The document discusses how IBM helps organizations address emerging security challenges through intelligence, integration, and expertise. It describes IBM's comprehensive security framework and how the company provides predictive security analytics, integrates across IT silos, and leverages unmatched global security expertise to help clients securely innovate and adopt new technologies like cloud.
As you move your IT Infrastructure into the cloud, how secure can you expect your applications to be? Join Alert Logic and Internap on this webcast for an enlightening discussion on the state of cloud security and how it impacts security management decisions, especially in the context of deploying infrastructure to hosted and cloud environments.
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec
At Mobile World Congress 2012, Symantec announced significant advances in core areas of its enterprise mobility strategy across Android, iOS and Windows Phone 7 platforms. These advances help customers secure mobile data and enable business productivity across both corporate managed and personally owned unmanaged devices by providing cross-platform, multi-application protection.
As you move your IT Infrastructure into the cloud, how secure can you expect your applications to be? Join Alert Logic and Internap on this webcast for an enlightening discussion on the state of cloud security and how it impacts security management decisions, especially in the context of deploying infrastructure to hosted and cloud environments.
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec
At Mobile World Congress 2012, Symantec announced significant advances in core areas of its enterprise mobility strategy across Android, iOS and Windows Phone 7 platforms. These advances help customers secure mobile data and enable business productivity across both corporate managed and personally owned unmanaged devices by providing cross-platform, multi-application protection.
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks
The world of smart devices talking to each other—and to us—is well
underway and here to stay. To connect to the Internet of Things
opportunity, it’s key to design and build networking infrastructures that can handle massive amounts of new data.
The IBM Security Client References Guide includes summary slides of IBM clients across various industries that have successfully implemented solutions from the IBM Security Portfolio.
The boundaries of the corporate network are being challenged. Today’s
enterprise is falling victim to unrelenting attacks that target physical and
logical infrastructures, mobile platforms, user identities, network devices
and more. Entrust provides more than a simple one-step means of protecting the
world’s largest and most respected enterprises. Reduce costs, defend
against targeted attacks and consolidate identity-based security via a
single management and strong authentication platform.
No other solution in the industry provides the unified management and security of the breadth of Devices and Things, Apps and Content and People and Identity. And no other provider integrates with Watson to deliver a Trusted Advisor to help IT Leaders in their strategic and tactical challenges with UEM by offering actionable insights and contextual analytics.
This is the product and services portfolio of IBM Security, which is one pillar of IBM CAMSS strategy. Products in portfolio are still moving during early 2015 due to re-portfolio of IBM. However, it will be categorized in 2 major parts.
1) IBM Security Products : all security software and appliance
2) IBM Security Services : all security services, including Cloud security.
Retail Mobility, Productivity and SecurityIBM Security
Displaying key findings from the Mobility Trends in the Retail Sector research report prepared by Enterprise Strategy Group (ESG) and IBM, this infographic affords valuable context to retail organizations in planning a better tomorrow.
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
With the rapid growth of smartphones and tablets in the enterprise, CIOs are struggling to secure mobile devices and data across a wide range of mobile platforms. Attend this session to learn best practices around defining a mobile security policy, educating employees about safe computing practices, and deploying a secure technology framework. We'll discuss the benefits of endpoint management solutions like IBM Endpoint Manager in the context of a comprehensive enterprise deployment encompassing smartphones, tablets, PCs and servers.
These slides were presented during an exclusive briefing and community review on our current research and development to redefine Zero Trust in identity first terms.
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderArmor
Steve Roderick, CEO of gotoBilling, differentiates his end-to-end software payment service in a highly competitive marketplace. How? He trusts a formula that’s a critical component of every business. Sound security — particularly when properly layered — helps organizations defend against breach, protect their brands, ensure compliance and avoid fines. And it’s a message that’s resonating with customers and winning business.
Extend Your Market Reach with IBM Security QRadar for MSPsIBM Security
View on-demand recording: http://securityintelligence.com/events/ibm-security-qradar-for-msps/
As the number of security events grow in complexity and frequency, your clients are likely looking for ways to deploy leading security capabilities to gain more comprehensive security visibility across their operations. With the next release of IBM Security QRadar, you have an enhanced opportunity to deliver a best-in-class security intelligence solution to your broad base of customers.
