Breaking down silos of protection: An integrated approach to managing application security
|
|
- Fay Gilbert
- 5 years ago
- Views:
Transcription
1 IBM Software Thought Leadership White Paper October 2013 Breaking down silos of protection: An integrated approach to managing application security Protect your enterprise from the growing volume and velocity of threats with integrated IBM solutions
2 2 Breaking down silos of protection: An integrated approach to managing application security Contents 2 Introduction 2 Managing application security is critical for the enterprise 3 Understanding application deployments is essential for protecting key assets 4 A narrow view of application security is no longer enough 5 Risk-based management takes the broad security view 5 Full enterprise protection requires integrated solutions 6 IBM solutions provide application security intelligence 8 Conclusion 8 For more information Introduction An enterprise today runs hundreds, if not thousands, of applications, many of which harbor vulnerabilities that make them gateways for attack. Web applications, which provide a two-way path for employees to access the outside world and outsiders to access enterprise resources, now account for 31 percent of all security vulnerabilities. 1 More than half of those vulnerabilities involve cross-site scripting. The necessary response to this widespread threat is to move beyond using point products to protect merely the perimeter of enterprise computing and to put into place strong integrated solutions to protect valuable business assets. These solutions must do more than address vulnerability in a gap-by-gap and product-by-product basis. They must break down silos of protection with an integrated approach. Yet they must accommodate the fact that in most organizations it is impossible to protect 100 percent of applications. This white paper will discuss the challenges organizations face in protecting their applications from threats and remediating vulnerabilities. It will examine solutions for enabling risk-based application security management, from identifying and prioritizing applications based on their business impact to assessing applications for vulnerabilities, putting vulnerabilities in context to determine the risks they pose, and mitigating risk by fixing vulnerabilities or implementing virtual patches. The white paper will conclude with a look at how the organization can make application security risk management real by using the IBM portfolio of security solutions. It is an integrated and comprehensive portfolio designed to provide application discovery, automated vulnerability assessment, security intelligence for understanding the risk that vulnerabilities present, remediation guidance and capabilities for implementing layers of defense. Managing application security is critical for the enterprise For organizations that store sensitive or confidential information such as intellectual property or customer data on internal networks, that run externally facing websites accessed by thousands or even millions of people, or that face regulations requiring they maintain strict control over their infrastructure, application security is a must. A security breach can take the credit card numbers of your customers or erase the contents of your database. It can shut down a power grid or appropriate source code from a new product in development. It can be the result of an unintended error by an authorized user, a sophisticated attack by the growing number of organizations seeking to steal business and personal information, or malicious destruction by hacktivists seeking to make a point for political or other causes.
3 IBM Software 3 But the devastating results can be the same: loss of profitability, disruption of business operations, interruption of the supply chain, diminishment of brand image, and threat of legal action or regulatory censure. The importance of application security is clear. But the challenges are complex. And without the necessary infrastructure visibility and security solutions, the prospect of tackling them can be daunting. 10,000 9,000 8,000 7,000 6,000 5,000 4,000 3,000 2,000 1,000 0 Vulnerability disclosures growth by year prediction of (first half doubled) Source: IBM X-Force 2013 Mid-Year Trend and Risk Report Projected vulnerability disclosures in 2013 were expected to remain at the same high levels as in 2012 about 8, Understanding application deployments is essential for protecting key assets In many cases, IT does not have a sound understanding of either the number of applications the enterprise is running or the ways in which those applications fit into the computing environment. And for virtually any organization, this lack of visibility can be an impediment to security. Lack of visibility can be especially acute for organizations that have undergone a merger or an acquisition in which applications from multiple environments have been combined. In meeting the visibility challenge, questions arise naturally that reflect the range of issues the organization must address. Executives will want to know about policy and impact for example: What is the security risk? How do we ensure compliance? In order to mitigate security risk, the IT security team will need to know: What assets do we have? Which ones are most important? How secure are they? Which are the critical vulnerabilities? The development team will focus on tasks for example: What vulnerabilities do I need to address and how do I fix them? Undertaking an application inventory and assessment can both answer questions and lay the groundwork for putting security measures into place. But in many cases, inventory and assessment also reveal a size and a complexity that can make it impossible to protect the entire infrastructure certainly not right away, and perhaps never. And if it is not possible to achieve 100 percent application security, the next question becomes: How can the organization mitigate the security risk and what solutions can it put into place to achieve the required security?
