SlideShare a Scribd company logo
IBM Security
IBM Security Intelligence
© 2013 IBM Corporation© 2014 IBM Corporation
Speaker: Alfonso Ponticelli
Security QRadar Technical Sales, Italy
IBM Security Systems
What is Security Intelligence?
Security Intelligence
--noun
1. the real-time collection, normalization and
analytics of the data generated by users,
applications and infrastructure that impacts the
IT security and risk posture of an enterprise
Security Intelligence
© 2014 IBM Corporation2
IT security and risk posture of an enterprise
Security Intelligence provides actionable and comprehensive
insight for managing risks and threats from protection and
detection through remediation
IBM Security Systems
Solutions for the full Security Intelligence timeline
IBM Security Intelligence
© 2014 IBM Corporation3
IBM Security Systems
Built upon common foundation of QRadar SIOS
Reporting
Engine
Workflow Rules Engine
Real-Time
Viewer
Security
Intelligence
Solutions
IBM QRadar SIEM Platform
QRadar SIEM
QRadar
Risk
Manager
QRadar
QFlow and
VFlow
QRadar
Vulnerability
Manager
© 2014 IBM Corporation4
Analytics Engine
Warehouse Archival
Security
Intelligence
Operating
System
(SIOS)
Normalization
IBM Security Systems
Servers and mainframes
Network and virtual activity
Data activity
Security devices
Structured & Unstructured Data …Suspected Incidents
• Automated data collection,
asset discovery and profiling
• Automated, real-time,
and integrated analytics
Embedded Intelligence
Highly
Prioritized
Security and
Operational
Incidents
Highly
Prioritized
Security and
Operational
Incidents
Automated
Dynamic Threat Environment Requires Security Intelligence
IBM QRadar SIEM Platform
© 2014 IBM Corporation5
Application activity
Configuration information
Vulnerabilities and threats
Users and identities
Global threat intelligence
• Massive data reduction
• Activity baselining
and anomaly detection
• Out-of-the box rules
and templates
Automated
Offense
Identification
Visibility across organizational security systems to improve response times and
incorporate adaptability/flexibility required for early detection of threats or risky
behaviors
IBM Security Systems
And continually adding context for increased accuracy
Security Intelligence Feeds
Internet ThreatsGeo Location Vulnerabilities
IBM QRadar SIEM Platform
© 2014 IBM Corporation6
IBM Security Systems
Using fully integrated architecture and interface
IBM QRadar Platform
© 2014 IBM Corporation7
IBM Security Systems
Continued journey towards Total Security Intelligence
IBM QRadar Security Intelligence
© 2014 IBM Corporation8
IBM Security Systems
Network traffic doesn’t lie. Attackers can stop logging and
erase their tracks, but can’t cut off the network (flow data)
• Deep packet inspection for Layer 7 flow data
• Pivoting, drill-down and data mining on flow sources for
advanced detection and forensics
Helps detect anomalies that might otherwise get missed
Enables visibility into attacker communications
Differentiated by network flow analytics
IBM QRadar Platform
© 2014 IBM Corporation9
Enables visibility into attacker communications
IBM Security Systems
QRadar Risk Manager: Visualize network, configurations and risks
Depicts network topology
views and helps visualize
current and alternative
network traffic patterns
Identifies active attack
paths and assets at risk of
exploit
IBM QRadar Risk Manager
