle to manage the cost and complexity of    and up-to-the-minute security intelligence without the capital
a myriad of security technologies for everything from threat        expense, overhead and management responsibility associated
prevention to email security, vulnerability scanning and            with on-premise solutions.
security event and log management. While important to a
comprehensive security strategy, implementing and managing          Discovering the “who, what, when, where, why and how” of
these solutions can divert IT resources from other critical ini-    cloud-based security services reveals how security can be used
tiatives. And organizations with smaller budgets may not even       to reduce risk, optimize resources, improve flexibility and
be able to consider sophisticated defense-in-depth security         address regulatory requirements—without breaking the bank.
solutions. Cloud computing provides a delivery model for
security that addresses many of these challenges for businesses     Who benefits from security delivered via
large and small.                                                    the cloud?
                                                                    Security threats and weaknesses do not recognize vertical
Cloud computing is a flexible, cost-effective and proven deliv-      industry boundaries or discriminate between small and large
ery platform for providing business or consumer IT services         companies. However, advanced security technologies are usu-
over the Internet. Cloud resources can be rapidly deployed          ally confined to larger organizations with the budget and
and easily scaled, with all processes, applications and             expertise required to install, manage and monitor advanced
services provisioned “on demand,” regardless of user                enterprise solutions. As a result, many organizations lack pro-
location or device. As a result, cloud computing helps              tection against new threats based on a shortage of resources,
organizations increase service delivery efficiency, streamline      not for intent or negligence.
IT management and better align IT services with dynamic
business requirements.                                              Cloud-based security services benefit the largest enterprises, as
                                                                    well as small and medium-size businesses. Relative to on-
When it comes to delivering information security, cloud com-        premise security software, cloud security requires little to no
puting provides several advantages relative to on-premise           up-front capital investment and deployment costs; and the
security software and appliances. Cloud-based security services     cloud delivery model lowers ongoing operational management
(otherwise known as hosted security or security software as a       costs. It also satisfies risk management needs across
service) provide security functionality over the Internet. The      industries—from government to retail to manufacturing.
customer does not take ownership of security applications but
rather subscribes to a total solution that is delivered remotely.   In addition to reducing costs and addressing risk management
There are no hardware/software licenses to purchase and no          requirements, cloud security services help to enable a cus-
associated maintenance fees. The cloud delivery model also          tomer’s limited operational resources to direct their efforts
helps reduce security complexity as organizations will not be       towards more strategic initiatives that drive real business
faced with a proliferation of security devices and technologies
to manage, configure and patch. In many ways, consuming
IBM Global Technology Services   3




value. Compared to traditional, on premise security imple-          Traditional approaches to security require the purchase of
mentations, organizations leveraging the cloud spend less time      multiple security technologies and management systems, along
managing systems, troubleshooting technical problems, and           with manpower for integration, configuration and patching.
responding to the most recent security threat.                      Cloud-based services reduce those expenses and provide an
                                                                    ideal delivery method for many external security functions,
What are cloud-based security services?                             including:
Cloud-based security services are delivered remotely to pro-
vide security functionality and intelligence from a remotely        ●   Vulnerability scanning
located provider. They combine managed services, technology         ●   Web/URL filtering
and security intelligence to integrate security with existing       ●   Security event management
business processes, prevent attacks and misuse, address key         ●   Security log management
stakeholder demands, and meet environmental changes.                ●   Email security
Cloud-based security services enable clients to perform rou-
tine security activities more efficiently and cost-effectively by   In addition to security functionality, cloud-based security
utilizing technology and infrastructure provided by a trusted       services also provide up-to-the-minute security intelligence
third party. They help clients contain costs with flexible           and analytics to keep all security technologies patched and up-
pricing based on usage. The cloud security service provider         to-date. For example, a company that purchased an email
takes responsibility for application functionality, deployment,     security appliance three years ago may face challenges keeping
performance and maintenance, liberating the client from these       the security software updated or risk making the software
burdensome activities.                                              obsolete. By using cloud-based security, the service evolves
                                                                    over time, always up-to-date with the latest functionality and
Cloud-based security services offer the following advantages        software content.
over traditional security deployments:
                                                                    When do cloud-based security services
●   No expensive, on-premise security hardware to purchase,         provide a real advantage?
    install and maintain                                            The flexibility of cloud-based security services can transform
●   No stand-alone software to constantly update and patch          the way businesses operate, aligning security with evolving
●   Rapid deployment and self-service through a web-based           business requirements like never before. The cloud-based
    portal                                                          advantage becomes clear whenever organizations experience a
●   Ability to scale and expand security coverage quickly, with-    change causing them to reassess, reprioritize and reconfigure
    out investing in additional infrastructure                      security. For example: it provides security and business process
●   Flexible, service-oriented pricing and service level            advantages in the event of new government regulations, an
    agreements                                                      acquisition, or the addition of a new business unit and/or sys-
                                                                    tem. In such cases, cloud security services work fluidly in a
                                                                    changing IT environment without requiring the customer to
                                                                    divert valuable IT and security resources from other critical
                                                                    initiatives.
4   Leveraging security from the cloud




