Provably Secure Data Protection in the Cloud. ICDES (IBM Cloud Data Encryption Services)
|
|
- Clifford Jones
- 8 years ago
- Views:
Transcription
1 Provably Secure Data Protection in the Cloud ICDES (IBM Cloud Data Encryption Services)
2 Agenda Cloud Security and Intro to ICDES Manish Aggarwal, IBM, Offering Manager Cloud Client Case Study: Crohn s & Colitis Foundation of America Angela Dobes, CCFA, Program Director Use-cases for ICDES Russ Fulford, Security First, VP Cloud Solutions Q&A 1
3 Hacks & Data Breaches Keep Growing Over 2 million the number of records compromised in cyber attacks daily 1 More than 3.8 million USD the cost to recover from a cyber breach 2 49 the percentage of data breaches that occur due to criminal attacks the number of days before a breach is detected the number of cyber breaches that happen every week Data Breach Trends, Risk Based Security Open Security Foundation, February 2015; 2, Cost of Data Breach Study: Global Analysis, Ponemon Institute, May 2015; 4 M-Trends 2015: A View from the Front Lines, Mandiant 2015; Global Report on the Cost of Cyber Crime, Ponemon Institute, October
4 Data Security is Evolving & Requires Layers Traditional Model Newer Model Network and perimeter centric Add data centric security, access controls & security intelligence IBM is the un-disputed leader in Enterprise Security and invests in best of breed technologies 3
5 Advanced Cryptographic Splitting Technology If you can t get the data you can t hack it. DATA AES # # #! # # & # # # $ # # # #! # # # # #? # # IDA # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # AES Encryption Information Dispersal Algorithm File keys encrypted & split by Workgroup Key Cryptographically split shares and keys are sent to Storage Workgroup Key encrypted and split by Perfect Secret Sharing 4
6 ICDES Delivers Robust Data Protection Confidentiality Ground-breaking data-centric security FIPS certified AES-256 Encryption 1 FIPS certified Cryptographic splitting 1 FIPS certified built-in simplified key management 1 Privacy Zero knowledge environments AVAILABILITY InfoSec Triad for Data Protection 1 Federal Information Processing Standard (FIPS) 5
7 ICDES Delivers Robust Data Protection Confidentiality Integrity Tampered data is not used Built in data health check Repair corrupt shares while still encrypted Always get what you started with AVAILABILITY InfoSec Triad for Data Protection 6
8 ICDES Delivers Robust Data Protection Confidentiality Integrity Availability Data resiliency added at server edge Data is Always ON - no recovery time for share failure Simplified data availability architecture Never lose file encryption keys Supports a reduced-cost HA and DR architecture AVAILABILITY InfoSec Triad for Data Protection 7
9 ICDES Delivers Robust Data Protection Confidentiality Integrity Availability Easier management of regulatory requirements 1 HIPAA HITECH FISMA Sarbanes-Oxley PCI DSS FedRAMP AVAILABILITY InfoSec Triad for Data Protection 1 Health Insurance Portability and Accountability Act of 1996 (HIPAA); Health Information Technology for Economic and Clinical Health Act (HITECH); Federal Information Security Management Act of 2002 (FISMA); Payment Card Industry Data Security Standard (PCI DSS) 8
10 ICDES Makes Data Security Easy PURCHASE ICDES Advanced Secure DOWNLOAD CONFIGURE IBM Cloud Marketplace 2 of 4 Step 1 /share1 /share2 /share3 /share4 START PROTECTING DATA DATA PROTECTED DIRECTORY Step 2 Step 3 Share 1 Share 2 Share 3 Share 4 9
11 Lowering Total Cost of Ownership Current Environment Customer Data Center With ICDES Cost Saving Options External Bulk Keystore Secure Private, Hybrid and Public Cloud Key Manager Built-In High Availability & Disaster Recovery M of N BUILT Built-In IN 10
12 Flexible Implementation Methods OS Installation Secure Datastore Target Select Files & Directories ICDES Plug-in for vcenter ICDES for vcenter Management Server Manage Virtual Machines CentOS ICDES APP APP APP APP Target CentOS OS OS OS OS Secure Datastore Virtual Physical 11
13 Use ICDES In Any Environment IBM SoftLayer IBM Bluebox Private Clouds Hybrid Clouds Public Clouds Customer data centers Public Private Hybrid 12
14 ICDES Editions Beyond Standard Encryption Secure Users and Applications Compliance and Critical Business Data ICDES Server Data protection Keyed encryption Keyed splitting 1 of 1 Local Site