© 2014 IBM Corporation10
Collects network device
configuration data to
assess vulnerabilities and
facilitate analysis and
reportingDiscovers firewall configuration errors and improves
performance by eliminating ineffective rules
Analyzes policy compliance for network traffic,
topology and vulnerability exposures
IBM Security Systems
Investigating offense attack path
Clicking ‘attack path’ button for an offense performs search showing precise
path (and all permutations) between involved source and destination IPs
Firewall rules enabling the attack path can then be quickly analyzed to
understand the exposure
IBM QRadar Risk Manager
© 2014 IBM Corporation11
understand the exposure
Allows “virtual patch” to be applied by quickly showing which firewall rules may
be changed to immediately shut down attack path—before patching or other
configuration changes can typically be implemented
IBM Security Systems
Strengthened by integrated vulnerability insights
IBM QRadar Vulnerability Manager
© 2014 IBM Corporation12
IBM Security Systems
QVM enables customers to interpret ‘sea’ of vulnerabilities
IBM QRadar Vulnerability Manager
© 2014 IBM Corporation13
IBM Security Systems
QRadar Security Intelligence easily grows with your needs
Add QRadar Risk Manager
• Enables pre-exploit configuration investigations
• Simplifies security policy reviews for compliance tests
Implement QRadar Vulnerability Manager
• Extends pre-exploit analysis - adds integrated,
vulnerability insights
• Reduces magnitude of pre-exploit conditions as QRadar
SIEM does for post-exploit conditions
• Helps identify and measure exposures to external threats
IBM QRadar Security Intelligence
© 2014 IBM Corporation14
Inject IBM X-Force Threat Research Intelligence
- Provides intelligence feed to QRadar
- Includes vulnerabilities, IP reputations, malware reports
• Simplifies security policy reviews for compliance tests
• Provides network topology depictions and permits
attack simulations
QRadar SIEM
• Additional security telemetry data
• Rules-based correlation analysis engine
• Data overload reduction ‘magic’ compressing millions or
even billions of daily raw events to manageable list of issues
IBM Security Systems
QRadar Incident Forensics Module Overview
Seamlessly integrated
with Security
Intelligence incident
detection and workflow
processes
Full packet capture for
complete insight and
incident forensics
IBM QRadar Incident Forensics
© 2014 IBM Corporation15
Deep packet
inspection, analytics
and searching enabling
powerful and intuitive
forensics
Providing unified view
of all flow, user, event,
and forensic
information
IBM Security Systems
Offering Overview
Family Product Appliance Virtual
Appliance
Software
SIEM All-in-One 2100 Light3 / 2100 / 3105
/ 3124
3190 21XX Light3 /
21XX / 31XX
Console 3105 / 3124 3190 31XX
Event Processor 1605 / 1624 1690 16XX
Flow Processor 1705 / 1724 1790 17XX
Como Event/Flow Processor 1805 18XX
Event Collector5 1501 1590 15XX2
QFlow Collector 1201 / 1202 / 1301 / 1310 VFlow / 1290 12XX
© 2014 IBM Corporation16
QFlow Collector 1201 / 1202 / 1301 / 1310 VFlow / 1290 12XX
Log Manager All-in-1 2100 / 3105 / 3124 3190 21XX / 31XX1
Console 3105 / 3124 3190 31XX1
Event Processor 1605 / 1624 1690 16XX1
QNAD QNAD QNAD
Risk Manager QRM QRM / QRM Light4 QRM VM3 / QRM
Light VM4
QRM SW3 / QRM
Light SW4
Vulnerability
Manager
QVM QVM3 QVM VM3 QVM SW3