4 4 Breaking down silos of protection: An integrated approach to managing application security Web application vulnerabilities by attack technique Cross-site scripting SQL injection Other File include Source: IBM X Force 2013 Mid-Year Trend and Risk Report In 2013, 31 percent of attacks targeted vulnerabilities in web applications. More than half of application vulnerabilities involved cross-site scripting. A narrow view of application security is no longer enough The point products and manual processes that many organizations use for gaining infrastructure insight and managing application vulnerabilities are not sufficient for today s security needs. Requirements for human intervention make them labor intensive, time consuming, expensive and, with the ever-present chance of human error, often unreliable. Point products can result in siloed data that typically remains unused across the larger IT environment because it does not provide the visibility and security intelligence the IT team needs to take effective actions. In place of point solutions, deploying integrated and automated solutions for application security can provide more streamlined, cost-effective and reliable outcomes. Leveraging integrated solutions can provide deep, cross-enterprise security intelligence that IT can use to identify and understand vulnerabilities within their context and priority, and then support the management of application security. Integration also makes possible a risk-based approach that tackles the impossibility of immediately protecting all applications. Security intelligence into areas such as data traffic, gathered by an integrated portfolio of security tools, for example, can be key to prioritizing applications and determining which ones should be addressed when and how. Integrated solutions for insight and analysis can give IT the depth and coverage needed to prioritize business needs and application use according to the risks they face. And integrated solutions for mitigation and remediation help ensure critical applications receive the necessary protection against risk or fixes to their vulnerabilities in order to maintain continuity and compliance. Number one, we have to confirm that we have a strong network and that our servers have the right set of security. Number two, we have to make certain that the applications serving our commercial and consumer entities don t have weaknesses or vulnerabilities. Finally, we believe that security intelligence will differentiate us and allow us to proactively address a threat before a problem occurs. Tony Spinelli, Chief Security Officer, Equifax
5 IBM Software 5 Risk-based management takes the broad security view An application that processes and stores personally identifiable customer information will be a high priority for any protection plan. A vulnerability in this kind of application can have serious consequences in diminished customer trust, lost business reputation, and fines or sanctions for noncompliance. But a risk-based approach to application vulnerability management provides a broad view that considers much more than risk to an individual application. The IT security team needs to gather and analyze data on a range of details in order to build the security intelligence necessary for prioritizing applications to be addressed, testing applications for vulnerabilities and mitigating the risk that each application faces. Each consideration contributes toward a proactive response to comprehensive security risk management. Solutions for application vulnerability management, for example, can provide insights that take into account not only the weaknesses that occur in individual applications, but also the context in which the application operates. An intrusion detection system might uncover the types of probes or attacks that have been aimed at the application during a defined period. But by integrating information such as the application s location in the network or any dependencies the application might have, the security team can determine whether an attack might create a domino effect that extends beyond the individual application. The team can use this information to support actions such as temporarily taking the application offline, erecting a firewall, patching or otherwise mitigating risk. Similarly, risk-based security management draws a distinction between new applications in development and existing applications in production. For new applications, it is important to ensure that security is built into the design early, as developers work through processes such as threat modeling, security reviews and quality assurance. For existing applications, it is important to assess and understand a broad variety of issues, beginning with the fact that deployed applications almost certainly come from different sources with some purchased from third-party vendors and others developed in-house. Age also can be an issue, as older applications may have been designed with fewer, different and less severe security issues in mind than those existing today. Legacy applications may, in fact, never have been tested to determine if vulnerabilities exist. A lot of companies keep security close to the InfoSec [information security] organization and they can t scale. For us, the question was: How can we put this skill into the DNA of the application development teams so that it wasn t just a challenge for the security team, it was an opportunity to improve software quality overall? Sujata Ramamoorthy, Director, Information Security, Cisco Full enterprise protection requires integrated solutions With multiple vulnerabilities the norm in large organizations, comprehensive, proactive capabilities are essential for risk-based application security. If certain areas are to be left exposed while repairs and protection are provided for the highest priority applications, the ability to protect against the full range of threats and vulnerabilities and to anticipate when and how a vulnerability might be exploited must be deployed across the full enterprise. Only integrated solutions can do this job. Only solutions that work together to put applications and their vulnerabilities into the context of enterprise infrastructure and provide a view of
6 6 Breaking down silos of protection: An integrated approach to managing application security application security from a level-of-risk perspective can live up to the overwhelming task of securing the large numbers of legacy and in-development applications in today s enterprise environments. Integrated solutions for application security risk management When it comes to security, an application cannot be viewed in isolation. In evaluating risk to an application, it is also necessary to consider vulnerabilities in the network, host and database. IT security teams have to understand the business purpose of applications and the potential impacts of a breach. Integrated solutions can pull data from a variety of extensive data sources including security devices, servers, network activity, configurations and user activities to create the deep security intelligence that is necessary. Solutions can work together to correlate logs, flows and locations; detect anomalies in user, database, application or network activity; and identify the credibility, severity and relevance of offenses delivering accurate and actionable insight on how to deal with suspected incidents. IBM Security Network Intrusion Prevention System Application discovery and context Risk-based vulnerability analysis Security policies and alerts IBM QRadar Security Intelligence Platform IBM Security AppScan IBM InfoSphere Guardium IBM solutions provide application security intelligence From discovering vulnerabilities in applications and threats in information flows to analyzing findings and providing repositories and dashboards for utilizing security intelligence, solutions from IBM Security deliver the integrated capabilities that riskbased application security requires. Network activity monitoring Web application protection Application vulnerability assessments Database vulnerability assessments Database activity monitoring The ability of IBM Security AppScan to integrate with IBM Security QRadar solutions, for example, combines capabilities for maintaining and updating information about each host system s services, applications, vulnerabilities, traffic/use level and Internet exposure, providing users with information on detected application vulnerabilities to calculate risk levels for each asset. Integrated IBM solutions enable IT security teams to identify application assets, assess their level of security, prioritize any vulnerabilities discovered and mitigate risks that the vulnerabilities present.
