SlideShare a Scribd company logo
1 of 39
Download to read offline
© 2015 IBM Corporation
Securing Your Cloud
Applications
Nataraj (Raj) Nagaratnam
CTO for Security Solutions, IBM Security
Sreekanth Iyer
Executive IT Architect, IBM Security
Jeffrey Hoy
Cloud Security Architect, IBM Security
Agenda
• Security for Infrastructure Services (IBM SoftLayer)
• Security for Platform Services (IBM Bluemix)
1
IaaS
PaaS
Cloud is rapidly transforming the enterprise
External StakeholdersTraditional Enterprise IT
Public CloudPrivate Cloud
PaaS
Development
services
SaaS
Business
applications
IaaS
Infrastructure
services
100+ IBM
Offerings
HR,
CRM, SCM
Data
archive
App
development
100+ IBM
Offerings
Online
website
Cloud presents the opportunity to radically transform
security practices
Dynamic Cloud Security
Standardized, automated,
agile, and elastic
Traditional Security
Manual, static,
and reactive
Cloud security is not only achievable, it is an opportunity
to drive the business, improve defenses and reduce risk
Clients focus on three imperatives for improving security
Detect threats with
visibility across clouds
Govern the
usage of cloud
Protect workloads
and data in the cloud
How can I understand who
is accessing the cloud
from anywhere, at anytime?
How can I fix vulnerabilities
and defend against attacks
before they’re exploited?
How can I obtain a
comprehensive view of cloud
and traditional environments?
“I can take advantage
of centralized cloud
logging and auditing
interfaces to hunt
for attacks.”
“Going to the cloud
gives me a single
choke point for all user
access ‒ it provides
much more control.”
“Cloud gives me
security APIs and
preconfigured policies
to help protect my data
and workloads”
IBM Dynamic Cloud Security
Optimize Security Operations
Manage
Access
Protect
Data
Gain
Visibility
SaaSPaaSIaaS
Structured Approach to Cloud Security
Assess and Govern
Focus for this Session
JKE Overview
6
JK Enterprises (JKE)
• A multinational financial services company that offers wide
range of wide range of financial and insurance products
and services
• Operates world-wide, with major offices in AP, EMEA and
US
• Employs approximately 5,500 staff
• Financial details include:
• A combined premium income of over $2.5 billion
• Investment assets of approximately $16.8 billion
• Customers include:
• End customers: over 2 million insured customers
• Brokers: over 200 registered brokers
• Has partnerships with a large number of partners, mainly
in the area of brokering and financial advice
• Provides internet customers and brokers with online
access to applications.
Securing Cloud – JKE Scenario
7
Focus for this Session
Security for Infrastructure Services
IaaS
Security comes “in” (inherent in) and “on” (accessible
from) IaaS provider
Identity Protection Insight
Accessible
“on” a IaaS
Cloud Provider
– Bring your
own security
 Privileged admin
management
 Access management
of web workloads
 Network protection ‒
Firewalls, IPS, proxy
 Host security,
vulnerability scanning
 Encryption and key
management
 Monitoring customer
hybrid infrastructure and
workloads.
 Log, Audit, and
compliance reporting
 Vulnerability management
Inherent “in” a
IaaS Cloud
Provider –
Security
provided in
SoftLayer
 Admin user
management
 Isolation of VMs, and
dedicated instances
 Security monitoring of
cloud infrastructure
 Role and entitlement
management
 Network firewalls,
VPNs; DoS protection
 Platform intelligence
 Federation of admin
users from
enterprises
 Encryption of data at
rest and secure key
store
 API access to cloud
service logs
IaaS
Security “in” (inherent in) IBM SoftLayer
SoftLayer Security
Features & Options
 Physical DC Security
 Logical Segregation
 GeoTrust SSL Certificates
 Two-Factor Authentication
for Portal Administrators
 McAfee Host Protection
 DC Site Affinity Option
IBM MSS - Fully Managed
Cloud Security Services
 Hosted Web Defense (DDoS+WAF)
 Hosted Application Security
Management Services
 Hosted Security Event and Log
Management
 Hosted Vulnerability Management
 Managed FW, IDPS and UTM
 Managed Email and Web Security
Comprehensive security for
IT assets deployed in
SoftLayer
VALUE
IBM SoftLayer and IBM Managed Security Services (MSS) provide
comprehensive cloud security solutions and capabilities for cloud customers –
IaaS
Scenario Overview
11
Enterprise
Application
Dev/Test/Prod
Infrastructure
Public CloudPrivate Cloud
IaaS
JK Enterprises (JKE)
Description
1 JKE provisions infrastructure resources and moves to Cloud
2 JKE deploys their business application on Cloud
Privileged User Management
12
IaaS
JK Enterprises (JKE)
1 JKE Cloud Administrator logs into SoftLayer
2 JKE Cloud Administrator provisions and sets up the required resources on Cloud
3 Weak management of password and administrator activities can compromise cloud systems
4 JKE implements Privileged User Management to monitor and audit cloud Admin activities
5 Privileged Identity Manager captures and tracks all actions by admin
JKE Cloud Administrator
IBM Security Privileged Identity Management
Dev/Test/ Prod
Infrastructure
Manage Access
Automated Provisioning of ISAM Virtual Appliance
13
IaaS
JK Enterprises (JKE)
1 JKE likes to add web application protection for their application on cloud
2 JKE deploys ISAM Virtual Appliance on SoftLayer
(Automated Provisioning and Configuration of ISAM Appliance on SoftLayer)
3 JKE can manage access and protect applications from attacks.
Employees
IBM Security Access Manager Virtual Appliance
Enterprise
Application
Agents / Partners/ Customers
Manage Access
Log Management & Security Intelligence
14
IaaS
JK Enterprises (JKE)
1 JKE Security Administrator wants visibility into their cloud infrastructure on SoftLayer
2 JKE Security Administrator uses IBM Security QRadar SIEM
3 QRadar collects all the events from security appliances, infrastructure and applications
4 QRadar detects anamolies, security threats and generates reports for audit and compliance.
JKE Security Administrator
IBM Security QRadar SIEM
Enterprise
Application
Dev/Test/Prod