Where do cloud-based security services                              make better educated business decisions about how to reduce
work best?                                                          risk. The cloud security service provider does the heavy lifting
Wherever businesses have Internet connectivity and want to          and the day-to-day busy work, but the customer maintains
protect information assets, cloud security services will work.      control of security posture.
Whether applied globally, at corporate headquarters or only
for remote locations, the choice is driven by business require-     With cloud security services, customers have a consolidated
ments. Companies don’t have to commit to a large-scale              view of business security posture, and a central resource
deployment with cloud security services. Instead, they can          (a security portal) for security-related information. Security
selectively test the delivery model by starting with hosted         event data is only valuable if businesses can analyze it in order
security at a particular location or for a certain segment of the   to take corrective action. With a consolidated view of security
IT infrastructure, while still managing other aspects of secu-      posture delivered via the cloud, businesses now have the
rity internally. Regardless of whether a business chooses cloud     flexibility to report on the number of remediation tasks
security services to protect a single data center or the entire     assigned and completed, the number of vulnerabilities
IT infrastructure, it will have access to all cloud security        reduced, and the cost savings associated with cleaner traffic
service capabilities, including advanced analysis and correla-      and more efficient use of bandwidth.
tion, artificial intelligence, industry-leading security expertise
and a web-based management portal.                                  The flexibility and robustness of a cloud security services por-
                                                                    tal also improves regulatory compliance efforts. The informa-
                                                                    tion needed for annual audits—vulnerabilities, security events,
Why do organizations need cloud-based
                                                                    log files, etc.—is captured and maintained in a forensically
security services?                                                  sound manner. For auditing and investigation, the information
Cloud security services provide protection in a simpler, more
                                                                    can be accessed from the central portal faster and easier than
efficient and inexpensive manner that empowers customers to
                                                                    having to pull from various management consoles.
focus resources on their primary business. The cloud-based
delivery model can transform an organization’s approach to
                                                                    The cloud-based delivery model leverages existing technology
security, making security decisions more strategic and aligning
                                                                    investments such as routers, application servers and security
security technology with evolving business requirements like
                                                                    software. Cloud security services scale for growth, staff
never before. With a centralized portal view of security that
                                                                    changes and shifts in business focus. This approach speeds
also provides integrated security intelligence, customers can
                                                                    time to protection, reduces demands on internal resources,
                                                                    enhances profitability and increases focus on operational
                                                                    excellence.
IBM Global Technology Services   5