Join us for a webcast presented by Vijay Dheap, IBM Security Global Solutions Manager, to learn about the new features of IBM Security QRadar designed especially for Managed Service Providers. He will cover:
- Centralized views and incident management with extensive APIs
- Flexible MSP pricing options
- Horizontal, snap-on scalability that is cloud ready
Our lives are changing at an unprecedented pace. Transformational shifts in our economic, environmental, geopolitical, societal and technological systems offer unparalleled opportunities, but the interconnections among them also imply enhanced systemic risks. Stakeholders from across business, government and civil society face an evolving imperative in understanding and managing emerging global risks which, by definition, respect no national boundaries.
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks
The world of smart devices talking to each other—and to us—is well
underway and here to stay. To connect to the Internet of Things
opportunity, it’s key to design and build networking infrastructures that can handle massive amounts of new data.
The IBM Security Client References Guide includes summary slides of IBM clients across various industries that have successfully implemented solutions from the IBM Security Portfolio.
The boundaries of the corporate network are being challenged. Today’s
enterprise is falling victim to unrelenting attacks that target physical and
logical infrastructures, mobile platforms, user identities, network devices
and more. Entrust provides more than a simple one-step means of protecting the
world’s largest and most respected enterprises. Reduce costs, defend
against targeted attacks and consolidate identity-based security via a
single management and strong authentication platform.
No other solution in the industry provides the unified management and security of the breadth of Devices and Things, Apps and Content and People and Identity. And no other provider integrates with Watson to deliver a Trusted Advisor to help IT Leaders in their strategic and tactical challenges with UEM by offering actionable insights and contextual analytics.
This is the product and services portfolio of IBM Security, which is one pillar of IBM CAMSS strategy. Products in portfolio are still moving during early 2015 due to re-portfolio of IBM. However, it will be categorized in 2 major parts.
1) IBM Security Products : all security software and appliance
2) IBM Security Services : all security services, including Cloud security.
Retail Mobility, Productivity and SecurityIBM Security
Displaying key findings from the Mobility Trends in the Retail Sector research report prepared by Enterprise Strategy Group (ESG) and IBM, this infographic affords valuable context to retail organizations in planning a better tomorrow.
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
With the rapid growth of smartphones and tablets in the enterprise, CIOs are struggling to secure mobile devices and data across a wide range of mobile platforms. Attend this session to learn best practices around defining a mobile security policy, educating employees about safe computing practices, and deploying a secure technology framework. We'll discuss the benefits of endpoint management solutions like IBM Endpoint Manager in the context of a comprehensive enterprise deployment encompassing smartphones, tablets, PCs and servers.
These slides were presented during an exclusive briefing and community review on our current research and development to redefine Zero Trust in identity first terms.
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderArmor
Steve Roderick, CEO of gotoBilling, differentiates his end-to-end software payment service in a highly competitive marketplace. How? He trusts a formula that’s a critical component of every business. Sound security — particularly when properly layered — helps organizations defend against breach, protect their brands, ensure compliance and avoid fines. And it’s a message that’s resonating with customers and winning business.
Extend Your Market Reach with IBM Security QRadar for MSPsIBM Security
View on-demand recording: http://securityintelligence.com/events/ibm-security-qradar-for-msps/
As the number of security events grow in complexity and frequency, your clients are likely looking for ways to deploy leading security capabilities to gain more comprehensive security visibility across their operations. With the next release of IBM Security QRadar, you have an enhanced opportunity to deliver a best-in-class security intelligence solution to your broad base of customers.
Join us for a webcast presented by Vijay Dheap, IBM Security Global Solutions Manager, to learn about the new features of IBM Security QRadar designed especially for Managed Service Providers. He will cover:
- Centralized views and incident management with extensive APIs
- Flexible MSP pricing options
- Horizontal, snap-on scalability that is cloud ready
Our lives are changing at an unprecedented pace. Transformational shifts in our economic, environmental, geopolitical, societal and technological systems offer unparalleled opportunities, but the interconnections among them also imply enhanced systemic risks. Stakeholders from across business, government and civil society face an evolving imperative in understanding and managing emerging global risks which, by definition, respect no national boundaries.