Infrastructure
IBM Security
Access Manager
Virtual Appliance
IBM Security
Privileged Identity
Management
Employees
Agents / Partners/ Customers
Gain Visibility
IBM Security capabilities (“On”) SoftLayer that enhances
security of customer workloads
15
IaaS
Enterprise
Cloud
Administrators
Consolidated
logs and events
Portal and APIs
Application
users
Enterprise security monitoring
IBM Virtual SOC
services
Manage Access Protect Data Gain Visibility
Security for Platform Services
PaaS
Security comes “in” (inherent in) and “on” (accessible from) Provider
Identity Protection Insight
Accessible
from a PaaS
Cloud Provider
‒ Design your
own security
 APIs for
authentication/SSO of end
users, for services/apps
 APIs to perform context
aware access
 Security testing of App,
service and APIs
 Key management APIs
 APIs for fraud detection
 IP reputation/threat
intelligence APIs
 APIs for customer app log and
audit
 Application security and real
time monitoring
 Application vulnerability
management
Inherent “in” a
PaaS Cloud
Provider ‒
Security is
“baked in”
platform
 Developers registration
and SSO
 Group management;
Entitlements to apps,
services
 Federation of
developers/platform users
 Data protection and
compliance
 Application container
 Fabric and services
isolation and protection
 Customer specific log and audit
trail APIs
 Active security monitoring of
provider (not individual
customer services)
Hosted on
PaaS
Bluemix Platform Security Overview
18
“on” Bluemix Security
Single Sign On
• Add user authentication to your apps with policy-based configuration
• Zero coding approach
• Integrate with existing enterprise directory with SAML
• Option to chose from identity sources like Facebook, LinkedIn, and Google
• Option to create and use your own cloud directory
Key Features
Social
Identities
Enterprise
ID
Manage Access
AppScan Dynamic Analyzer
• Discover vulnerabilities before putting cloud apps into production
• Minimal configuration and developer training / preparation
• Scans authenticated and unauthenticated pages and identifies security issues
• Identifies a large variety of vulnerabilities, from OWASP Top 10, SANS Top 25 and more
• Produces a detailed security report - actionable information with remediation instructions
Key Features
Protect Data
AppScan Mobile Analyzer
• Based on Glass Box principles
• Identifies security issues in Android applications
• Produces a detailed security report
• Includes remediation steps
• Developer targeted information.
Key Features
Protect Data
Secure data warehousing and analytics
Data
Encryption
Data Access
Control
Activity
Monitoring
dashDB
• Automatic encryption for data at rest using Advanced Encryption Standard (AES)
• Encryption for data in transit - SSL is automatically configured when dashDB database is
provisioned
• dashDB database is continuously monitored through IBM InfoSphere Guardium
• Database access control – define who has access to what objects in the database
Key Features
Protect Data
Security Intelligence for the hybrid cloud
Gain Visibility
Cloud
Applications
Loggregator
• Facility to drain logs over syslog, syslog-tls or https through user provided service
• Includes all the events related to the app including staging and deployment
• Capability to distinguish the logs from different instances of the application
• Device Support Module (DSM) in QRadar for parsing CloudFoundry and application events
Key Features
Cloud
Applications
User Provided
Service
SSO Access to Bluemix Application
25
PaaS
JK Enterprises (JKE)
1 JKE Employees want to access business app deployed on Cloud by JKE Partner
2 JKE uses Identity as a SSO Service on Bluemix
3 Employees access the Bluemix application seamlessly using their enterprise/intranet ID
(SAML Federation using Enterprise Bridge)
Employees
HealthCare
Application
Single Sign On (SSO) on IBM Bluemix
Partner
Manage Access
Social Access to Cloud Application
26
App
Development
Social
Application
Public CloudPrivate Cloud
PaaS
Agents / Partners/ Customers
App Developers
Single Sign On (SSO) on IBM Bluemix
1 Marketing team wants to develop a new Cloud Systems of Engagement App
2 Uses IBM SSO Service Offering on Bluemix for SSO
3 Customers can access the Bluemix app using their social IDs
4 IDs of Contractors / Agents hired for the Marketing Campaign managed on Cloud Directory
Marketing Department
Manage Access
Cloud Application Security & Protection
27
App
Development
Internet
Application
Public CloudPrivate Cloud
PaaS
App Developers
IBM AppScan Dynamic Analyzer on Bluemix
1 App Developer wants to ensure the application is secure and there are no vulnerabilities
2 App Developer uses IBM Appscan Dynamic Analysis Service on Bluemix
3 App Developer gets a report on the App vulnerabilities and threats and recommendations on
how to fix them
(JKE Subsidiary)
Protect Data
Securing Mobile Application
28
Mobile
Application
Public CloudPrivate Cloud
PaaS
App Developers
IBM AppScan Mobile Analyzer on Bluemix
1 App Developer wants to ensure the mobile application is secure and has no vulnerabilities
2 App Developer uses IBM Appscan Mobile Analyzer Service on Bluemix
3 App Developer uploads the mobile application file (.apk)
4 App Developer gets a report on the Mobile App vulnerabilities, threats and recommendations
Protect Data
Database Service Security & Protection
29
Public CloudPrivate Cloud
PaaS
App Developers
InfoSphere Guardium
1 JKE use managed dataware housing and analytics services from the cloud (DashDB)
1 App Developer wants to ensure the access to the data is monitored
2 JKE gets reports on sensitive data access on the cloud
JK Enterprises (JKE)
Protect Data
Security Intelligence for Bluemix Apps
30
App
Development
Internet
Application
Public CloudPrivate Cloud
PaaS
JK Enterprises (JKE)
JKE Security Administrator
IBM Security QRadar SIEM
1 JKE Security Administrator wants visibility into their application on the cloud
2 JKE Security Administrator uses IBM Security QRadar SIEM
3 QRadar collects all the events related to the Bluemix Application