15 ICDES Editions Beyond Standard Encryption Secure Advanced Secure Users and Applications Compliance and Critical Business Data ICDES Server Data protection Keyed encryption Keyed splitting + Fault tolerance 4 of 4 Data 1 resiliency of 1 and authentication Local Site
16 ICDES Editions Beyond Standard Encryption Remote Site Secure Advanced Secure Advanced Multi-site Users and Applications Compliance and Critical Business Data ICDES Server Data protection Keyed encryption Keyed splitting + Disaster recovery Multi-site capability + Fault tolerance 4 of 4 Data 1 resiliency of 1 and authentication Local Site
17 Agenda Cloud Security and Intro to ICDES Client Case Study: Crohn s & Colitis Foundation of America Use-cases for ICDES Q&A 16
18 What are Inflammatory Bowel Diseases? Crohn s Disease is a chronic inflammatory condition of the gastrointestinal tract that can affect any part of the body from the mouth to the anus Ulcerative Colitis is a chronic inflammatory condition limited to the colon 1.6M # of Americans living with IBD 70K # of new cases of IBD diagnosed in the US each year The CCFA is a non-profit organization dedicated to finding cures for IBD. 17
19 Challenges in IBD Current therapy for IBD is inadequate and inconsistently delivered Pathway to improved outcomes New resources to drive discovery Increased collaboration and sharing of data Improved patient selection Improved quality of care 18
20 IBD Plexus Vision & Goals Build of a research and information exchange platform to accelerate research and transform the care of IBD patients Goals of IBD Plexus are Unite clinicians, patients, academia and industry Optimize use of data and biosamples across the research community Identify new drug targets Identify new biomarkers and diagnostics Improve the quality of care for patients with IBD 19
21 Approach IBD Plexus will link data across study cohorts Break silos, bringing together stakeholders Clinical Omics / Expression Biosample Patient Reported / Generated & 20
22 IBD Plexus Landscape Pediatric risk stratification study Adult prospective research study Internet-based patient-powered registry Quality of care program Real world evidence registry Study Programs Components Adult & Pediatric Registries Biobank & LIMS Centralized Analytical Lab Data & Analytic Platforms High Performance Computing Researcher Portal Study Programs Components 21
23 IBD Plexus Hosting / Security IBM SoftLayer has been selected to host the IBD Plexus solution DATA PLATFORM Protected Health Information (PHI) ANALYTIC PLATFORM De-identified data sets Limited data sets Bare metal with CCFA stack Dedicated virtualized CCFA environment IBM Cloud Data Encryption Services (ICDES) 22
24 Disease Activity Transforming Research Current State Severe Moderate Mild Remission Time Disease Activity Future State Severe Moderate Mild Remission Hypothesis Generation Basic Science Translational Research Clinical Trials Comp Effectiveness Quality Improvement Time 23
25 Agenda Cloud Security and Intro to ICDES Client Case Study CCFA Use-cases for ICDES Q&A 24
26 Cryptographic Splitting Core ENTERPRISE Ingest Digital Data Addressable Storage Users & Applications Integrate with your Access Controls ICDES Server Generate keys Encryption & Authorization Bit Randomization (IDA) Fault Tolerance (M of N) Key Wrapping Journal Cache Disperse Shares to Storage 2 of 4 Example 25
27 CCFA Securing Structured and Unstructured Data Research, Academic and Medical Communities Various Patient, Academic & Research Data Cache Object Storage Gateway Data Platform Application protected by ICDES Object Storage IBD Plexus Data Analytic Platform Application protected by ICDES 26
28 Use Case: Compliance or Highly Valuable Data Unstructured User Community Application Data Server Payment Card Data CARD Your Name Protected Directory ICDES Server Secure 1 of 1 Structured Storage 27
29 Use Case: Compliance or Highly Valuable Data User Community Application Data Server Payment Card Data With Resiliency for Highly Available Data CARD Your Name Protected Directory ICDES Server Advanced Secure 2 of 4 Unstructured Structured Share 1 Share 2 Share 3 Share 4 Storage 28
30 Use Case: Compliance or Highly Valuable Data User Community Application Data Server CARD Your Name Remote Location Standby Database Server Payment Card Data Protected Directory ICDES Server Standby ICDES Server Add Geographic Separation of Data for Disaster Recovery Advanced Multi-Site 2 of 6 Share 1 Share 2 Share 3 Share 4 Storage Share 5 Share 6 29
