SlideShare a Scribd company logo
1 of 12
The Future of the Modern SOC
IBM Security QRadar XDR
Cybersecurity
is becoming
more challenging
2
Factors most responsible for making cybersecurity
management and operations more difficult
An increase in the number of remote workers accessing
the corporate network and / or applications
An increase in the threat landscape
An increase in the number of cloud applications
our organization uses
41%
38%
32%
of organizations say cybersecurity
has become more difficult over
the last two years
Source: ESG, The State of Zero-trust Security Strategies, April 2021
IBM Security / © IBM Corporation 2021
Cloud /
SaaS
Cloud /
SaaS
Cloud /
SaaS
Current Enterprise Architecture Complexity
Previous Enterprise Architectures
Evolving enterprise architectures is forcing enterprises
to rethink their security approach
Traditional Enterprise
Resources
Legacy Network
• Threat prevention
• Policy enforcement
• Monitoring and response
Remote Users / Endpoints
On-premises Users / Endpoints
VPN
Cloud /
SaaS
Traditional Enterprise
Resources
Legacy Network
• Threat prevention
• Policy enforcement
• Monitoring and response
On-premises Users / Endpoints
Cloud /
SaaS
Cloud /
SaaS
Cloud /
SaaS
Cloud /
SaaS
VPN
Hundreds / Thousands More Remote Users / Endpoints
Source: Scott Crawford, 451 Research, part of S&P Global Market Intelligence
Missed threats
Traditional approaches rely on
finding what’s known and can miss
new attacks
Costs and complexity
Many siloed tools and disjointed
workflows can increase costs
Legacy defenses and security teams face challenges
against advanced threats
IBM Security / © IBM Corporation 2021 4
Poor visibility
Digital transformation and
cloud adoption have expanded
monitoring needs, but there can be
blind spots
Struggle to keep up
Today’s threats are extremely complex
and automated, humans can have
difficulty evaluating many fast-moving
parts at once
How organizations can modernize threat
detection and response
IBM Security / © IBM Corporation 2021 5
Eliminate silos
Gain visibility across data
sources — from the cloud
to the core
Unify workflows
Work without pivoting
between tools
Automate work
Let machines do the heavy lifting
— whether mundane tasks or
complex analysis
Security analysts typical
workflow complexity
IBM Security / © IBM Corporation 2021 6
• Fewer, more accurate alerts
with an open scalable
approach
• Leverage existing tools and
avoid vendor lock in
• Streamlined workflow,
reduced manual effort
thanks to automation
• Pre-built detection and
response so teams can
protect your organization,
even without deep security
expertise
Incident
Triage and investigate incident
Respond
Perform root-cause analysis
Mitigation steps
Close incident
Choose highest priority
Review open incidents
Investigate in tool 2
Investigate in tool 3
Investigate in tool 4
Determine validity / severity
Determine response steps
Build / alter playbook
Respond in SOAR
Incident
Execute additional investigation
Add relevant response
Review automated workflow
1 click to execute response actions
Close incident
Open routed incident
Review root cause analysis
Simplified workflow
using QRadar XDR
BEFORE AFTER
Source: Forrester Report, Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR, April 2021
Future of the Modern SOC
IBM Security / © IBM Corporation 2021 7
ReaQta’s endpoint security solutions leverage AI to help
automatically identify and manage threats
The industry’s most open
threat detection, investigation,
and response solution
IBM Security QRadar XDR, an Open, Connected Approach
IBM Security / © IBM Corporation 2021 8
- Integration with Existing Tools or IBM’s
The industry’s largest Open XDR ecosystem can integrate your EDR,
SIEM, NDR, SOAR and Threat Intelligence, while leaving data where it
is for a complete XDR approach
- Single User Experience across Tools & Teams
Simple XDR workflows, co-designed with experts, help speed up alert
triage, threat hunting, investigation and response
- AI Built for Analyst Productivity
Automate the work of enriching, correlating, and investigating
threats with purpose-built AI and pre-built playbooks, including
automated root cause analysis and MITRE ATT&CK mapping
– Adaptable Architecture to Help Avoid Lock-In
Built on IBM Cloud Pak for Security for deployment on premises or on
cloud, and ready for use by security service providers
IBM Cloud Pak® for Security platform
and open integrations
NDR SOAR
EDR SIEM Threat
intel
Open source and standards
Connected XDR workflows
Hunt + Investigate + Triage + Response + Automate
IBM Security QRadar XDR
IBM Security QRadar XDR, an Open, Connected Approach
IBM Security / © IBM Corporation 2021 9
Open Integrations
Threat Intel
IBM Security
X-Force
Alien Vault
NDR SOAR
EDR SIEM
IBM Security
QRadar XDR Connect Connect your tools and automate your SOC using IBM and open third-party integrations
Open Source and Standards
IBM Security QRadar XDR
Many More
Open Integrations
Requires QRadar SIEM to integrate
with QRadar XDR Connect
More Threat Intelligence Integrations
More EDR
Integrations
IBM Security
QRadar SOAR
IBM Security
QRadar NDR
IBM Security
QRadar SIEM
Microsoft Azure
MySql
Elastic
Search
Azure Sentinel
Windows
Defender Vectra
Leverage your existing
security tools with an open
approach
Enable your teams to connect
a full range of tools, data and intel feeds to
modernize your SOC.
Act quickly with automated threat
investigations and accelerated threat
hunting
Use AI to automate case investigation and correlate data,
allowing more time for strategic imperatives. Improve
prioritization, root-cause analysis and response with MITRE
ATT&CK mapping and contextual intelligence.
Gain enhanced insights
while improving threat
detection
Correlate related alerts by connecting
additional telemetry and prioritize threats
to eliminate alert fatigue.
Connect your tools, automate your SOC, and free up time
for what matters most
IBM Security QRadar XDR Connect
IBM Security / © IBM Corporation 2021 10
Response recommendation planned for Q1 2022
Simplifying Threat Detection
and Response
for the Hybrid World
IBM Security / © IBM Corporation 2021 11
Next Steps
Watch the QRadar XDR
Watch now
Learn more about
QRadar XDR Suite
ibm.com/qradar
© Copyright IBM Corporation 2021. All rights reserved. The information contained in these materials is provided for informational
purposes only, and is provided AS IS without warranty, of any kind, express or implied. Any statement of direction represents IBM’s
current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM
products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or
both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection
and response to improper access from within and outside your enterprise. Improper access can result in information being altered,
destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.
No IT system or product should be considered completely secure and no single product, service or security measure can be
completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful,
comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems,
products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will
make your enterprise immune from, the malicious or illegal conduct of any party.
Follow us on:
ibm.com/security
securityintelligence.com
ibm.com/security/community
xforce.ibmcloud.com
@ibmsecurity
youtube.com/ibmsecurity
Thank you