4 QRadar detects anomalies, security threats and generates reports for audit and compliance.
Gain Visibility
Open Standards
&
IBM Cloud Security
32
Protect DataManage Access Gain Visibility
Kerberos RSA
AESTriple-DES
X.509
Certificates
SHA
Hashing
KMIP
Key Management
ISO 27018
Data Protection for Cloud Services
PCI-DSS
Controls for Card Data
ISO 24760
ID Management Architecture
ISO 17789
Cloud Computing Reference Architecture
CSCC
o Security for Cloud Computing:
10 Steps to Ensure Success Version 2.0
o Practical guide to Cloud SLAs
o Practical Guide to Cloud Computing
Version 2.0
o Cloud Security Standards: What to
Expect & Negotiate
ISO 29101
Privacy Architecture Framework
ISO 27017
Information Security Controls for Cloud Services
ISO 19794
Biometric Interchange Formats
ISO 19086
Cloud SLAs
CADF
Cloud Audit Data Federation
Cloud Security Standards*
* Indicative list only
Encryption
Cloud Computing Reference Architecture (CCRA)
- Providing Prescriptive Guidance to secure Client Cloud Adoption Patterns
Capabilities provided to
consumers for using a
provider’s applications
Integrated service
management, automation,
provisioning, self service
Pre-built, pre-integrated IT
infrastructures tuned to
application-specific needs
Advanced platform for
creating, managing, and
monetizing cloud services
Cloud Enabled Data Center
Cloud Platform Services
Cloud Service Provider
Business Solutions on Cloud
Big Data / Analytics workload
on cloud
Social / Mobile workloads on
Cloud
Federal/Government
Workloads on Cloud
Big Data / Analytics
Mobile
G Cloud
IBM Dynamic Cloud Security Portfolio
 Cloud Security Intelligence NEW! Cloud Identity Services NEW!
 Cloud Sign On Service NEW!
 Cloud Access Manager NEW!
 Cloud Privileged Identity Manager NEW!
 Cloud Data Activity Monitoring NEW!
 Cloud Mobile Application Analyzer NEW!
 Cloud Web Application Analyzer NEW!
Optimize Security Operations
Deliver a consolidated view of your security operations – at unprecedented speed and agility
Protect Data
Identify vulnerabilities and help prevent
attacks targeting sensitive data
Gain Visibility
Monitor the cloud for security breaches
and compliance violations
 Intelligent Threat Protection Cloud
NEW!
 Cloud Security Managed Services
NEW!
 Security Intelligence and Operations
Consulting Services NEW!
SaaSPaaSIaaS
Manage Access
Safeguard people, applications,
and devices connecting to the cloud
Learn more about IBM Security
Visit our website
IBM Security Website
Watch our videos
IBM Security YouTube Channel
Read new blog posts
SecurityIntelligence.com
Follow us on Twitter
@ibmsecurity
IBM Security
Intelligence. Integration. Expertise.
Notices and Disclaimers
Copyright © 2015 by International Business Machines Corporation (IBM). No part of this document may be reproduced or
transmitted in any form without written permission from IBM.
U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with
IBM.
Information in these presentations (including information relating to products that have not yet been announced by IBM) has been
reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM
shall have no responsibility to update this information. THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY,
EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE USE OF
THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT
OR LOSS OF OPPORTUNITY. IBM products and services are warranted according to the terms and conditions of the
agreements under which they are provided.
Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without
notice.
Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are
presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual
performance, cost, savings or other results in other operating environments may vary.
References in this document to IBM products, programs, or services does not imply that IBM intends to make such products,
programs or services available in all countries in which IBM operates or does business.
Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not
necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither
intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation.
It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal
counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s
business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or
represent or warrant that its services or products will ensure that the customer is in compliance with any law.
Notices and Disclaimers (con’t)
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products in connection with this
publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM
products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.
IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to
interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED,
INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE.
The provision of the information contained herein is not intended to, and does not, grant any right or license under any
IBM patents, copyrights, trademarks or other intellectual property right.
• IBM, the IBM logo, ibm.com, Bluemix, Blueworks Live, CICS, Clearcase, DOORS®, Enterprise Document
Management System™, Global Business Services ®, Global Technology Services ®, Information on Demand,
ILOG, Maximo®, MQIntegrator®, MQSeries®, Netcool®, OMEGAMON, OpenPower, PureAnalytics™,
PureApplication®, pureCluster™, PureCoverage®, PureData®, PureExperience®, PureFlex®, pureQuery®,
pureScale®, PureSystems®, QRadar®, Rational®, Rhapsody®, SoDA, SPSS, StoredIQ, Tivoli®, Trusteer®,
urban{code}®, Watson, WebSphere®, Worklight®, X-Force® and System z® Z/OS, are trademarks of
International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and
service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on
the Web at "Copyright and trademark information" at: www.ibm.com/legal/copytrade.shtml.
Thank You
Your Feedback is
Important!
Access the InterConnect 2015
Conference CONNECT Attendee
Portal to complete your session
surveys from your smartphone,
laptop or conference kiosk.