31 Use Case: IBM Cloud Analytics Secure Hadoop Data Stored Securely in Object Storage User Community Application Data Server Hadoop Cluster Massive Data to be Analyzed Storage Gateway ISHOC 2 of 2 HDFS Location 1 Location 2 Object Storage 30
32 Agenda Cloud Security and Intro to ICDES Client Case Study CCFA Use-cases for ICDES Q&A 31
33 Notices and Disclaimers Copyright 2016 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM. U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM. Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT OR LOSS OF OPPORTUNITY. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided. Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation. It is the customer s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law 32
34 Notices and Disclaimers Con t. Information concerning non-ibm products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-ibm products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. The provision of the information contained h erein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right. IBM, the IBM logo, ibm.com, Aspera, Bluemix, Blueworks Live, CICS, Clearcase, Cognos, DOORS, Emptoris, Enterprise Document Management System, FASP, FileNet, Global Business Services, Global Technology Services, IBM ExperienceOne, IBM SmartCloud, IBM Social Business, Information on Demand, ILOG, Maximo, MQIntegrator, MQSeries, Netcool, OMEGAMON, OpenPower, PureAnalytics, PureApplication, purecluster, PureCoverage, PureData, PureExperience, PureFlex, purequery, purescale, PureSystems, QRadar, Rational, Rhapsody, Smarter Commerce, SoDA, SPSS, Sterling Commerce, StoredIQ, Tealeaf, Tivoli, Trusteer, Unica, urban{code}, Watson, WebSphere, Worklight, X-Force and System z Z/OS, are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at: 33
35 Thank You Your Feedback is Important! Access the InterConnect 2016 Conference Attendee Portal to complete your session surveys from your smartphone, laptop or conference kiosk.
Requirements Change Management and Artifact Workflow. DOP-1027 DOORS Next Generation
Requirements Change Management and Artifact Workflow DOP-1027 DOORS Next Generation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without
More informationCryptographic Keys Life Cycle Management for your Company
Cryptographic Keys Life Cycle Management for your Company Session: SAD-6800 Torben Aaes-Jørgensen, Crypto Competency Center Agenda 1 Relevance of Encryption technologies 2 IBM Crypto Competency Center
More informationNo CRM, No FTP, No Problem?
No CRM, No FTP, No Problem? Everyone can build a customer journey. Chris Beaven Email Marketing Coordinator Towergate Insurance Direct 1 Mapping your ideal journey 2 TIP 1: Find out what your ideal customer
More informationADY-1727: IBM Watson Analytics and Cognos Business Intelligence for Line of Business Smart Data Discovery
ADY-1727: IBM Watson Analytics and Cognos Business Intelligence for Line of Business Smart Data Discovery Carm Janneteau, Product Manager, Watson Analytics Robert Hatfield, Development Manager, Watson
More informationIBM Watson IoT Platform Analytics Real-Time Insights. Wayne Riley
IBM Watson IoT Platform Analytics Real-Time Insights Wayne Riley What Does IoT Real-Time Insights Do? Performs analytics on IoT data as in arrives at the IBM Watson IoT Platform Analytics applied immediately
More informationTransformation Journey from Multiple Document Management Systems to IBM ECM Products DCP-2535
Transformation Journey from Multiple Document Management Systems to IBM ECM Products DCP-2535 Ryan Dennings Auto-Owners Insurance Company October 28, 2015 2015 IBM Corporation Overview Auto-Owners Insurance
More informationThe Weakest Link: Ethically Hacking the Connected Building. Paul Ionescu IBM X-Force Ethical Hacking Team
The Weakest Link: Ethically Hacking the Connected Building Paul Ionescu IBM X-Force Ethical Hacking Team Please Note: IBM s statements regarding its plans, directions, and intent are subject to change
More informationB2B Omni-channel Marketing with IBM Marketing Cloud MCL-1825
B2B Omni-channel Marketing with IBM Marketing Cloud MCL-1825 Dale Price, Sr. Offering Manager, IBM Nickolas Wyatt, Marketing Manager, SUPPLY.com B2B Marketing and Buying Trends B2B Customers Customers
More informationJOURNEY DESIGNER: Transforming how Marketing Plans Customer Experiences