How to select a cloud-based security                                the forefront of security technologies like vulnerability
service provider?                                                   assessment, intrusion prevention and virus prevention. And
An effective service provider possesses the right combination       IBM was a pioneer in offering cloud-based vulnerability man-
of service delivery experience, managed services, technology        agement, security event and log management and in providing
and security intelligence. Cloud security services should be        clients with a web-based centralized customer portal for all
delivered by security-focused experts that offer:                   their cloud-based services as well as their device management
                                                                    managed security services.
●   Proven experience delivering security functionality via the
    Internet                                                        This portal, called the IBM virtual security operations center
●   A central portal where customers can view their security        (Virtual-SOC) customer portal, gives clients better visibility
    posture at any time                                             and control over their entire security infrastructure.
●   A complete managed security services platform including         Customers use the Virtual-SOC portal as their single
    device management and cloud-based security services             command and control center for all their IBM cloud security
●   A full suite of security technology for the entire IT           services as well as their device management managed security
    infrastructure                                                  services. The secure web-based portal empowers clients with
●   Real-time, proactive security intelligence on threats and       the intelligence, tools and capabilities necessary to make real-
    vulnerabilities                                                 time decisions to improve their security posture. This feature-
●   The ability to work with existing infrastructure and security   rich portal provides organizations with a centralized command
    technologies                                                    center for monitoring and controlling their security operations
●   An understanding of how risk management affects business        across the entire enterprise. Available anytime, anywhere, the
    processes like application deployments, compliance manage-      Virtual-SOC portal integrates security intelligence from the
    ment, supply chain and more                                     IBM X-Force® security intelligence team, early-warning
●   A strong audit and compliance posture that ensures align-       threat analysis services, customized reporting and interactive
    ment with your organization’s needs                             client/security operations center communications enabling
●   A global delivery footprint that provides global geographic     collaboration between clients your organization and their team
    coverage and continuous service availability                    of the IBM security experts.

                                                                    IBM security products and services are based on the proactive
Cloud-based security services from
                                                                    security intelligence of its X-Force research and development
IBM Managed Security Services                                       team—the unequivocal world authority in vulnerability and
IBM has been at the forefront of cloud computing since its
                                                                    threat research. In addition, IBM has the business expertise to
inception. And IBM is a proven provider of cloud security
                                                                    help customers align security and risk reduction with existing
services with nearly a decade of experience using this delivery
                                                                    business processes.
model. As the trusted security advisor to thousands of the
world’s leading businesses and governments, IBM has been at
Cloud-based security services from IBM Managed Security
Services include:

●   Hosted Security Event and Log Management – compiles
    event and log files from network applications, operating sys-
    tems, and security technologies into one seamless platform;    © Copyright IBM Corporation 2010
    includes integrated workflow and analysis capabilities, and     IBM Corporation
    seamless off-site storage.                                     New Orchard Road
                                                                   Armonk, NY 10504
●   Hosted Vulnerability Management – combines managed             U.S.A.
    scanning service for discovery and remediation with
                                                                   Produced in the United States of America
    expert workflow and case management; helps demonstrate
                                                                   July 2010
    compliance.                                                    All Rights Reserved
●   Hosted Email and Web Security – provides 24x7x365
                                                                   IBM, the IBM logo and ibm.com are trademarks or registered trademarks
    cloud-based protection against spam, worms, viruses,           of International Business Machines Corporation in the United States,
    spyware, adware and offensive content                          other countries, or both. If these and other IBM trademarked terms are
●   IBM X-Force Hosted Threat Analysis Service – delivers          marked on their first occurrence in this information with a trademark
                                                                   symbol (® or TM), these symbols indicate U.S. registered or common
    customized security intelligence based on threat information   law trademarks owned by IBM at the time this information was
    from the X-Force research and development team.                published. Such trademarks may also be registered or common law
                                                                   trademarks in other countries. A current list of IBM trademarks is
                                                                   available on the web at “Copyright and trademark information” at
The cloud-based security services offerings from IBM are also      ibm.com/legal/copytrade.shtml
complimented by a comprehensive portfolio of traditional
                                                                   Other company, product or service names may be trademarks or service
managed security and professional services solutions.              marks of others.