More Related Content

What's hot

Extend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsIBM Security
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Andris Soroka
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 
IBM Security Software Solutions - Powerpoint
 IBM Security Software Solutions - Powerpoint IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - PowerpointThierry Matusiak
 
Ibm security products portfolio
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolioPatrick Bouillaud
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud CrossoverArmor
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarIBM Security
 
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...PlatformSecurityManagement
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions Thierry Matusiak
 
Cybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabiaCybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabiaFaysal Ghauri
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsIBM Security
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Michael Noel
 
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudNIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudCloudHesive
 
From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardEMC
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyMicrosoft Österreich
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Sirius
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...IBM Security
 
Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security DemystifiedMichael Torres
 

What's hot (20)

IBM Security Immune System
IBM Security Immune SystemIBM Security Immune System
IBM Security Immune System
 
Extend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPs
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
IBM Security Software Solutions - Powerpoint
 IBM Security Software Solutions - Powerpoint IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - Powerpoint
 
Ibm security products portfolio
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolio
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud Crossover
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions
 
Cybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabiaCybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabia
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
 
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudNIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public Cloud
 
From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path Forward
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...
 
Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security Demystified
 

Viewers also liked

Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...IBM Security
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Sverige
 
Discover - Mapping Your Hybrid Cloud Journey
Discover - Mapping Your Hybrid Cloud JourneyDiscover - Mapping Your Hybrid Cloud Journey
Discover - Mapping Your Hybrid Cloud JourneyLaurenWendler
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...IBM Security
 
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYIDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYForgeRock
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Sverige
 
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker IdentityFederation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker IdentityCA API Management
 
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENTFUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENTForgeRock
 
Networks, Networks Everywhere, And Not A Packet To Drink
Networks, Networks Everywhere, And Not A Packet To DrinkNetworks, Networks Everywhere, And Not A Packet To Drink
Networks, Networks Everywhere, And Not A Packet To DrinkReadWrite
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyDavid J Rosenthal
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIsCA API Management
 