JOURNEY DESIGNER: Transforming how Marketing Plans Customer Experiences 09/09/2015 #ibmamplify @elianetozman and @jbrett 2015 IBM Corporation PLEASE NOTE: IBM s statements regarding its plans, directions,
More informationMNB-5587 : imobile by ICICI Bank - The First Foray into Servicing Customers on Mobile by Any Bank in India
MNB-5587 : imobile by ICICI Bank - The First Foray into Servicing Customers on Mobile by Any Bank in India Abhijit Thosar, ICICI Bank Limited Nishant Kulkarni, IBM Introduction ICICI Bank is an is an Indian
More informationBBP-2665 IBM BPM Process Modeling Experience on the Web
BBP-2665 IBM BPM Process Modeling Experience on the Web Victor Chan STSM, IBM BPM Tools & User Interface Thu, 25-Feb 11:30 AM - 12:15 PM Mandalay Bay SOUTH - Reef Ballroom D Please Note: IBM s statements
More informationTaking the next hot mobile video game live with Docker and IBM SoftLayer. Scott Porter, Daniel Krook, Shaun Murakami
Taking the next hot mobile video game live with Docker and IBM SoftLayer Scott Porter, Daniel Krook, Shaun Murakami Agenda Mobile video gaming on the cloud The video gaming market in 2016 Typical mobile
More informationBring Your Own Client with IBM mail support for Microsoft Outlook Andy Yiu, Senior Product Manager Nathan Barry, Senior Software Engineer
Bring Your Own Client with IBM mail support for Microsoft Outlook Andy Yiu, Senior Product Manager Nathan Barry, Senior Software Engineer Please Note: IBM s statements regarding its plans, directions,
More informationYS4331 Leverage zos and Cloud Storage for Backup/Archive Efficiency and Cost Reductions. Eddie Lin IBM STSM, DS8000 Architecture edlin@us.ibm.
YS4331 Leverage zos and Cloud Storage for Backup/Archive Efficiency and Cost Reductions Eddie Lin IBM STSM, DS8000 Architecture edlin@us.ibm.com Please Note: IBM s statements regarding its plans, directions,
More informationHow IBM Bluemix and Watson Helps Zurich to Improve Communities' Flood Resilience
How IBM Bluemix and Watson Helps Zurich to Improve Communities' Flood Resilience MBM-5829 Thorsten Gau (@tgau) IBM Distinguished Engineer v04 Zurich Insurance is... helping customers understand and protect
More informationEnterprise Java Monitoring on z/os: Discover, Alert, Optimize. Chris Walker IBM
Enterprise Java Monitoring on z/os: Discover, Alert, Optimize Chris Walker IBM Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice
More informationDeliverability 101. #amplify15. 2015 International Business Machines Corporation
Deliverability 101 Jeff Dellapina Deliverability and Provisioning Manager Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at
More informationSoar into the API Economy by Moving Services and Metadata. from WSRR to IBM API Connect
Soar into the API Economy by Moving Services and Metadata from WSRR to IBM API Connect Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without
More informationHelp!! I need people with z skills!! Christy Schroeder, WW z Skills Client Leader Academic Initiative Interconnect Session 2679 February 24, 2016
Help!! I need people with z skills!! Christy Schroeder, WW z Skills Client Leader Academic Initiative Interconnect Session 2679 February 24, 2016 Notices and Disclaimers Copyright 2016 by International
More informationDeliverability 201. #amplify15. 2015 International Business Machines Corporation
Deliverability 201 Jeff Dellapina Deliverability and Provisioning Manager Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at
More informationYSS-1841 IBM Cloud Storage Options. Tony Pearson IBM Master Inventor and Senior Software Engineer
YSS-1841 IBM Cloud Storage Options Tony Pearson IBM Master Inventor and Senior Software Engineer Cloud Storage Taxonomy Ephemeral Storage Typically boot volumes, page files and temporary data Goes away
More informationKeynote: Cyber Intelligence and Cyber Security Overview
3/08/205 Keynote: Cyber and Cyber Security Overview David Waxman Executive Architect EIA Bob Stasio EIA for Cyber Security Product Manager Ralph Klaassen Senior Architect EIA 3/08/205 Important Disclaimer
More informationPlanning@Scale: Adopting IBM DevOps and the Scaled Agile Framework. Subtitle here
Ro Planning@Scale: Adopting IBM DevOps and the Scaled Agile Framework Subtitle here Please Note: Ro IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without
More informationCS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)
Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES) 1 A little background information on cipher