In 2015, the Aon Global Risk Management Survey revealed how increasing competition remained at the top of the industry’s list of concerns, but the potential for damage to brand and reputation is now second, having risen up from seventh place in the previous survey.
Like any responsible supplier, we know that the answer to delivering a good service is to ensure our customers are fully furnished with the facts that may influence their buying decisions. In this report, we consider how these factors translate into the risk profile of UK retail and how they may influence insurers to underwrite them at a good price, or lower, than last time around
Twitter for Consumer Businesses: Overview of Twitter Business Uses & TrendsAdam Schoenfeld
An overview of Twitter for B2C businesses I recently presented for a group of venture capitalists. The deck touches on the following points:
1. Why do consumer businesses care about Twitter?
2. How is Twitter being used - high level?
3. How is Twitter being used for customer service and market - specifics
4. Take Aways
5. Trends to watch
For a company like Aon, sectors like food and drink manufacturing are our lifeblood. The industry employs over 400,000 people in the UK, accounts for more than £80bn in annual turnover and we are proud to work with many of the sector’s leading companies in the UK and across the world.
Now joining us for the third year in a row, Ash will provide a further ‘digital dear diary’ update, focusing specifically on his team’s work to influence change to build a truly digital culture across the organisation.
In June 2013, Ash Roots spoke at the Digital Summit just a few months into his role as Director of Digital at Direct Line Group. Brought in to lead a digital transformation at the major insurer, he explained what he’d learned in his early weeks and months… what was working and what wasn’t… how he was trying to build capability and what he saw coming down the road. One year later, Ash reprised his role with an update. How had the last year gone? What progress had been made and what led to that progress? Did things really pan out the way he thought and if not, what got in the way and how did he tackle it?
THE ILLINOIS POISON CENTER is much more than the operators who answer the phone and provide help to those in need. We are a group of health care professionals, specially trained to give advice and on-site poisoning treatment that saves lives. In times of need, doctors, nurses, and pharmacists call on us, along with tens of thousands of people throughout Illinois facing a potential poisoning. But we don’t just treat the problem. Through proper education, we help prevent poisonings from ever happening in the first place.
IBM Security Strategy Intelligence, Integration and Expertise
by Marc van Zadelhoff, VP, WW Strategy and Product Management and Joe Ruthven IBM MEA Security Leader
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docxARIV4
Microsoft Strategic Initiative
Charls Yang, Yining Xie, Andres Hoberman, Kyle Pauling
Good afternoon everyone. My name is Charles, this is Lizzie, Andres, and Kyle. Today, we are going to present a strategic initiative plan for microsoft for the 2018 fiscal year and beyond.
Cybersecurity
The topic we want to focus on and bring to the business’s attention today is cybersecurity. For those who are unfamiliar, Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs, and data from attack and unauthorized access.
Cybercrime Portfolio
Cyber attacks
Security vulnerabilities
Disclosure of personal data
Network outages and data loss
Disruption of online services
All threaten long-term customer loyalty, security, firm revenue, and firm reliability
Activities that cybersecurity tries to prevent include but are not limited to cyber attacks, etc etc. which all threaten customer relations, security of our firm, our revenue, as well as firm reliability.
Increasing Prevalence
The reason why cybersecurity has come on our radar now is because of the steady increases of attacks in the last few years. The two biggest reasons for this are the boom of the internet of things as well as the underground market. When we implement software in all areas of our life, there will be more opportunities for cybercriminals to target.