The Architecture of an API Platform
The Architecture of an API PlatformThe Architecture of an API Platform
The Architecture of an API PlatformJohannes Ridderstedt
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...CA API Management
 
Are ESBs Relevant in the Age of Microservices?
Are ESBs Relevant in the Age of Microservices?Are ESBs Relevant in the Age of Microservices?
Are ESBs Relevant in the Age of Microservices?Apigee | Google Cloud
 
Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterpriseCA API Management
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelSarah Moore
 
Open Source Identity Integration with OpenSSO
Open Source Identity Integration with OpenSSOOpen Source Identity Integration with OpenSSO
Open Source Identity Integration with OpenSSOelliando dias
 

Viewers also liked (20)

Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
 
Discover - Mapping Your Hybrid Cloud Journey
Discover - Mapping Your Hybrid Cloud JourneyDiscover - Mapping Your Hybrid Cloud Journey
Discover - Mapping Your Hybrid Cloud Journey
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
 
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYIDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - Portfolio
 
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker IdentityFederation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
 
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENTFUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
 
Networks, Networks Everywhere, And Not A Packet To Drink
Networks, Networks Everywhere, And Not A Packet To DrinkNetworks, Networks Everywhere, And Not A Packet To Drink
Networks, Networks Everywhere, And Not A Packet To Drink
 
IBM Security SaaS IaaS and PaaS
IBM Security SaaS IaaS and PaaSIBM Security SaaS IaaS and PaaS
IBM Security SaaS IaaS and PaaS
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIs
 
The Architecture of an API Platform
The Architecture of an API PlatformThe Architecture of an API Platform
The Architecture of an API Platform
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
 
Are ESBs Relevant in the Age of Microservices?
Are ESBs Relevant in the Age of Microservices?Are ESBs Relevant in the Age of Microservices?
Are ESBs Relevant in the Age of Microservices?
 
100 Beautiful Slides from Cannes Lions 2010
100 Beautiful Slides from Cannes Lions 2010100 Beautiful Slides from Cannes Lions 2010
100 Beautiful Slides from Cannes Lions 2010
 
Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterprise
 
Architecture for the API-enterprise
Architecture for the API-enterpriseArchitecture for the API-enterprise
Architecture for the API-enterprise
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 
Open Source Identity Integration with OpenSSO
Open Source Identity Integration with OpenSSOOpen Source Identity Integration with OpenSSO
Open Source Identity Integration with OpenSSO
 

Similar to Securing Your Cloud Applications

Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityIBM Security
 
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017Amazon Web Services
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
Barracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWSBarracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWSAmazon Web Services
 
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...Amazon Web Services
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...Amazon Web Services
 
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...Amazon Web Services
 
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersRapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersAjay Chebbi
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?IBM Security
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)Iftikhar Ali Iqbal
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2jeffirby
 
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAmazon Web Services
 
Top 10 cloud security tools to adopt in 2024.pdf
Top 10 cloud security tools to adopt in 2024.pdfTop 10 cloud security tools to adopt in 2024.pdf
Top 10 cloud security tools to adopt in 2024.pdfSparity1
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in CloudLenin Aboagye
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...Amazon Web Services
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureStefaan Van daele
 

Similar to Securing Your Cloud Applications (20)

Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Barracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWSBarracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWS
 
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
 
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
 
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersRapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?
 
IBM Cloud Security Enforcer
IBM Cloud Security EnforcerIBM Cloud Security Enforcer
IBM Cloud Security Enforcer
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
CIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdfCIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdf
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App Security
 
Top 10 cloud security tools to adopt in 2024.pdf
Top 10 cloud security tools to adopt in 2024.pdfTop 10 cloud security tools to adopt in 2024.pdf
Top 10 cloud security tools to adopt in 2024.pdf
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
 

More from IBM Security

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackIBM Security
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationIBM Security
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?IBM Security
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...IBM Security
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowIBM Security
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats IBM Security
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...IBM Security
 

More from IBM Security (20)

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Securing Your Cloud Applications