More Related Content

What's hot

Extend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPs
IBM Security
 
IBM Security QFlow & Vflow
IBM Security QFlow & VflowIBM Security QFlow & Vflow
IBM Security QFlow & Vflow
Camilo Fandiño Gómez
 
IBM QRadar Xforce
IBM QRadar XforceIBM QRadar Xforce
IBM QRadar Xforce
sreenivas1591
 
IBM Qradar
IBM QradarIBM Qradar
IBM Qradar
Coenraad Smith
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmap
DATA SECURITY SOLUTIONS
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Andris Soroka
 
Qradar Business Case
Qradar Business CaseQradar Business Case
IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.
Avishek Priyadarshi
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
IBM Security
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
IBM Security
 
Security Information Event Management - nullhyd
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhyd
n|u - The Open Security Community
 
Top Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemTop Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against Them
SBWebinars
 
From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path Forward
EMC
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Sirius
 
IBM Security Software Solutions - Powerpoint
 IBM Security Software Solutions - Powerpoint IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - Powerpoint
Thierry Matusiak
 
SIEM evolution
SIEM evolutionSIEM evolution
SIEM evolution
Stijn Vande Casteele
 
Security Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM GapSecurity Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM Gap
Eric Johansen, CISSP
 
2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM
Pinewood
 

What's hot (19)

Extend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPs
 
IBM Security QFlow & Vflow
IBM Security QFlow & VflowIBM Security QFlow & Vflow
IBM Security QFlow & Vflow
 
IBM QRadar Xforce
IBM QRadar XforceIBM QRadar Xforce
IBM QRadar Xforce
 
IBM Qradar
IBM QradarIBM Qradar
IBM Qradar
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmap
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
 
Qradar Business Case
Qradar Business CaseQradar Business Case
Qradar Business Case
 
IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Security Information Event Management - nullhyd
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhyd
 
Top Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemTop Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against Them
 
IBM Security Immune System
IBM Security Immune SystemIBM Security Immune System
IBM Security Immune System
 
From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path Forward
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
 
IBM Security Software Solutions - Powerpoint
 IBM Security Software Solutions - Powerpoint IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - Powerpoint
 
SIEM evolution
SIEM evolutionSIEM evolution
SIEM evolution
 
Security Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM GapSecurity Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM Gap
 
2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM
 

Similar to IBM Security Intelligence

Introduction to QRadar
Introduction to QRadarIntroduction to QRadar
Introduction to QRadar
PencilData
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
Information Security Awareness Group
 
SIEM 1 solution .pptx
SIEM 1 solution .pptxSIEM 1 solution .pptx
SIEM 1 solution .pptx
AbdulrahmanMuhammadB
 
Presentation data security solutions certified ibm business partner for ibm...
Presentation   data security solutions certified ibm business partner for ibm...Presentation   data security solutions certified ibm business partner for ibm...
Presentation data security solutions certified ibm business partner for ibm...
xKinAnx
 
IBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy SectorIBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy Sector
FMA Summits
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
Metaorange
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
Metaorange
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
Francisco González Jiménez
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...Chrysostomos Christofi
 
IBM - Security Intelligence para PYMES
IBM - Security Intelligence para PYMESIBM - Security Intelligence para PYMES
IBM - Security Intelligence para PYMESFernando M. Imperiale
 
Fernando Imperiale - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMESFernando Imperiale - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMESFernando M. Imperiale
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
Prime Infoserv
 
IBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptxIBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptx
infosec train
 
IBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptxIBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptx
Infosectrain3
 
Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence
Stefaan Van daele
 
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
IBM Security
 
Mitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-RadarMitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-Radar
Francisco González Jiménez
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
IBM Security
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
Sonia Baratas Alves
 
QRadar_on_Cloud_client_presentation.PPTX
QRadar_on_Cloud_client_presentation.PPTXQRadar_on_Cloud_client_presentation.PPTX
QRadar_on_Cloud_client_presentation.PPTX
NatashaVerma29
 

Similar to IBM Security Intelligence (20)

Introduction to QRadar
Introduction to QRadarIntroduction to QRadar
Introduction to QRadar
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
SIEM 1 solution .pptx
SIEM 1 solution .pptxSIEM 1 solution .pptx
SIEM 1 solution .pptx
 
Presentation data security solutions certified ibm business partner for ibm...
Presentation   data security solutions certified ibm business partner for ibm...Presentation   data security solutions certified ibm business partner for ibm...
Presentation data security solutions certified ibm business partner for ibm...
 
IBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy SectorIBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy Sector
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
IBM - Security Intelligence para PYMES
IBM - Security Intelligence para PYMESIBM - Security Intelligence para PYMES
IBM - Security Intelligence para PYMES
 
Fernando Imperiale - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMESFernando Imperiale - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMES
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
IBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptxIBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptx
 
IBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptxIBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptx
 
Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence
 
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
 
Mitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-RadarMitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-Radar
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
QRadar_on_Cloud_client_presentation.PPTX
QRadar_on_Cloud_client_presentation.PPTXQRadar_on_Cloud_client_presentation.PPTX
QRadar_on_Cloud_client_presentation.PPTX
 

