12. Mise à jour : 3 novembre 2016 12
Identities
LifecycleCompliance
Analytics
Identities
Platform
IGI
SDS
13. Mise à jour : 3 novembre 2016 13
Access To Applications
FederationAdvanced Access
Control
Web Access Management
PlatformAdd-Ons
ISAM
14. Mise à jour : 3 novembre 2016 14
Users & Administrators
Enterprise Users Administrators
SAM eSSO PIM
Access
Agent
Web Applications
Java Applications
Windows Applications
…
Mainframe
Applications
17. Mise à jour : 3 novembre 2016 17
Data Analysis
Unstructured Data
Structured Data
Watson
Explorer
Information
in motion
Variety of
information
Discovery
Extreme
Volumes
Testing
InfoSphere
Discovery
Business
Glossary
Guardium
VA
Optim
Guardium
DAM
18. Mise à jour : 3 novembre 2016 18
Activity Monitoring And Data Protection
Web Server
HTTP/HTTPS
Application
Server
Guardium
DAM
Guardium
Encryption
Data
Servers
Data Privacy
For Hadoop
21. Mise à jour : 3 novembre 2016 21
Application Development
Manual Pen Testing
SECURITY
BUILD
PRODUCTION
CODE
QA
Security requirements defined
before design & implementation
AppScan
Source
Integration
in the development
team platform
AppScan
AppScan
Enterprise
22. Mise à jour : 3 novembre 2016 22
Mobile Apps Protection
Manual Pen Testing
SECURITY
BUILD
PRODUCTION
CODE
QA
Security requirements defined
before design & implementation
AppScan
Source
Integration
in the development
team platform
Security
on Cloud
Arxan
25. Mise à jour : 3 novembre 2016 25
Risk Analysis
WWW
Phishing
Malwares
Online Financial Services
Malware
Detection
Account TakeOver
Detection
Client Criminal
Rapport
Pinpoint
Detect
Endpoints
Protection
Risk
Analysis
Mobile
SDK
Mobile Risks
26. Mise à jour : 3 novembre 2016 26
Endpoint Protection
WWW
Phishing
Malwares
Client Criminal
Rapport
Endpoints
Protection
Risk
Analysis
Mobile
SDK
Online Financial Services
Malware
Detection
Account TakeOver
Detection
Pinpoint
Detect
Mobile Risks
Mobile
Risk Engine
29. Mise à jour : 3 novembre 2016 29
Activity Monitoring & Incident Management
Logs
Events Alerts
Configuration
information
System
audit trails
External
threat feeds
Network flows
and anomalies
Identity
context
Malware
information
QRadar
SIEM
QRadar
Log Manager
Prioritized
Incidents
Offenses
Detection
Resilient
Incident
Response
30. Mise à jour : 3 novembre 2016 30
Risks And Vulnerabilities
Vulnerabilities
Risks
Attacks
Exploits
QRadar
VM
QRadar
RM
QRadar
SIEM
AppScan
Enterprise