  • 1. © 2015 IBM Corporation Securing Your Cloud Applications Nataraj (Raj) Nagaratnam CTO for Security Solutions, IBM Security Sreekanth Iyer Executive IT Architect, IBM Security Jeffrey Hoy Cloud Security Architect, IBM Security
  • 2. Agenda • Security for Infrastructure Services (IBM SoftLayer) • Security for Platform Services (IBM Bluemix) 1 IaaS PaaS
  • 3. Cloud is rapidly transforming the enterprise External StakeholdersTraditional Enterprise IT Public CloudPrivate Cloud PaaS Development services SaaS Business applications IaaS Infrastructure services 100+ IBM Offerings HR, CRM, SCM Data archive App development 100+ IBM Offerings Online website
  • 4. Cloud presents the opportunity to radically transform security practices Dynamic Cloud Security Standardized, automated, agile, and elastic Traditional Security Manual, static, and reactive Cloud security is not only achievable, it is an opportunity to drive the business, improve defenses and reduce risk
  • 5. Clients focus on three imperatives for improving security Detect threats with visibility across clouds Govern the usage of cloud Protect workloads and data in the cloud How can I understand who is accessing the cloud from anywhere, at anytime? How can I fix vulnerabilities and defend against attacks before they’re exploited? How can I obtain a comprehensive view of cloud and traditional environments? “I can take advantage of centralized cloud logging and auditing interfaces to hunt for attacks.” “Going to the cloud gives me a single choke point for all user access ‒ it provides much more control.” “Cloud gives me security APIs and preconfigured policies to help protect my data and workloads”
  • 6. IBM Dynamic Cloud Security Optimize Security Operations Manage Access Protect Data Gain Visibility SaaSPaaSIaaS Structured Approach to Cloud Security Assess and Govern Focus for this Session
  • 7. JKE Overview 6 JK Enterprises (JKE) • A multinational financial services company that offers wide range of wide range of financial and insurance products and services • Operates world-wide, with major offices in AP, EMEA and US • Employs approximately 5,500 staff • Financial details include: • A combined premium income of over $2.5 billion • Investment assets of approximately $16.8 billion • Customers include: • End customers: over 2 million insured customers • Brokers: over 200 registered brokers • Has partnerships with a large number of partners, mainly in the area of brokering and financial advice • Provides internet customers and brokers with online access to applications.
  • 8. Securing Cloud – JKE Scenario 7 Focus for this Session
  • 10. Security comes “in” (inherent in) and “on” (accessible from) IaaS provider Identity Protection Insight Accessible “on” a IaaS Cloud Provider – Bring your own security  Privileged admin management  Access management of web workloads  Network protection ‒ Firewalls, IPS, proxy  Host security, vulnerability scanning  Encryption and key management  Monitoring customer hybrid infrastructure and workloads.  Log, Audit, and compliance reporting  Vulnerability management Inherent “in” a IaaS Cloud Provider – Security provided in SoftLayer  Admin user management  Isolation of VMs, and dedicated instances  Security monitoring of cloud infrastructure  Role and entitlement management  Network firewalls, VPNs; DoS protection  Platform intelligence  Federation of admin users from enterprises  Encryption of data at rest and secure key store  API access to cloud service logs IaaS
  • 11. Security “in” (inherent in) IBM SoftLayer SoftLayer Security Features & Options  Physical DC Security  Logical Segregation  GeoTrust SSL Certificates  Two-Factor Authentication for Portal Administrators  McAfee Host Protection  DC Site Affinity Option IBM MSS - Fully Managed Cloud Security Services  Hosted Web Defense (DDoS+WAF)  Hosted Application Security Management Services  Hosted Security Event and Log Management  Hosted Vulnerability Management  Managed FW, IDPS and UTM  Managed Email and Web Security Comprehensive security for IT assets deployed in SoftLayer VALUE IBM SoftLayer and IBM Managed Security Services (MSS) provide comprehensive cloud security solutions and capabilities for cloud customers – IaaS
  • 12. Scenario Overview 11 Enterprise Application Dev/Test/Prod Infrastructure Public CloudPrivate Cloud IaaS JK Enterprises (JKE) Description 1 JKE provisions infrastructure resources and moves to Cloud 2 JKE deploys their business application on Cloud
  • 13. Privileged User Management 12 IaaS JK Enterprises (JKE) 1 JKE Cloud Administrator logs into SoftLayer 2 JKE Cloud Administrator provisions and sets up the required resources on Cloud 3 Weak management of password and administrator activities can compromise cloud systems 4 JKE implements Privileged User Management to monitor and audit cloud Admin activities 5 Privileged Identity Manager captures and tracks all actions by admin JKE Cloud Administrator IBM Security Privileged Identity Management Dev/Test/ Prod Infrastructure Manage Access
  • 14. Automated Provisioning of ISAM Virtual Appliance 13 IaaS JK Enterprises (JKE) 1 JKE likes to add web application protection for their application on cloud 2 JKE deploys ISAM Virtual Appliance on SoftLayer (Automated Provisioning and Configuration of ISAM Appliance on SoftLayer) 3 JKE can manage access and protect applications from attacks. Employees IBM Security Access Manager Virtual Appliance Enterprise Application Agents / Partners/ Customers Manage Access