                                                                   The customer is responsible for ensuring compliance with legal
For more information                                               requirements. It is the customer’s sole responsibility to obtain advice of
To learn more about cloud-based security services from             competent legal counsel as to the identification and interpretation of any
IBM Managed Security Services, please contact your                 relevant laws and regulatory requirements that may affect the customer’s
                                                                   business and any actions the reader may have to take to comply with such
IBM sales representative or IBM Business Partner,                  laws. IBM does not provide legal advice or represent or warrant that its
or visit the following website:                                    services or products will ensure that the customer is in compliance with
ibm.com/services/us/index.wss/offerfamily/iss/a1026954             any law or regulation.


                                                                            Please Recycle
Additionally, financing solutions from IBM Global Financing
can enable effective cash management, protection from tech-
nology obsolescence, improved total cost of ownership and
return on investment. Also, our Global Asset Recovery
Services help address environmental concerns with new, more
energy-efficient solutions. For more information on
IBM Global Financing, visit: ibm.com/financing




                                                                                                                       SEW03020-USEN-00

More Related Content

Viewers also liked

Realizing business value with iam
Realizing business value with iamRealizing business value with iam
Realizing business value with iamArun Gopinath
 
Rewriting the rules of patch management
Rewriting the rules of patch managementRewriting the rules of patch management
Rewriting the rules of patch managementArun Gopinath
 
Livestock, Land and the Changing Economy of Pastoralism
Livestock, Land and the Changing Economy of PastoralismLivestock, Land and the Changing Economy of Pastoralism
Livestock, Land and the Changing Economy of Pastoralismfutureagricultures
 
Danhmuccaccoso kcbkcb2011
Danhmuccaccoso kcbkcb2011Danhmuccaccoso kcbkcb2011
Danhmuccaccoso kcbkcb2011foxhuong
 
8/13 Mediakey /// Tunnel, vince il 14° Interactive Key Award con Buondì
8/13 Mediakey /// Tunnel, vince il 14° Interactive Key Award con Buondì8/13 Mediakey /// Tunnel, vince il 14° Interactive Key Award con Buondì
8/13 Mediakey /// Tunnel, vince il 14° Interactive Key Award con BuondìTunnel Studios
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingktast
 

Viewers also liked (10)

Realizing business value with iam
Realizing business value with iamRealizing business value with iam
Realizing business value with iam
 
Rewriting the rules of patch management
Rewriting the rules of patch managementRewriting the rules of patch management
Rewriting the rules of patch management
 
บทที่ 4
บทที่ 4บทที่ 4
บทที่ 4
 
Livestock, Land and the Changing Economy of Pastoralism
Livestock, Land and the Changing Economy of PastoralismLivestock, Land and the Changing Economy of Pastoralism
Livestock, Land and the Changing Economy of Pastoralism
 
Twitter tactics
Twitter tacticsTwitter tactics
Twitter tactics
 
Essential list 2
Essential list 2Essential list 2
Essential list 2
 
Network Interface Layer
Network Interface LayerNetwork Interface Layer
Network Interface Layer
 
Danhmuccaccoso kcbkcb2011
Danhmuccaccoso kcbkcb2011Danhmuccaccoso kcbkcb2011
Danhmuccaccoso kcbkcb2011
 
8/13 Mediakey /// Tunnel, vince il 14° Interactive Key Award con Buondì
8/13 Mediakey /// Tunnel, vince il 14° Interactive Key Award con Buondì8/13 Mediakey /// Tunnel, vince il 14° Interactive Key Award con Buondì
8/13 Mediakey /// Tunnel, vince il 14° Interactive Key Award con Buondì
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 

Recently uploaded

20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdfJamie (Taka) Wang
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServiceRenan Moreira de Oliveira
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?SANGHEE SHIN
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum ComputingGDSC PJATK
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataSafe Software
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 