More informationJava and Other Languages
Java and Other Languages Chris Bailey: STSM, IBM Runtime Monitoring 2015 IBM Corporation A Quick Survey 2 Percentage of Audience What languages do you use? 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 Java
More informationIBM Integration Bus & Transformation Extender: One Platform for Internal & External Integration HBB-2467
IBM Integration Bus & Transformation Extender: One Platform for Internal & External Integration HBB-2467 Brian E Wilson IBM Cloud Middleware Connectivity & Integration Solution Architect Member of the
More informationCIOReview. Security First Corp Disruptive Innovation Re-Defining Data Security SDN SPECIAL. In My Opinion
SDN SPECIAL AUGUST-14-2015 CIOREVIEW.COM In My Opinion Andre Fuetsch, SVP, Architecture & Design, AT&T Security First Corp Disruptive Innovation Re-Defining Data Security Mark O Hare, Founder, President
More informationEasily deploy and move enterprise applications in the cloud
Easily deploy and move enterprise applications in the cloud IBM PureApplication solutions offer a simple way to implement a dynamic hybrid cloud environment 2 Easily deploy and move enterprise applications
More informationIBM FlashSystem Cloud Performance and Capability
IBM FlashSystem Cloud Performance and Capability Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information
More informationCommunications Server for Linux
Communications Server for Linux SNA connectivity ^business on demand software Multiple types of connectivity exist within the Communications Server for Linux. CSLinux_snaconn.ppt Page 1 of 10 SNA connectivity
More informationIBM Tivoli Service Request Manager 7.1
IBM Tivoli Service Request Manager 7.1 Using the e-mail listener and workflow to generate, query, update, and change the status of tickets Updated September 29, 2009 IBM Tivoli Service Request Manager
More informationEffective Storage Management for Cloud Computing
IBM Software April 2010 Effective Management for Cloud Computing April 2010 smarter storage management Page 1 Page 2 EFFECTIVE STORAGE MANAGEMENT FOR CLOUD COMPUTING Contents: Introduction 3 Cloud Configurations
More informationHIPAA/HITECH Compliance Using VMware vcloud Air
Last Updated: September 23, 2014 White paper Introduction This paper is intended for security, privacy, and compliance officers whose organizations must comply with the Privacy and Security Rules of the
More informationSpeeding Cloud Foundry with Open Source OpenPOWER Hardware
Speeding Cloud Foundry with Open Source OpenPOWER Hardware Indrajit Poddar, STSM Systems Technical Strategy, IBM Andrei Yurkevich, Chief Technology Officer, Altoros Please Note: IBM s statements regarding
More informationGetting Started with IBM Bluemix: Web Application Hosting Scenario on Java Liberty IBM Redbooks Solution Guide
Getting Started with IBM Bluemix: Web Application Hosting Scenario on Java Liberty IBM Redbooks Solution Guide Based on the open source Cloud Foundry technology, IBM Bluemix is an open-standard, cloud-based
More informationDataPower z/os crypto integration
New in version 3.8.0 DataPower z/os crypto integration Page 1 of 14 DataPower z/os crypto integration NSS performs requested key operation using certificates and keys stored in RACF RACF Administrator
More informationIBM Security QRadar Version 7.1.0 (MR1) Checking the Integrity of Event and Flow Logs Technical Note
IBM Security QRadar Version 7.1.0 (MR1) Checking the Integrity of Event and Flow Logs Technical Note Note: Before using this information and the product that it supports, read the information in Notices
More informationz/os V1R11 Communications Server system management and monitoring
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server system management and monitoring z/os Communications Server Development, Raleigh, North
More informationIBM Cognos Business Intelligence on Cloud
IBM Cognos Business Intelligence on Cloud Operate and succeed at a new business speed Highlights Take advantage of world-class reporting, analysis, dashboards and visualization capabilities offered as
More informationIBM Software Information Management Creating an Integrated, Optimized, and Secure Enterprise Data Platform:
Creating an Integrated, Optimized, and Secure Enterprise Data Platform: IBM PureData System for Transactions with SafeNet s ProtectDB and DataSecure Table of contents 1. Data, Data, Everywhere... 3 2.