  • 15. Log Management & Security Intelligence 14 IaaS JK Enterprises (JKE) 1 JKE Security Administrator wants visibility into their cloud infrastructure on SoftLayer 2 JKE Security Administrator uses IBM Security QRadar SIEM 3 QRadar collects all the events from security appliances, infrastructure and applications 4 QRadar detects anamolies, security threats and generates reports for audit and compliance. JKE Security Administrator IBM Security QRadar SIEM Enterprise Application Dev/Test/Prod Infrastructure IBM Security Access Manager Virtual Appliance IBM Security Privileged Identity Management Employees Agents / Partners/ Customers Gain Visibility
  • 16. IBM Security capabilities (“On”) SoftLayer that enhances security of customer workloads 15 IaaS Enterprise Cloud Administrators Consolidated logs and events Portal and APIs Application users Enterprise security monitoring IBM Virtual SOC services Manage Access Protect Data Gain Visibility
  • 17. Security for Platform Services PaaS
  • 18. Security comes “in” (inherent in) and “on” (accessible from) Provider Identity Protection Insight Accessible from a PaaS Cloud Provider ‒ Design your own security  APIs for authentication/SSO of end users, for services/apps  APIs to perform context aware access  Security testing of App, service and APIs  Key management APIs  APIs for fraud detection  IP reputation/threat intelligence APIs  APIs for customer app log and audit  Application security and real time monitoring  Application vulnerability management Inherent “in” a PaaS Cloud Provider ‒ Security is “baked in” platform  Developers registration and SSO  Group management; Entitlements to apps, services  Federation of developers/platform users  Data protection and compliance  Application container  Fabric and services isolation and protection  Customer specific log and audit trail APIs  Active security monitoring of provider (not individual customer services) Hosted on PaaS
  • 21. Single Sign On • Add user authentication to your apps with policy-based configuration • Zero coding approach • Integrate with existing enterprise directory with SAML • Option to chose from identity sources like Facebook, LinkedIn, and Google • Option to create and use your own cloud directory Key Features Social Identities Enterprise ID Manage Access
  • 22. AppScan Dynamic Analyzer • Discover vulnerabilities before putting cloud apps into production • Minimal configuration and developer training / preparation • Scans authenticated and unauthenticated pages and identifies security issues • Identifies a large variety of vulnerabilities, from OWASP Top 10, SANS Top 25 and more • Produces a detailed security report - actionable information with remediation instructions Key Features Protect Data
  • 23. AppScan Mobile Analyzer • Based on Glass Box principles • Identifies security issues in Android applications • Produces a detailed security report • Includes remediation steps • Developer targeted information. Key Features Protect Data
  • 24. Secure data warehousing and analytics Data Encryption Data Access Control Activity Monitoring dashDB • Automatic encryption for data at rest using Advanced Encryption Standard (AES) • Encryption for data in transit - SSL is automatically configured when dashDB database is provisioned • dashDB database is continuously monitored through IBM InfoSphere Guardium • Database access control – define who has access to what objects in the database Key Features Protect Data
  • 25. Security Intelligence for the hybrid cloud Gain Visibility Cloud Applications Loggregator • Facility to drain logs over syslog, syslog-tls or https through user provided service • Includes all the events related to the app including staging and deployment • Capability to distinguish the logs from different instances of the application • Device Support Module (DSM) in QRadar for parsing CloudFoundry and application events Key Features Cloud Applications User Provided Service
  • 26. SSO Access to Bluemix Application 25 PaaS JK Enterprises (JKE) 1 JKE Employees want to access business app deployed on Cloud by JKE Partner 2 JKE uses Identity as a SSO Service on Bluemix 3 Employees access the Bluemix application seamlessly using their enterprise/intranet ID (SAML Federation using Enterprise Bridge) Employees HealthCare Application Single Sign On (SSO) on IBM Bluemix Partner Manage Access
  • 27. Social Access to Cloud Application 26 App Development Social Application Public CloudPrivate Cloud PaaS Agents / Partners/ Customers App Developers Single Sign On (SSO) on IBM Bluemix 1 Marketing team wants to develop a new Cloud Systems of Engagement App 2 Uses IBM SSO Service Offering on Bluemix for SSO 3 Customers can access the Bluemix app using their social IDs 4 IDs of Contractors / Agents hired for the Marketing Campaign managed on Cloud Directory Marketing Department Manage Access
  • 28. Cloud Application Security & Protection 27 App Development Internet Application Public CloudPrivate Cloud PaaS App Developers IBM AppScan Dynamic Analyzer on Bluemix 1 App Developer wants to ensure the application is secure and there are no vulnerabilities 2 App Developer uses IBM Appscan Dynamic Analysis Service on Bluemix 3 App Developer gets a report on the App vulnerabilities and threats and recommendations on how to fix them (JKE Subsidiary) Protect Data