Cybercrime Costs
Cybersecurity spending to exceed $1 trillion from 2017-2021
Cybersecurity Costs
Average cost of ~$12 – $17M per incident
Data Breaches
Overall costs to hit $6 trillion annually by 2021
Cybercrime Costs
$325M in damages caused by global ransomware
Damaged caused by global ransomware to surpass $5B in 2017. A 15x from 2015
Global Ransomware
Cybersecurity- Our Business Segments
Personal Computing
Windows OS
82.96% market share
Dependence on the OS by customers like the U.S. Department of Defense or the biggest banks in the world like JP Morgan Chase
A bug that restricts computer usage or alters functions could cause damage to millions of devices and users’ information
Apple macOS password glitch this week; hurts their sales
Intelligent Cloud
Azure, Dynamics 365
Links multiple networks and is the backbone of the firm’s infrastructure
Stores business and personal data
Leaks or hacks can expose personal banking or other sensitive information
Late 2010, Microsoft cloud breach allowed anybody to see employee information
Productivity & Business Processes
Office, Exchange, Skype, Outlook, LinkedIn, ERP, CRM
Office (Commercial and 365)
Over 1 billion users
Excel contains financial information that can benefit hackers
Powerpoint can contain interfirm information that is not public yet
Office 365 breach June 2016
57% of users affected
Ransom note that also included an audio warning
Next Steps
The
Solution
Acquire new resources to boost cyber security through:
Organic
Internal departmental growth
Acquisitions
Complete control of external resources
Alliances
P ...
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
As cyber attacks have matured and become more complex over the last number of years, the objective of most attacks has not changed: compromise and collect user credentials. This session will explore the changing cybersecurity landscape and how managing identity – both in the enterprise as well as across 3rd party applications - is becoming job #1 in managing your organization’s risk.
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsIBM Security
Attackers are using increasingly sophisticated methods to access your most sensitive data, and at the same time cloud, mobile and other innovations expand the perimeter you need to protect. This keynote discusses how to build a more secure enterprise with real-time analytics and behavior-based activity monitoring.
Advanced Security Intelligence tools store, correlate and analyze millions of events and flows daily to identify critical incidents your security team needs to investigate. The volume, variety and velocity involved clearly defines Security as a “Big Data challenge.”
Learn how advanced predictive analytics and incident forensics help defend against advanced attacks and respond to and remediate incidents quickly and effectively.
"Evolving Cybersecurity Strategies" - Threat protection and incident managmentDean Iacovelli
As the volume and sophistication of attacks has increased, it has become even more critical for organizations to be able to rapidly and accurately identify malicious attack vectors and payloads at time of delivery. This session will explore Microsoft’s unique approach to dealing with this problem and also how we approach tracing and deconstructing a successful attack in order to prevent its’ next iteration.
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
Attackers and exploits are becoming increasingly sophisticated, and the pressure to protect business critical data is only getting more and more intense. Security Intelligence transforms the playing field by adding analytics and context, and shifts the balance in favor of the good guys. Today forward thinking organizations are looking at extending Security Intelligence even further by combining it with Big Data to form a solution that allows them to analyze new types of information, and data that travels at higher velocity, and in larger volume. This powerful combination yields new insights that can more effectively identify threats and fraud than ever before.
In this session, attendees will learn how to combine Security Intelligence and Big Data, and deploy a solution that is well suited for structured, repeatable tasks. We will also cover the addition of complementary new technologies that address speed and flexibility, and are ideal for analyzing unstructured data. This session will also highlight how organizations are using Security Intelligence to pro-actively detect advanced threats before they cause damage, and take effective corrective action if a compromise succeeds.
View the On-demand webinar: https://www2.gotomeeting.com/register/657029698
Cyber-I, in association with Intel Security (formerly McAfee), recently delivered an executive over entitled "Security Trends Affecting Security Strategy".
CE Cybersecurity Trends and Strategies for Hosting in the CloudCase IQ
Why does security feel like the most frustrating challenge in government IT? In part, because security in a cloud-first, mobile-first world calls for new approaches. Data is accessed, used and shared on-premises and in the cloud–erasing traditional security boundaries.
In this webinar, we’ll examine current trends in cybersecurity and some resulting strategy shifts that have the potential to greatly enhance public sector organizations’ ability to balance risk and access, better detect and respond to attacks and just make faster and more coordinated cybersecurity decisions overall. Finally, we’ll look at a common set of attacks occurring specifically in state and local government and steps you can take right now to help mitigate these.