More from Anna Landolfi

IBM Power8 announce
IBM Power8 announceIBM Power8 announce
IBM Power8 announce
Anna Landolfi
 
IBM SmartCloud Orchestrator
IBM SmartCloud OrchestratorIBM SmartCloud Orchestrator
IBM SmartCloud Orchestrator
Anna Landolfi
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del Datacenter
Anna Landolfi
 
IBM PureSystems
IBM PureSystemsIBM PureSystems
IBM PureSystems
Anna Landolfi
 
IBM Business Analytics
IBM Business AnalyticsIBM Business Analytics
IBM Business AnalyticsAnna Landolfi
 
SoftLayer Cloud Services
SoftLayer Cloud ServicesSoftLayer Cloud Services
SoftLayer Cloud Services
Anna Landolfi
 

More from Anna Landolfi (7)

IBM Power8 announce
IBM Power8 announceIBM Power8 announce
IBM Power8 announce
 
IBM SmartCloud Orchestrator
IBM SmartCloud OrchestratorIBM SmartCloud Orchestrator
IBM SmartCloud Orchestrator
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del Datacenter
 
IBM PureSystems
IBM PureSystemsIBM PureSystems
IBM PureSystems
 
IBM Business Analytics
IBM Business AnalyticsIBM Business Analytics
IBM Business Analytics
 
IBM Mobile First
IBM Mobile FirstIBM Mobile First
IBM Mobile First
 
SoftLayer Cloud Services
SoftLayer Cloud ServicesSoftLayer Cloud Services
SoftLayer Cloud Services
 