Recently uploaded (20)

20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 

Leveraging security from the cloud

  • 1. IBM Global Technology Services IBM Security Services Thought Leadership White Paper Leveraging security from the cloud The who, what, when, why and how of cloud-based security services
  • 2. 2 Leveraging security from the cloud Introduction security from the cloud offers customers the best of both Today’s executives understand the need for information worlds. They gain access to sophisticated security technology security but still struggle to manage the cost and complexity of and up-to-the-minute security intelligence without the capital a myriad of security technologies for everything from threat expense, overhead and management responsibility associated prevention to email security, vulnerability scanning and with on-premise solutions. security event and log management. While important to a comprehensive security strategy, implementing and managing Discovering the “who, what, when, where, why and how” of these solutions can divert IT resources from other critical ini- cloud-based security services reveals how security can be used tiatives. And organizations with smaller budgets may not even to reduce risk, optimize resources, improve flexibility and be able to consider sophisticated defense-in-depth security address regulatory requirements—without breaking the bank. solutions. Cloud computing provides a delivery model for security that addresses many of these challenges for businesses Who benefits from security delivered via large and small. the cloud? Security threats and weaknesses do not recognize vertical Cloud computing is a flexible, cost-effective and proven deliv- industry boundaries or discriminate between small and large ery platform for providing business or consumer IT services companies. However, advanced security technologies are usu- over the Internet. Cloud resources can be rapidly deployed ally confined to larger organizations with the budget and and easily scaled, with all processes, applications and expertise required to install, manage and monitor advanced services provisioned “on demand,” regardless of user enterprise solutions. As a result, many organizations lack pro- location or device. As a result, cloud computing helps tection against new threats based on a shortage of resources, organizations increase service delivery efficiency, streamline not for intent or negligence. IT management and better align IT services with dynamic business requirements. Cloud-based security services benefit the largest enterprises, as well as small and medium-size businesses. Relative to on- When it comes to delivering information security, cloud com- premise security software, cloud security requires little to no puting provides several advantages relative to on-premise up-front capital investment and deployment costs; and the security software and appliances. Cloud-based security services cloud delivery model lowers ongoing operational management (otherwise known as hosted security or security software as a costs. It also satisfies risk management needs across service) provide security functionality over the Internet. The industries—from government to retail to manufacturing. customer does not take ownership of security applications but rather subscribes to a total solution that is delivered remotely. In addition to reducing costs and addressing risk management There are no hardware/software licenses to purchase and no requirements, cloud security services help to enable a cus- associated maintenance fees. The cloud delivery model also tomer’s limited operational resources to direct their efforts helps reduce security complexity as organizations will not be towards more strategic initiatives that drive real business faced with a proliferation of security devices and technologies to manage, configure and patch. In many ways, consuming
  • 3. IBM Global Technology Services 3 value. Compared to traditional, on premise security imple- Traditional approaches to security require the purchase of mentations, organizations leveraging the cloud spend less time multiple security technologies and management systems, along managing systems, troubleshooting technical problems, and with manpower for integration, configuration and patching. responding to the most recent security threat. Cloud-based services reduce those expenses and provide an ideal delivery method for many external security functions, What are cloud-based security services? including: Cloud-based security services are delivered remotely to pro- vide security functionality and intelligence from a remotely ● Vulnerability scanning located provider. They combine managed services, technology ● Web/URL filtering and security intelligence to integrate security with existing ● Security event management business processes, prevent attacks and misuse, address key ● Security log management stakeholder demands, and meet environmental changes. ● Email security Cloud-based security services enable clients to perform rou- tine security activities more efficiently and cost-effectively by In addition to security functionality, cloud-based security utilizing technology and infrastructure provided by a trusted services also provide up-to-the-minute security intelligence third party. They help clients contain costs with flexible and analytics to keep all security technologies patched and up- pricing based on usage. The cloud security service provider to-date. For