Join Dean Iacovelli, Director for Secure Enterprise at Microsoft, as he discusses current trends and strategies to mitigate your cybersecurity risk.
ICC's unified IP data networking solution also layers into its solution security features with a range of capabilities for the customer to select from. Inclusive of WDS, VLANs, DoS attack prevention, and a host of other capabilities, ICC's icXchange networking solutions are full features without additional licensing for enterprise features.
ICC's unified IP data networking solution also layers into its solution security features with a range of capabilities for the customer to select from. Inclusive of WDS, VLANs, DoS attack prevention, and a host of other capabilities, ICC's icXchange networking solutions are full features without additional licensing for enterprise features.
Similar to Ibm security overview 2012 jan-18 sellers deck (20)
Helping Innovators to Innovate, Arrow ECS and IBMArrow ECS UK
A reminder of the Arrow ECS and IBM MSP & ISV Jam. Including the future of consumer technology, opportunities for MSP's and ISVs and an update on how IBM continues to innovate.
Gain maximum benefit from Channel Technical Professionals and the technical p...Arrow ECS UK
Gain maximum benefit from Channel Technical Professionals and the technical programs by Colm Kenneally, IBM Business Analytics, Mid-Market and Partner Enablement.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
Ibm security overview 2012 jan-18 sellers deck
1.
2. The world is becoming more digitized and interconnected, opening the door to emerging threats and leaks… Organizations continue to move to new platforms including cloud, virtualization, mobile, social business and more EVERYTHING IS EVERYWHERE With the advent of Enterprise 2.0 and social business, the line between personal and professional hours, devices and data has disappeared CONSUMERIZATION OF IT The age of Big Data – the explosion of digital information – has arrived and is facilitated by the pervasiveness of applications accessed from everywhere DATA EXPLOSION The speed and dexterity of attacks has increased coupled with new actors with new motivations from cyber crime to terrorism to state-sponsored intrusions ATTACK SOPHISTICATION
3. Targeted Attacks Shake Businesses and Governments IBM Security X-Force® 2011 Midyear Trend and Risk Report September 2011 Attack Type SQL Injection URL Tampering Spear Phishing 3 rd Party SW DDoS Secure ID Unknown Mar April May June July Aug Feb Sony Epsilon L3 Communications Sony BMG Greece US Senate NATO AZ Police Turkish Government SK Communications Korea Monsanto RSA HB Gary Nintendo Brazil Gov. Lockheed Martin Vanguard Defense Booz Allen Hamilton PBS PBS SOCA Malaysian Gov. Site Peru Special Police Gmail Accounts Spanish Nat. Police Citigroup Sega Fox News X-Factor Italy PM Site IMF Northrop Grumman Bethesda Software Size of circle estimates relative impact of breach
4.
5. Solving a security issue is a complex, four-dimensional puzzle It is no longer enough to protect the perimeter – siloed point products will not secure the enterprise People Data Applications Infrastructure Employees Consultants Hackers Terrorists Outsourcers Customers Suppliers Systems applications Web applications Web 2.0 Mobile apps Structured Unstructured At rest In motion
6. In this “new normal”, organizations need an intelligent view of their security posture Proficient Proactive Automated Manual Reactive Proficient Basic Optimized Optimized Organizations use predictive and automated security analytics to drive toward security intelligence Proficient Security is layered into the IT fabric and business operations Basic Organizations employ perimeter protection , which regulates access and feeds manual reporting Security Intelligence
9. Analysts recognize IBM’s superior products and performance Network Endpoint * Gartner MarketScope Domain Report Analyst Recognition Security Intelligence, Analytics and GRC Security Information & Event Management (SIEM) 2011 2010 Enterprise Governance Risk & Compliance Platforms 2011 2011 People User Provisioning / Administration 2011 2010 Role Management & Access Recertification 2011 Enterprise Single Sign-on (ESSO) 2011* Web Access Management (WAM) 2011* Data Database Auditing & Real-Time Protection 2011 Applications Static Application Security Testing (SAST) 2010 2010 Dynamic Application Security Testing (DAST) 2011 Infrastructure Network Intrusion Prevention Systems (NIPS) 2010 2010 EndPoint Protection Platforms (EPP) 2011 Challenger Leader Visionary Niche Player Leader (#1, 2, or 3 in segment) Leader Contender Strong Performer
10.