Recently uploaded

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

IBM Security Intelligence

  • 1. IBM Security IBM Security Intelligence © 2013 IBM Corporation© 2014 IBM Corporation Speaker: Alfonso Ponticelli Security QRadar Technical Sales, Italy
  • 2. IBM Security Systems What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure that impacts the IT security and risk posture of an enterprise Security Intelligence © 2014 IBM Corporation2 IT security and risk posture of an enterprise Security Intelligence provides actionable and comprehensive insight for managing risks and threats from protection and detection through remediation
  • 3. IBM Security Systems Solutions for the full Security Intelligence timeline IBM Security Intelligence © 2014 IBM Corporation3
  • 4. IBM Security Systems Built upon common foundation of QRadar SIOS Reporting Engine Workflow Rules Engine Real-Time Viewer Security Intelligence Solutions IBM QRadar SIEM Platform QRadar SIEM QRadar Risk Manager QRadar QFlow and VFlow QRadar Vulnerability Manager © 2014 IBM Corporation4 Analytics Engine Warehouse Archival Security Intelligence Operating System (SIOS) Normalization
  • 5. IBM Security Systems Servers and mainframes Network and virtual activity Data activity Security devices Structured & Unstructured Data …Suspected Incidents • Automated data collection, asset discovery and profiling • Automated, real-time, and integrated analytics Embedded Intelligence Highly Prioritized Security and Operational Incidents Highly Prioritized Security and Operational Incidents Automated Dynamic Threat Environment Requires Security Intelligence IBM QRadar SIEM Platform © 2014 IBM Corporation5 Application activity Configuration information Vulnerabilities and threats Users and identities Global threat intelligence • Massive data reduction • Activity baselining and anomaly detection • Out-of-the box rules and templates Automated Offense Identification Visibility across organizational security systems to improve response times and incorporate adaptability/flexibility required for early detection of threats or risky behaviors
  • 6. IBM Security Systems And continually adding context for increased accuracy Security Intelligence Feeds Internet ThreatsGeo Location Vulnerabilities IBM QRadar SIEM Platform © 2014 IBM Corporation6
  • 7. IBM Security Systems Using fully integrated architecture and interface IBM QRadar Platform © 2014 IBM Corporation7
  • 8. IBM Security Systems Continued journey towards Total Security Intelligence IBM QRadar Security Intelligence © 2014 IBM Corporation8
  • 9. IBM Security Systems Network traffic doesn’t lie. Attackers can stop logging and erase their tracks, but can’t cut off the network (flow data) • Deep packet inspection for Layer 7 flow data • Pivoting, drill-down and data mining on flow sources for advanced detection and forensics Helps detect anomalies that might otherwise get missed Enables visibility into attacker communications Differentiated by network flow analytics IBM QRadar Platform © 2014 IBM Corporation9 Enables visibility into attacker communications
  • 10. IBM Security Systems QRadar Risk Manager: Visualize network, configurations and risks Depicts network topology views and helps visualize current and alternative network traffic patterns Identifies active attack paths and assets at risk of exploit IBM QRadar Risk Manager © 2014 IBM Corporation10 Collects network device configuration data to assess vulnerabilities and facilitate analysis and reportingDiscovers firewall configuration errors and improves performance by eliminating ineffective rules Analyzes policy compliance for network traffic, topology and vulnerability exposures
  • 11. IBM Security Systems Investigating offense attack path Clicking ‘attack path’ button for an offense performs search showing precise path (and all permutations) between involved source and destination IPs Firewall rules enabling the attack path can then be quickly analyzed to understand the exposure IBM QRadar Risk Manager © 2014 IBM Corporation11 understand the exposure Allows “virtual patch” to be applied by quickly showing which firewall rules may be changed to immediately shut down attack path—before patching or other configuration changes can typically be implemented
  • 12. IBM Security Systems Strengthened by integrated vulnerability insights IBM QRadar Vulnerability Manager © 2014 IBM Corporation12
  • 13. IBM Security Systems QVM enables customers to interpret ‘sea’ of vulnerabilities IBM QRadar Vulnerability Manager © 2014 IBM Corporation13
  • 14. IBM Security Systems QRadar Security Intelligence easily grows with your needs Add QRadar Risk Manager • Enables pre-exploit configuration investigations • Simplifies security policy reviews for compliance tests Implement QRadar Vulnerability Manager • Extends pre-exploit analysis - adds integrated, vulnerability insights • Reduces magnitude of pre-exploit conditions as QRadar SIEM does for post-exploit conditions • Helps identify and measure exposures to external threats IBM QRadar Security Intelligence © 2014 IBM Corporation14 Inject IBM X-Force Threat Research Intelligence - Provides intelligence feed to QRadar - Includes vulnerabilities, IP reputations, malware reports • Simplifies security policy reviews for compliance tests • Provides network topology depictions and permits attack simulations QRadar SIEM • Additional security telemetry data • Rules-based correlation analysis engine • Data overload reduction ‘magic’ compressing millions or even billions of daily raw events to manageable list of issues
  • 15. IBM Security Systems QRadar Incident Forensics Module Overview Seamlessly integrated with Security Intelligence incident detection and workflow processes Full packet capture for complete insight and incident forensics IBM QRadar Incident Forensics © 2014 IBM Corporation15 Deep packet inspection, analytics and searching enabling powerful and intuitive forensics Providing unified view of all flow, user, event, and forensic information
  • 16. IBM Security Systems Offering Overview Family Product Appliance Virtual Appliance Software SIEM All-in-One 2100 Light3 / 2100 / 3105 / 3124 3190 21XX Light3 / 21XX / 31XX Console 3105 / 3124 3190 31XX Event Processor 1605 / 1624 1690 16XX Flow Processor 1705 / 1724 1790 17XX Como Event/Flow Processor 1805 18XX Event Collector5 1501 1590 15XX2 QFlow Collector 1201 / 1202 / 1301 / 1310 VFlow / 1290 12XX © 2014 IBM Corporation16 QFlow Collector 1201 / 1202 / 1301 / 1310 VFlow / 1290 12XX Log Manager All-in-1 2100 / 3105 / 3124 3190 21XX / 31XX1 Console 3105 / 3124 3190 31XX1 Event Processor 1605 / 1624 1690 16XX1 QNAD QNAD QNAD Risk Manager QRM QRM / QRM Light4 QRM VM3 / QRM Light VM4 QRM SW3 / QRM Light SW4 Vulnerability Manager QVM QVM3 QVM VM3 QVM SW3