More informationIBM Cognos Controller Version 10.2.1. New Features Guide
IBM Cognos Controller Version 10.2.1 New Features Guide Note Before using this information and the product it supports, read the information in Notices on page 3. Product Information This document applies
More informationEffective storage management and data protection for cloud computing
IBM Software Thought Leadership White Paper September 2010 Effective storage management and data protection for cloud computing Protecting data in private, public and hybrid environments 2 Effective storage
More informationBLACKICE ERA and PureData System for Analytics
BLACKICE ERA and PureData System for Analytics Address new and evolving regulations and best practices Highlights Utilize 120+ best practices reports in Cognos and Excel; prepackaged and complete with
More informationIBM Enterprise Marketing Management. Domain Name Options for Email
IBM Enterprise Marketing Management Domain Name Options for Email Note Before using this information and the product it supports, read the information in Notices on page 3. This document applies to all
More informationAddressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations
White Paper September 2009 Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations Page 2 Contents 2 Executive
More informationPremier. Helping healthcare providers deliver the best possible care to their patients. Smart is...
Premier Helping healthcare providers deliver the best possible care to their patients Smart is... Sharing and analyzing healthcare information to help physicians identify the best treatments for their
More informationIBM Cognos TM1 on Cloud Solution scalability with rapid time to value
IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.
More informationIBM Security QRadar Version 7.1.0 (MR1) Replacing the SSL Certificate Technical Note
IBM Security QRadar Version 7.1.0 (MR1) Technical Note Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 5 Copyright IBM Corp.
More informationCreating Applications in Bluemix using the Microservices Approach IBM Redbooks Solution Guide
Creating Applications in Bluemix using the Microservices Approach IBM Redbooks Solution Guide Across 2014 and into 2015, microservices became the new buzzword for application development style. So what
More informationAnalytics In the Cloud
Analytics In the Cloud 9 th September Presented by: Simon Porter Vice President MidMarket Sales Europe Disruptors are reinventing business processes and leading their industries with digital transformations
More informationIBM WebSphere Data Interchange V3.3
IBM Software Group IBM WebSphere Data Interchange V3.3 This presentation will present an overview of the WebSphere Data Interchange product. IBM Software Group Page 1 of 14 Agenda IBM Software Group Electronic
More informationTivoli Automation for Proactive Integrated Service Management
Tivoli Automation for Proactive Integrated Service Management Gain advantage with Tivoli Automation portfolio Optimizing the World s Infrastructure 24 October 2012, Moscow 2012 IBM Corporation Acknowledgements,
More informationIBM SmartCloud Analytics - Log Analysis. Anomaly App. Version 1.2
IBM SmartCloud Analytics - Log Analysis Anomaly App Version 1.2 IBM SmartCloud Analytics - Log Analysis Anomaly App Version 1.2 Note Before using this information and the product it supports, read the
More informationStrengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
More informationFor healthcare, change is in the air and in the cloud
IBM Software Healthcare Thought Leadership White Paper For healthcare, change is in the air and in the cloud Scalable and secure private cloud solutions can meet the challenges of healthcare transformation
More informationReduce your data storage footprint and tame the information explosion
IBM Software White paper December 2010 Reduce your data storage footprint and tame the information explosion 2 Reduce your data storage footprint and tame the information explosion Contents 2 Executive
More informationFocus on the business, not the business of data warehousing!
Focus on the business, not the business of data warehousing! Adam M. Ronthal Technical Product Marketing and Strategy Big Data, Cloud, and Appliances @ARonthal 1 Disclaimer Copyright IBM Corporation 2014.
More informationNew!! - Higher performance for Windows and UNIX environments
New!! - Higher performance for Windows and UNIX environments The IBM TotalStorage Network Attached Storage Gateway 300 (NAS Gateway 300) is designed to act as a gateway between a storage area network (SAN)
More informationIBM Cognos Controller Version 10.2.0. New Features Guide
IBM Cognos Controller Version 10.2.0 New Features Guide Note Before using this information and the product it supports, read the information in Notices on page 9. Product Information This document applies
More informationIBM BA Software Practice Accelerator Program Leveraging IBM s Technical Strength
IBM Business Analytics Software Brazil Business Partner Rally March 19, 2013 IBM BA Software Practice Accelerator Program Leveraging IBM s Technical Strength Mark Enslin IBM Business Partner Enablement
More informationC05 Discovery of Enterprise zsystems Assets for API Management
C05 Discovery of Enterprise zsystems Assets for API Management Unlocking mainframe assets for mobile and cloud applications Haley Fung hfung@us.ibm.com IMS Mobile and APIM Development Lead * IMS Technical
More informationTivoli Endpoint Manager for Configuration Management. User s Guide
Tivoli Endpoint Manager for Configuration Management User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation
More informationSecurity for a Smarter Planet. 2011 IBM Corporation All Rights Reserved.