7 IBM Software 7 The holistic IBM approach correlates application vulnerability information with intrusion prevention data so that security teams can assess threats to vulnerable applications within the context of threats to the larger infrastructure. IBM Security AppScan supports organization-wide application security risk management with automated testing that includes scanning applications, identifying vulnerabilities and generating reports with recommendations for fixes. Utilizing a wide range of testing techniques including dynamic, static and interactive analysis Security AppScan enables deep analysis of applications in development and production. Security AppScan integrates with other IBM Security solutions to provide additional context and security intelligence for analyzing and prioritizing vulnerabilities and mitigating the risks they present. Security AppScan exports application vulnerability information into IBM Security SiteProtector System and QRadar solutions, where information can be correlated with real-time data collected by IBM Security Network Intrusion Prevention System as well as with other information such as the application s location in the network, firewall rules, user traffic, or host and database vulnerabilities. IBM Security Network Intrusion Prevention System combines detection and prevention capabilities to make vulnerabilities visible and stop threats before they impact the business. Security SiteProtector System provides centralized management of IBM intrusion prevention solutions, including the ability to define security policy and monitor detected events. Security Network Intrusion Prevention System is also capable of receiving vulnerability information from Security AppScan, which it can correlate with web application attack events to show if vulnerabilities are being actively exploited. In addition to providing protection for web application attacks such as SQL injection and cross-site scripting, Security Network Intrusion Prevention System can protect against other threats such as malware, denial-of-service attacks, data loss and targeted attacks related to advanced persistent threats. IBM InfoSphere Guardium monitors database activity with support for fine-grained auditing, automated compliance reporting, data-level access control, database vulnerability management and auto-discovery of sensitive data. Designed to prevent unauthorized or suspicious activities by privileged insiders and hackers alike, InfoSphere Guardium enables the organization to assess database vulnerabilities and configuration flaws, ensure that configurations are locked down after changes, and capture and examine transactions with secure, tamper-proof audit trails. IBM QRadar Security Intelligence Platform provides a unified architecture for integrating security information and event management data with log, flow, vulnerability, user and asset data for near real-time correlation and behavioral anomaly detection to help identify high-risk threats. Intelligence, integration and automation deliver 360-degree network insight into application and user activity, correlating known application vulnerabilities with other events and alerts, and enhancing proactive risk-management assessments by prioritizing critical application vulnerabilities. IBM Security QRadar Vulnerability Manager delivers a unified view of vulnerability information integrated with security intelligence data and context that it gathers using an embedded, scalable scanner. Integrated with Security AppScan, it can provide a complete network context to application vulnerabilities including correlation with attacks, exploitability from potential threats or untrusted sources, and user activities for an improved incident response based on complete visibility in a single system.