example, a company that purchased an email takes responsibility for application functionality, deployment, security appliance three years ago may face challenges keeping performance and maintenance, liberating the client from these the security software updated or risk making the software burdensome activities. obsolete. By using cloud-based security, the service evolves over time, always up-to-date with the latest functionality and Cloud-based security services offer the following advantages software content. over traditional security deployments: When do cloud-based security services ● No expensive, on-premise security hardware to purchase, provide a real advantage? install and maintain The flexibility of cloud-based security services can transform ● No stand-alone software to constantly update and patch the way businesses operate, aligning security with evolving ● Rapid deployment and self-service through a web-based business requirements like never before. The cloud-based portal advantage becomes clear whenever organizations experience a ● Ability to scale and expand security coverage quickly, with- change causing them to reassess, reprioritize and reconfigure out investing in additional infrastructure security. For example: it provides security and business process ● Flexible, service-oriented pricing and service level advantages in the event of new government regulations, an agreements acquisition, or the addition of a new business unit and/or sys- tem. In such cases, cloud security services work fluidly in a changing IT environment without requiring the customer to divert valuable IT and security resources from other critical initiatives.
  • 4. 4 Leveraging security from the cloud Where do cloud-based security services make better educated business decisions about how to reduce work best? risk. The cloud security service provider does the heavy lifting Wherever businesses have Internet connectivity and want to and the day-to-day busy work, but the customer maintains protect information assets, cloud security services will work. control of security posture. Whether applied globally, at corporate headquarters or only for remote locations, the choice is driven by business require- With cloud security services, customers have a consolidated ments. Companies don’t have to commit to a large-scale view of business security posture, and a central resource deployment with cloud security services. Instead, they can (a security portal) for security-related information. Security selectively test the delivery model by starting with hosted event data is only valuable if businesses can analyze it in order security at a particular location or for a certain segment of the to take corrective action. With a consolidated view of security IT infrastructure, while still managing other aspects of secu- posture delivered via the cloud, businesses now have the rity internally. Regardless of whether a business chooses cloud flexibility to report on the number of remediation tasks security services to protect a single data center or the entire assigned and completed, the number of vulnerabilities IT infrastructure, it will have access to all cloud security reduced, and the cost savings associated with cleaner traffic service capabilities, including advanced analysis and correla- and more efficient use of bandwidth. tion, artificial intelligence, industry-leading security expertise and a web-based management portal. The flexibility and robustness of a cloud security services por- tal also improves regulatory compliance efforts. The informa- tion needed for annual audits—vulnerabilities, security events, Why do organizations need cloud-based log files, etc.—is captured and maintained in a forensically security services? sound manner. For auditing and investigation, the information Cloud security services provide protection in a simpler, more can be accessed from the central portal faster and easier than efficient and inexpensive manner that empowers customers to having to pull from various management consoles. focus resources on their primary business. The cloud-based delivery model can transform an organization’s approach to The cloud-based delivery model leverages existing technology security, making security decisions more strategic and aligning investments such as routers, application servers and security security technology with evolving business requirements like software. Cloud security services scale for growth, staff never before. With a centralized portal view of security that changes and shifts in business focus. This approach speeds also provides integrated security intelligence, customers can time to protection, reduces demands on internal resources, enhances profitability and increases focus on operational excellence.
