A brief overview of IBM Cloud security in three slides – SaaS, IaaS and PaaS, and the others providing a snapshot of IBM's current set of SaaS, IaaS and PaaS offerings.
2. 2 IBM Security
IBM Cloud Security Portfolio Capabilities
Delivering capabilities and adding differentiating security value
Manage Access Protect Data Gain Visibility
Securely consume
(SaaS)
Cloud Security Enforcer
Cloud Identity Service
IBM MaaS360 Mobile Device
Management
Trusteer Mobile Risk Engine Cloud Security Enforcer
QRadar on Cloud
X-Force Exchange
Securely create
and integrate
(IaaS, PaaS and hybrid)
Cloud Sign On Service
(SSO for Bluemix)
Cloud Access Manager
Cloud Privileged Identity Manager
Application Security on Cloud
Key management service & Hardware security
module (HSM)
Data Encryption Services – Database & Files
Vulnerability Advisor for Containers
Trusted computing platform
Network Security Groups, Firewalls and IPS
Cloud Security Intelligence
Cloud Data Activity Monitoring
Vulnerability Advisor for Containers
Access Trail
Platform user authentication
Role based access & granular
permissions
Privileged user management
Block storage encryption
Isolating customer workloads and containers
Network security and protection
Secure Engineering and Operations
Platform security monitoring
Incident management processes
Vulnerability scanning and management
3. 3 IBM Security
“I’m composing
Cloud apps
and I need:
• Middleware/
APIs
• Databases
• Mobile
• AppSec
• IAM
…”
“I’m moving
on-premise
workloads to
the cloud and
need flexible:
• Hardware
• Storage
• Network
…”
Customer
need
“I want to
leverage your
security
product(s), but
please deliver
the capability
via the cloud.
No ‘on-premise’
solution for me to
manage.”
IBM
offering(s)
A large/growing number
of IBM Security
solutions, including
• IBM Cloud Security Enforcer
• IBM X-Force Exchange Commercial API
• IBM Security Intelligence on Cloud
• Intelligent Log Management on Cloud
• IBM MaaS360
• Trusteer Web Fraud Protection family
• IBM Cloud Identity Services
• AppScan Mobile Analyzer
on IBM Cloud Marketplace
“I want to
discover, manage
and secure my
employees’ use of
cloud applications
and services.”
IBM Cloud Security
Enforcer
Secure employee
cloud usage
SaaS IaaS PaaS
IBM Cloud Security addresses a wide range of use cases
4. 4 IBM Security
Current IBM Security Cloud Offerings – September 2016
Delivering capabilities and adding differentiating security value
Managed Security Services
Cloud Identity Service
Security Intelligence and Operations Consulting
Services
Cloud Security Managed Services
Intelligent Threat Protection Cloud
Executive Protection Service
Hosted security event and log management
Managed SIEM
Advanced Cyber Threat Intelligence
Advanced Persistent Threat (APT) Survival Kit
Infrastructure as a Service (IaaS)
BigFix (SoftLayer/AWS)**
Security Identity Manager VA***
Security Access Manager V9***
Security Directory Suite V8***
Guardium Data Activity Monitor VA***
Guardium Vulnerability Assessment VA***
Cloud Data Encryption Services
QRadar SIEM V7.2.3+***
Platform as a Service (PaaS)Software as a service (SaaS)
Cloud Sign On Service (SSO for Bluemix)
Cloud Mobile App Analyzer Service
Cloud Web App Analyzer Service
Guardium is a feature of Bluemix/SQLDB and
Bluemix/dashDB
IBM Key Protect
***Supports SoftLayer (bare metal) & Amazon Web Services (AWS) EC2*Managed services
IBM Cloud Security Enforcer
IBM MaaS360
Trusteer Web Fraud Protection suite
Application Security on Cloud
IBM Cloud Identity Service*
Intelligent Log Management on Cloud*
QRadar on Cloud
X-Force Exchange Commercial API
** BigFix helps secure on-
premise workloads moved
to the cloud on SoftLayer
and AWS.
6. 6 IBM Security
Notices and Disclaimers Con’t.
6
Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not
tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products.
Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the
ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
The provision of the information contained h erein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual
property right.
IBM, the IBM logo, ibm.com, Aspera®, Bluemix, Blueworks Live, CICS, Clearcase, Cognos®, DOORS®, Emptoris®, Enterprise Document Management System™, FASP®,
FileNet®, Global Business Services ®, Global Technology Services ®, IBM ExperienceOne™, IBM SmartCloud®, IBM Social Business®, Information on Demand, ILOG,
Maximo®, MQIntegrator®, MQSeries®, Netcool®, OMEGAMON, OpenPower, PureAnalytics™, PureApplication®, pureCluster™, PureCoverage®, PureData®,
PureExperience®, PureFlex®, pureQuery®, pureScale®, PureSystems®, QRadar®, Rational®, Rhapsody®, Smarter Commerce®, SoDA, SPSS, Sterling Commerce®,
StoredIQ, Tealeaf®, Tivoli®, Trusteer®, Unica®, urban{code}®, Watson, WebSphere®, Worklight®, X-Force® and System z® Z/OS, are trademarks of International Business
Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM
trademarks is available on the Web at "Copyright and trademark information" at: www.ibm.com/legal/copytrade.shtml.