Security for a Smarter Planet The Smarter Planet Our world is getting Instrumented Our world is getting Interconnected Our world is getting Intelligent Growing Security Challenges on the Smarter Planet
More informationBroadcloud improves competitive advantage with efficient, flexible and scalable disaster recovery services
CUSTOMER SUCCESS STORY Broadcloud improves competitive advantage with efficient, flexible and scalable disaster recovery services CLIENT PROFILE Industry: IT services Company: Broadcloud Staff: 40-plus BUSINESS
More informationPacket Capture Users Guide
IBM Security QRadar Version 7.2.2 Packet Capture Users Guide SC27-6512-00 Note Before using this information and the product that it supports, read the information in Notices on page 9. Copyright IBM Corporation
More informationWhite paper September 2009. Realizing business value with mainframe security management
White paper September 2009 Realizing business value with mainframe security management Page 2 Contents 2 Executive summary 2 Meeting today s security challenges 3 Addressing risks in the mainframe environment
More informationApplying IBM Security solutions to the NIST Cybersecurity Framework
IBM Software Thought Leadership White Paper August 2014 Applying IBM Security solutions to the NIST Cybersecurity Framework Help avoid gaps in security and compliance coverage as threats and business requirements
More informationIBM Enterprise Marketing Management. Domain Name Options for Email
IBM Enterprise Marketing Management Domain Name Options for Email Note Before using this information and the products that it supports, read the information in Notices on page 3. This document applies
More informationIBM Tivoli Netcool Configuration Manager
IBM Netcool Configuration Manager Improve organizational management and control of multivendor networks Highlights Automate time-consuming device configuration and change management tasks Effectively manage
More informationStay ahead of insiderthreats with predictive,intelligent security
Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz sarah.cucuz@spyders.ca IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent
More informationSafeguarding the cloud with IBM Dynamic Cloud Security
Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from
More informationIBM Software Group. SW5706 JVM Tools. 2007 IBM Corporation 4.0. This presentation will act as an introduction to JVM tools.
SW5706 JVM Tools This presentation will act as an introduction to. 4.0 Page 1 of 15 for tuning and problem detection After completing this topic, you should be able to: Describe the main tools used for
More informationDisaster Recovery Procedures for Microsoft SQL 2000 and 2005 using N series
Redpaper Alex Osuna Bert Jonker Richard Waal Henk Vonk Peter Beijer Disaster Recovery Procedures for Microsoft SQL 2000 and 2005 using N series Introduction This IBM Redpaper gives a example of procedures
More informationBig Data Analytics with IBM Cognos BI Dynamic Query IBM Redbooks Solution Guide
Big Data Analytics with IBM Cognos BI Dynamic Query IBM Redbooks Solution Guide IBM Cognos Business Intelligence (BI) helps you make better and smarter business decisions faster. Advanced visualization
More informationIBM Security QRadar Version 7.2.0. Installing QRadar with a Bootable USB Flash-drive Technical Note
IBM Security QRadar Version 7.2.0 Installing QRadar with a Bootable USB Flash-drive Technical Note Note: Before using this information and the product that it supports, read the information in Notices
More informationDatabase lifecycle management
Lotus Expeditor 6.1 Education IBM Lotus Expeditor 6.1 Client for Desktop This presentation explains the Database Lifecycle Management in IBM Lotus Expeditor 6.1 Client for Desktop. Page 1 of 12 Goals Understand
More information10 easy steps to secure your retail network
10 easy steps to secure your retail network Simple step-by-step IT solutions for small business in retail to leverage advanced protection technology in ways that are affordable, fast and easy October 2015
More informationGetting Started With IBM Cúram Universal Access Entry Edition
IBM Cúram Social Program Management Getting Started With IBM Cúram Universal Access Entry Edition Version 6.0.5 IBM Cúram Social Program Management Getting Started With IBM Cúram Universal Access Entry
More informationMicrosoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,
More informationDell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide
Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationEmpowering intelligent utility networks with visibility and control
IBM Software Energy and Utilities Thought Leadership White Paper Empowering intelligent utility networks with visibility and control IBM Intelligent Metering Network Management software solution 2 Empowering
More informationWebSphere Commerce V7.0