  • 29. Securing Mobile Application 28 Mobile Application Public CloudPrivate Cloud PaaS App Developers IBM AppScan Mobile Analyzer on Bluemix 1 App Developer wants to ensure the mobile application is secure and has no vulnerabilities 2 App Developer uses IBM Appscan Mobile Analyzer Service on Bluemix 3 App Developer uploads the mobile application file (.apk) 4 App Developer gets a report on the Mobile App vulnerabilities, threats and recommendations Protect Data
  • 30. Database Service Security & Protection 29 Public CloudPrivate Cloud PaaS App Developers InfoSphere Guardium 1 JKE use managed dataware housing and analytics services from the cloud (DashDB) 1 App Developer wants to ensure the access to the data is monitored 2 JKE gets reports on sensitive data access on the cloud JK Enterprises (JKE) Protect Data
  • 31. Security Intelligence for Bluemix Apps 30 App Development Internet Application Public CloudPrivate Cloud PaaS JK Enterprises (JKE) JKE Security Administrator IBM Security QRadar SIEM 1 JKE Security Administrator wants visibility into their application on the cloud 2 JKE Security Administrator uses IBM Security QRadar SIEM 3 QRadar collects all the events related to the Bluemix Application 4 QRadar detects anomalies, security threats and generates reports for audit and compliance. Gain Visibility
  • 33. 32 Protect DataManage Access Gain Visibility Kerberos RSA AESTriple-DES X.509 Certificates SHA Hashing KMIP Key Management ISO 27018 Data Protection for Cloud Services PCI-DSS Controls for Card Data ISO 24760 ID Management Architecture ISO 17789 Cloud Computing Reference Architecture CSCC o Security for Cloud Computing: 10 Steps to Ensure Success Version 2.0 o Practical guide to Cloud SLAs o Practical Guide to Cloud Computing Version 2.0 o Cloud Security Standards: What to Expect & Negotiate ISO 29101 Privacy Architecture Framework ISO 27017 Information Security Controls for Cloud Services ISO 19794 Biometric Interchange Formats ISO 19086 Cloud SLAs CADF Cloud Audit Data Federation Cloud Security Standards* * Indicative list only Encryption
  • 34. Cloud Computing Reference Architecture (CCRA) - Providing Prescriptive Guidance to secure Client Cloud Adoption Patterns Capabilities provided to consumers for using a provider’s applications Integrated service management, automation, provisioning, self service Pre-built, pre-integrated IT infrastructures tuned to application-specific needs Advanced platform for creating, managing, and monetizing cloud services Cloud Enabled Data Center Cloud Platform Services Cloud Service Provider Business Solutions on Cloud Big Data / Analytics workload on cloud Social / Mobile workloads on Cloud Federal/Government Workloads on Cloud Big Data / Analytics Mobile G Cloud
  • 35. IBM Dynamic Cloud Security Portfolio  Cloud Security Intelligence NEW! Cloud Identity Services NEW!  Cloud Sign On Service NEW!  Cloud Access Manager NEW!  Cloud Privileged Identity Manager NEW!  Cloud Data Activity Monitoring NEW!  Cloud Mobile Application Analyzer NEW!  Cloud Web Application Analyzer NEW! Optimize Security Operations Deliver a consolidated view of your security operations – at unprecedented speed and agility Protect Data Identify vulnerabilities and help prevent attacks targeting sensitive data Gain Visibility Monitor the cloud for security breaches and compliance violations  Intelligent Threat Protection Cloud NEW!  Cloud Security Managed Services NEW!  Security Intelligence and Operations Consulting Services NEW! SaaSPaaSIaaS Manage Access Safeguard people, applications, and devices connecting to the cloud
  • 36. Learn more about IBM Security Visit our website IBM Security Website Watch our videos IBM Security YouTube Channel Read new blog posts SecurityIntelligence.com Follow us on Twitter @ibmsecurity IBM Security Intelligence. Integration. Expertise.
  • 37. Notices and Disclaimers Copyright © 2015 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM. U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM. Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT OR LOSS OF OPPORTUNITY. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided. Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation. It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law.
  • 38. Notices and Disclaimers (con’t) Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right. • IBM, the IBM logo, ibm.com, Bluemix, Blueworks Live, CICS, Clearcase, DOORS®, Enterprise Document Management System™, Global Business Services ®, Global Technology Services ®, Information on Demand, ILOG, Maximo®, MQIntegrator®, MQSeries®, Netcool®, OMEGAMON, OpenPower, PureAnalytics™, PureApplication®, pureCluster™, PureCoverage®, PureData®, PureExperience®, PureFlex®, pureQuery®, pureScale®, PureSystems®, QRadar®, Rational®, Rhapsody®, SoDA, SPSS, StoredIQ, Tivoli®, Trusteer®, urban{code}®, Watson, WebSphere®, Worklight®, X-Force® and System z® Z/OS, are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at: www.ibm.com/legal/copytrade.shtml.
  • 39. Thank You Your Feedback is Important! Access the InterConnect 2015 Conference CONNECT Attendee Portal to complete your session surveys from your smartphone, laptop or conference kiosk.