More Related Content

Similar to QRadar-XDR-Solution.pdf

Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareCloudera, Inc.
 
IBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy SectorIBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy SectorFMA Summits
 
Cognitive security
Cognitive securityCognitive security
Cognitive securityIqra khalil
 
Ibm q radar_blind_references
Ibm q radar_blind_referencesIbm q radar_blind_references
Ibm q radar_blind_referencesMaarten Werff
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planetVincent Kwon
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formattedMatthew Moldvan
 
Cybersecurity leaders guide to xdr for business
Cybersecurity leaders guide to xdr for businessCybersecurity leaders guide to xdr for business
Cybersecurity leaders guide to xdr for businessfilin5
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itIBM Security
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016Francisco González Jiménez
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016IBM Security
 
Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service providerpaulharry03
 
Big Data - Amplifying Security Intelligence
Big Data - Amplifying Security IntelligenceBig Data - Amplifying Security Intelligence
Big Data - Amplifying Security IntelligenceIBM Danmark
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqriteseo
 
JavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for JavaJavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for JavaChris Bailey
 
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Kjetil Lund-Paulsen
 

Similar to QRadar-XDR-Solution.pdf (20)

IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
IBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy SectorIBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy Sector
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
Ibm q radar_blind_references
Ibm q radar_blind_referencesIbm q radar_blind_references
Ibm q radar_blind_references
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
SIEM vs EDR
SIEM vs EDRSIEM vs EDR
SIEM vs EDR
 
go secure cloud.pdf
go secure cloud.pdfgo secure cloud.pdf
go secure cloud.pdf
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
 
Cybersecurity leaders guide to xdr for business
Cybersecurity leaders guide to xdr for businessCybersecurity leaders guide to xdr for business
Cybersecurity leaders guide to xdr for business
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service provider
 
Big Data - Amplifying Security Intelligence
Big Data - Amplifying Security IntelligenceBig Data - Amplifying Security Intelligence
Big Data - Amplifying Security Intelligence
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
JavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for JavaJavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for Java
 