  • 5. IBM Global Technology Services 5 How to select a cloud-based security the forefront of security technologies like vulnerability service provider? assessment, intrusion prevention and virus prevention. And An effective service provider possesses the right combination IBM was a pioneer in offering cloud-based vulnerability man- of service delivery experience, managed services, technology agement, security event and log management and in providing and security intelligence. Cloud security services should be clients with a web-based centralized customer portal for all delivered by security-focused experts that offer: their cloud-based services as well as their device management managed security services. ● Proven experience delivering security functionality via the Internet This portal, called the IBM virtual security operations center ● A central portal where customers can view their security (Virtual-SOC) customer portal, gives clients better visibility posture at any time and control over their entire security infrastructure. ● A complete managed security services platform including Customers use the Virtual-SOC portal as their single device management and cloud-based security services command and control center for all their IBM cloud security ● A full suite of security technology for the entire IT services as well as their device management managed security infrastructure services. The secure web-based portal empowers clients with ● Real-time, proactive security intelligence on threats and the intelligence, tools and capabilities necessary to make real- vulnerabilities time decisions to improve their security posture. This feature- ● The ability to work with existing infrastructure and security rich portal provides organizations with a centralized command technologies center for monitoring and controlling their security operations ● An understanding of how risk management affects business across the entire enterprise. Available anytime, anywhere, the processes like application deployments, compliance manage- Virtual-SOC portal integrates security intelligence from the ment, supply chain and more IBM X-Force® security intelligence team, early-warning ● A strong audit and compliance posture that ensures align- threat analysis services, customized reporting and interactive ment with your organization’s needs client/security operations center communications enabling ● A global delivery footprint that provides global geographic collaboration between clients your organization and their team coverage and continuous service availability of the IBM security experts. IBM security products and services are based on the proactive Cloud-based security services from security intelligence of its X-Force research and development IBM Managed Security Services team—the unequivocal world authority in vulnerability and IBM has been at the forefront of cloud computing since its threat research. In addition, IBM has the business expertise to inception. And IBM is a proven provider of cloud security help customers align security and risk reduction with existing services with nearly a decade of experience using this delivery business processes. model. As the trusted security advisor to thousands of the world’s leading businesses and governments, IBM has been at
  • 6. Cloud-based security services from IBM Managed Security Services include: ● Hosted Security Event and Log Management – compiles event and log files from network applications, operating sys- tems, and security technologies into one seamless platform; © Copyright IBM Corporation 2010 includes integrated workflow and analysis capabilities, and IBM Corporation seamless off-site storage. New Orchard Road Armonk, NY 10504 ● Hosted Vulnerability Management – combines managed U.S.A. scanning service for discovery and remediation with Produced in the United States of America expert workflow and case management; helps demonstrate July 2010 compliance. All Rights Reserved ● Hosted Email and Web Security – provides 24x7x365 IBM, the IBM logo and ibm.com are trademarks or registered trademarks cloud-based protection against spam, worms, viruses, of International Business Machines Corporation in the United States, spyware, adware and offensive content other countries, or both. If these and other IBM trademarked terms are ● IBM X-Force Hosted Threat Analysis Service – delivers marked on their first occurrence in this information with a trademark symbol (® or TM), these symbols indicate U.S. registered or common customized security intelligence based on threat information law trademarks owned by IBM at the time this information was from the X-Force research and development team. published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at The cloud-based security services offerings from IBM are also ibm.com/legal/copytrade.shtml complimented by a comprehensive portfolio of traditional Other company, product or service names may be trademarks or service managed security and professional services solutions. marks of others. The customer is responsible for ensuring compliance with legal For more information requirements. It is the customer’s sole responsibility to obtain advice of To learn more about cloud-based security services from competent legal counsel as to the identification and interpretation of any IBM Managed Security Services, please contact your relevant laws and regulatory requirements that may affect the customer’s business and any actions the reader may have to take to comply with such IBM sales representative or IBM Business Partner, laws. IBM does not provide legal advice or represent or warrant that its or visit the following website: services or products will ensure that the customer is in compliance with ibm.com/services/us/index.wss/offerfamily/iss/a1026954 any law or regulation. Please Recycle Additionally, financing solutions from IBM Global Financing can enable effective cash management, protection from tech- nology obsolescence, improved total cost of ownership and return on investment. Also, our Global Asset Recovery Services help address environmental concerns with new, more energy-efficient solutions. For more information on IBM Global Financing, visit: ibm.com/financing SEW03020-USEN-00