IBM Software Group WebSphere Commerce V7.0 Multi-channel precision marketing overview Updated December 3, 2009 This presentation introduces multi-channel precision marketing in WebSphere Commerce version
More informationIBM Financial Transaction Manager for ACH Services IBM Redbooks Solution Guide
IBM Financial Transaction Manager for ACH Services IBM Redbooks Solution Guide Automated Clearing House (ACH) payment volume is on the rise. NACHA, the electronic payments organization, estimates that
More informationPlatform LSF Version 9 Release 1.2. Migrating on Windows SC27-5317-02
Platform LSF Version 9 Release 1.2 Migrating on Windows SC27-5317-02 Platform LSF Version 9 Release 1.2 Migrating on Windows SC27-5317-02 Note Before using this information and the product it supports,
More informationHow To Choose A Business Continuity Solution
A Business Continuity Solution Selection Methodology Ellis Holman IBM Corp. Tuesday, March 13, 2012 Session Number 10387 Disclaimer Copyright IBM Corporation 2010. All rights reserved. U.S. Government
More informationCS z/os Network Security Configuration Assistant GUI
Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Network Security Configuration Assistant GUI 1 Security configuration agenda CS z/os configuration GUI overview Network
More informationThe Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
More informationIBM TRIRIGA Anywhere Version 10 Release 4. Installing a development environment
IBM TRIRIGA Anywhere Version 10 Release 4 Installing a development environment Note Before using this information and the product it supports, read the information in Notices on page 9. This edition applies
More informationInstalling on Windows
Platform LSF Version 9 Release 1.1 Installing on Windows SC27-5316-01 Platform LSF Version 9 Release 1.1 Installing on Windows SC27-5316-01 Note Before using this information and the product it supports,
More informationThe IBM Archive Cloud Project: Compliant Archiving into the Cloud
Christian Bolik, IBM Research & Development, November 2010 The IBM Archive Cloud Project: Compliant Archiving into the Cloud (...or in German: Revisionssichere Ablage in der Cloud) Disclaimer Copyright
More informationService Agreement: January 2008
International Consultants in Medicine Service Agreement: January 2008 Prior to enrolling in the service as a Member of any degree, you must agree to the following terms and conditions. You may accept these
More informationDeploying a private database cloud on z Systems
Deploying a private database cloud on z Systems How DPS evolved over time and what is coming next SAP on z IBM Systems Conference Holger Scheller - IBM April 13 th, 2016 Trademarks The following are trademarks
More informationBusiness Process Management IBM Business Process Manager V7.5
Business Process Management IBM Business Process Manager V7.5 Federated task management overview This presentation gives you an overview on the federated task management feature in IBM Business Process
More informationTivoli Security Compliance Manager. Version 5.1 April, 2006. Collector and Message Reference Addendum
Tivoli Security Compliance Manager Version 5.1 April, 2006 Collector and Message Reference Addendum Copyright International Business Machines Corporation 2006. All rights reserved. US Government Users
More informationCreating a Cloud Backup Service. Deon George
Creating a Cloud Backup Service Deon George Agenda TSM Cloud Service features Cloud Service Customer, providing a internal backup service Internal Backup Cloud Service Service Provider, providing a backup
More informationIBM Configuring Rational Insight 1.0.1.1 and later for Rational Asset Manager
IBM Configuring Rational Insight 1.0.1.1 and later for Rational Asset Manager Rational Insight and Rational Asset Manager...4 Prerequisites...5 Configuring the XML data configuration for Rational Asset
More informationand Security in the Era of Cloud
Re-imagine i Enterprise Mobility and Security in the Era of Cloud Brendan Hannigan General Manager, IBM Security Systems Leverage Cloud as a growth engine for business Exploit Mobile to build customer
More informationIBM Lotus Protector for Mail Encryption. User's Guide
IBM Lotus Protector for Mail Encryption User's Guide Version Information Lotus Protector for Mail Encryption User's Guide. Lotus Protector for Mail Encryption Version 2.1.0. Released December 2010. This
More informationIBM XIV Management Tools Version 4.7. Release Notes IBM
IBM XIV Management Tools Version 4.7 Release Notes IBM First Edition (September 2015) This edition applies to IBM XIV Management Tools version 4.7 release, and to all subsequent releases and modifications
More informationIBM Software Four steps to a proactive big data security and privacy strategy
Four steps to a proactive big data security and privacy strategy Elevate data security to the boardroom agenda Contents 2 Introduction You ve probably heard the saying Data is the new oil. Just as raw
More information