11.
12. How is IBM solving complex security challenges?
13. Data Explosion IBM is integrating across IT silos with Security Intelligence solutions Sources Intelligence Most Accurate & Actionable Insight + =
14. Solving complex problems that point solutions cannot Discovered 500 hosts with “Here You Have” virus, which all other security products missed Improving threat detection 2 billion log and events per day reduced to 25 high priority offenses Consolidating data silos Automating the policy monitoring and evaluation process for configuration changes in the infrastructure Predicting risks against your business Real-time monitoring of all network activity, in addition to PCI mandates Addressing regulatory mandates
15.
16.
17. Everything is Everywhere IBM is helping clients adopt cloud with flexible, layered security solutions IBM Security Intelligence Identity Federation Web Application Scanning Virtualization Security Network Security Image & Patch Management Database Monitoring
18.
19. Attack Sophistication IBM is helping clients combat advanced threats with pre- and post-exploit intelligence and action Prediction & Prevention Reaction & Remediation Network and Host Intrusion Prevention. Network Anomaly Detection. Packet Forensics. Database Activity Monitoring. Data Leak Prevention. SIEM. Log Management. Incident Response. Risk Management. Vulnerability Management. Configuration and Patch Management. X-Force Research and Threat Intelligence. Compliance Management. Reporting and Scorecards. IBM Security Intelligence What are the external and internal threats? Are we configured to protect against these threats? What is happening right now? What was the impact?
20.
21. Security Intelligence is enabling progress to optimized security Security Intelligence Optimized Security Intelligence: Information and event management Advanced correlation and deep analytics External threat research Role based analytics Identity governance Privileged user controls Data flow analytics Data governance Secure app engineering processes Fraud detection Advanced network monitoring Forensics / data mining Secure systems Proficient User provisioning Access mgmt Strong authentication Access monitoring Data loss prevention Application firewall Source code scanning Virtualization security Asset mgmt Endpoint / network security management Basic Centralized directory Encryption Access control Application scanning Perimeter security Anti-virus People Data Applications Infrastructure
22. Intelligent solutions provide the DNA to secure a Smarter Planet Security Intelligence, Analytics & GRC People Data Applications Infrastructure
Organizational and Solution Silos: data without context Cost and Complexity of offerings: limited ROI Compliance does not deliver security: budget can enable security intelligence Proliferation of point solutions: too many, not proactive Scale, but at what cost: not architected for new normal
No one is immune and the costs are going up. Take the Sony breaches: Accounts affected: 77M Playstation Network, 25M Sony Online Entertainment Data stolen: Name, address, gender, date of birth, phone number, email address, login name, password, account number Lost revenue: $10M per week Law suits: $100M+ to $Bs Brand reputation: Incalculable
IBM is building integrated security solutions around four domains: People, Data, Applications, and Infrastructure. If you can secure across those domains, not just within each as a stand-alone, siloed area, you can build a secure environment and foster innovative use of technology.
Bringing of IBM’s security software and hardware products into one unified team will enable us to develop the integrated strategy and roadmap needed in today’s world of ever-increasing security complexity. We are building our team to provide and single voice of IBM security for the client and to support the CISO in developing
IBM has security consultancy practices and dedicated security research capabilities across the globe
security has to be everywhere.... layering on security intelligence....
IBM PULSE 2011 Steve Robinson_v11 02/27/12 09:17 Finally, attack sophistication is through the roof. I don ’t at all want to make light of the advanced persistent threat. It’s all of those things: advanced, persistent and threatening. It’s also well funded by state and non-state actors. And regardless, the motivation to break in and grab stuff has risen from just for kicks or money… no notoriety and activism being motivators. 02/27/12
Wherever they are in their current security posture, IBM is helping clients to a new level of security maturity through Security Intelligence.