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security
 

Recently uploaded

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

QRadar-XDR-Solution.pdf

  • 1. The Future of the Modern SOC IBM Security QRadar XDR
  • 2. Cybersecurity is becoming more challenging 2 Factors most responsible for making cybersecurity management and operations more difficult An increase in the number of remote workers accessing the corporate network and / or applications An increase in the threat landscape An increase in the number of cloud applications our organization uses 41% 38% 32% of organizations say cybersecurity has become more difficult over the last two years Source: ESG, The State of Zero-trust Security Strategies, April 2021 IBM Security / © IBM Corporation 2021
  • 3. Cloud / SaaS Cloud / SaaS Cloud / SaaS Current Enterprise Architecture Complexity Previous Enterprise Architectures Evolving enterprise architectures is forcing enterprises to rethink their security approach Traditional Enterprise Resources Legacy Network • Threat prevention • Policy enforcement • Monitoring and response Remote Users / Endpoints On-premises Users / Endpoints VPN Cloud / SaaS Traditional Enterprise Resources Legacy Network • Threat prevention • Policy enforcement • Monitoring and response On-premises Users / Endpoints Cloud / SaaS Cloud / SaaS Cloud / SaaS Cloud / SaaS VPN Hundreds / Thousands More Remote Users / Endpoints Source: Scott Crawford, 451 Research, part of S&P Global Market Intelligence
  • 4. Missed threats Traditional approaches rely on finding what’s known and can miss new attacks Costs and complexity Many siloed tools and disjointed workflows can increase costs Legacy defenses and security teams face challenges against advanced threats IBM Security / © IBM Corporation 2021 4 Poor visibility Digital transformation and cloud adoption have expanded monitoring needs, but there can be blind spots Struggle to keep up Today’s threats are extremely complex and automated, humans can have difficulty evaluating many fast-moving parts at once
  • 5. How organizations can modernize threat detection and response IBM Security / © IBM Corporation 2021 5 Eliminate silos Gain visibility across data sources — from the cloud to the core Unify workflows Work without pivoting between tools Automate work Let machines do the heavy lifting — whether mundane tasks or complex analysis
  • 6. Security analysts typical workflow complexity IBM Security / © IBM Corporation 2021 6 • Fewer, more accurate alerts with an open scalable approach • Leverage existing tools and avoid vendor lock in • Streamlined workflow, reduced manual effort thanks to automation • Pre-built detection and response so teams can protect your organization, even without deep security expertise Incident Triage and investigate incident Respond Perform root-cause analysis Mitigation steps Close incident Choose highest priority Review open incidents Investigate in tool 2 Investigate in tool 3 Investigate in tool 4 Determine validity / severity Determine response steps Build / alter playbook Respond in SOAR Incident Execute additional investigation Add relevant response Review automated workflow 1 click to execute response actions Close incident Open routed incident Review root cause analysis Simplified workflow using QRadar XDR BEFORE AFTER Source: Forrester Report, Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR, April 2021
  • 7. Future of the Modern SOC IBM Security / © IBM Corporation 2021 7 ReaQta’s endpoint security solutions leverage AI to help automatically identify and manage threats The industry’s most open threat detection, investigation, and response solution
  • 8. IBM Security QRadar XDR, an Open, Connected Approach IBM Security / © IBM Corporation 2021 8 - Integration with Existing Tools or IBM’s The industry’s largest Open XDR ecosystem can integrate your EDR, SIEM, NDR, SOAR and Threat Intelligence, while leaving data where it is for a complete XDR approach - Single User Experience across Tools & Teams Simple XDR workflows, co-designed with experts, help speed up alert triage, threat hunting, investigation and response - AI Built for Analyst Productivity Automate the work of enriching, correlating, and investigating threats with purpose-built AI and pre-built playbooks, including automated root cause analysis and MITRE ATT&CK mapping – Adaptable Architecture to Help Avoid Lock-In Built on IBM Cloud Pak for Security for deployment on premises or on cloud, and ready for use by security service providers IBM Cloud Pak® for Security platform and open integrations NDR SOAR EDR SIEM Threat intel Open source and standards Connected XDR workflows Hunt + Investigate + Triage + Response + Automate IBM Security QRadar XDR
  • 9. IBM Security QRadar XDR, an Open, Connected Approach IBM Security / © IBM Corporation 2021 9 Open Integrations Threat Intel IBM Security X-Force Alien Vault NDR SOAR EDR SIEM IBM Security QRadar XDR Connect Connect your tools and automate your SOC using IBM and open third-party integrations Open Source and Standards IBM Security QRadar XDR Many More Open Integrations Requires QRadar SIEM to integrate with QRadar XDR Connect More Threat Intelligence Integrations More EDR Integrations IBM Security QRadar SOAR IBM Security QRadar NDR IBM Security QRadar SIEM Microsoft Azure MySql Elastic Search Azure Sentinel Windows Defender Vectra
  • 10. Leverage your existing security tools with an open approach Enable your teams to connect a full range of tools, data and intel feeds to modernize your SOC. Act quickly with automated threat investigations and accelerated threat hunting Use AI to automate case investigation and correlate data, allowing more time for strategic imperatives. Improve prioritization, root-cause analysis and response with MITRE ATT&CK mapping and contextual intelligence. Gain enhanced insights while improving threat detection Correlate related alerts by connecting additional telemetry and prioritize threats to eliminate alert fatigue. Connect your tools, automate your SOC, and free up time for what matters most IBM Security QRadar XDR Connect IBM Security / © IBM Corporation 2021 10 Response recommendation planned for Q1 2022
  • 11. Simplifying Threat Detection and Response for the Hybrid World IBM Security / © IBM Corporation 2021 11 Next Steps Watch the QRadar XDR Watch now Learn more about QRadar XDR Suite ibm.com/qradar
  • 12. © Copyright IBM Corporation 2021. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty, of any kind, express or implied. Any statement of direction represents IBM’s current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. Follow us on: ibm.com/security securityintelligence.com ibm.com/security/community xforce.ibmcloud.com @ibmsecurity youtube.com/ibmsecurity Thank you