8 Conclusion Application security is a cornerstone of any enterprise security plan. But to keep up with application vulnerabilities and the growing complexity and velocity of threats, enterprises need to break through siloed solutions to integrate security architectures. IBM delivers intelligent, integrated, end-to-end application security solutions designed to help manage risk, demonstrate compliance and reduce costs. For more information To learn more about IBM solutions for application vulnerability management, please contact your IBM representative or IBM Business Partner, or visit: ibm.com/security Additionally, IBM Global Financing can help you acquire the software capabilities that your business needs in the most cost-effective and strategic way possible. We ll partner with credit-qualified clients to customize a financing solution to suit your business and development goals, enable effective cash management, and improve your total cost of ownership. Fund your critical IT investment and propel your business forward with IBM Global Financing. For more information, visit: ibm.com/financing Copyright IBM Corporation 2013 IBM Corporation Software Group Route 100 Somers, NY Produced in the United States of America October 2013 IBM, the IBM logo, ibm.com, AppScan, InfoSphere, Guardium, QRadar, and X-Force are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at Copyright and trademark information at ibm.com/legal/copytrade.shtml This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. THE INFORMATION IN THIS DOCUMENT IS PROVIDED AS IS WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that systems and products are immune from the malicious or illegal conduct of any party. 1 IBM X-Force, IBM X-Force 2013 Mid-Year Trend and Risk Report, IBM Corporation, Please Recycle WGW03035-USEN-01
Risk-based solutions for managing application security
IBM Software Thought Leadership White Paper September 2013 Risk-based solutions for managing application security Protect the enterprise from the growing volume and velocity of threats with integrated
IBM Security QRadar Vulnerability Manager
IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
IBM Security X-Force Threat Intelligence
IBM Security X-Force Threat Intelligence Use dynamic IBM X-Force data with IBM Security QRadar to detect the latest Internet threats Highlights Automatically feed IBM X-Force data into IBM QRadar Security
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Visualize current and potential network traffic patterns
IBM Security Intrusion Prevention Solutions
IBM Security Intrusion Prevention Solutions Sarah Cucuz sarah.cucuz@spyders.ca IBM Software Solution Brief IBM Security intrusion prevention solutions In-depth protection for networks, servers, endpoints
Safeguarding the cloud with IBM Dynamic Cloud Security
Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from
IBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
Applying IBM Security solutions to the NIST Cybersecurity Framework
IBM Software Thought Leadership White Paper August 2014 Applying IBM Security solutions to the NIST Cybersecurity Framework Help avoid gaps in security and compliance coverage as threats and business requirements
Leverage security intelligence for retail organizations
Leverage security intelligence for retail organizations Embrace mobile consumers, protect payment and personal data, deliver a secure shopping experience Highlights Reach the connected consumer without
Boosting enterprise security with integrated log management
IBM Software Thought Leadership White Paper May 2013 Boosting enterprise security with integrated log management Reduce security risks and improve compliance across diverse IT environments 2 Boosting enterprise
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing
Beyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
Reducing the cost and complexity of endpoint management
IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and
Safeguarding the cloud with IBM Security solutions
Safeguarding the cloud with IBM Security solutions Maintain visibility and control with proven solutions for public, private and hybrid clouds Highlights Address cloud concerns with enterprise-class solutions
IBM Security re-defines enterprise endpoint protection against advanced malware
IBM Security re-defines enterprise endpoint protection against advanced malware Break the cyber attack chain to stop advanced persistent threats and targeted attacks Highlights IBM Security Trusteer Apex
Mobile, Cloud, Advanced Threats: A Unified Approach to Security
Mobile, Cloud, Advanced Threats: A Unified Approach to Security David Druker, Ph.D. Senior Security Solution Architect IBM 1 Business Security for Business 2 Common Business Functions Manufacturing or
IBM Security Intelligence Strategy
IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational
Securing and protecting the organization s most sensitive data
Securing and protecting the organization s most sensitive data A comprehensive solution using IBM InfoSphere Guardium Data Activity Monitoring and InfoSphere Guardium Data Encryption to provide layered
IBM QRadar Security Intelligence Platform appliances
IBM QRadar Security Intelligence Platform Comprehensive, state-of-the-art solutions providing next-generation security intelligence Highlights Get integrated log management, security information and event
Stay ahead of insiderthreats with predictive,intelligent security
Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz sarah.cucuz@spyders.ca IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent
Managing security risks and vulnerabilities
IBM Software Thought Leadership White Paper January 2014 Managing security risks and vulnerabilities Protect your critical assets with an integrated, cost-effective approach to vulnerability assessments
IBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
Simplify security management in the cloud
Simplify security management in the cloud IBM Endpoint Manager and IBM SmartCloud offerings provide complete cloud protection Highlights Ensure security of new cloud services by employing scalable, optimized
Win the race against time to stay ahead of cybercriminals
IBM Software Win the race against time to stay ahead of cybercriminals Get to the root cause of attacks fast with IBM Security QRadar Incident Forensics Highlights Help reduce the time required to determine
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction
Selecting the right cybercrime-prevention solution
IBM Software Thought Leadership White Paper Selecting the right cybercrime-prevention solution Key considerations and best practices for achieving effective, sustainable cybercrime prevention Contents
Security Intelligence
IBM Security Security Intelligence Security for a New Era of Computing Erno Doorenspleet Consulting Security Executive 1 PARADIGM SHIFT in crime Sophistication is INCREASING Attacks are More Targeted Attackers
IBM Security Privileged Identity Manager helps prevent insider threats
IBM Security Privileged Identity Manager helps prevent insider threats Securely provision, manage, automate and track privileged access to critical enterprise resources Highlights Centrally manage privileged
Security strategies to stay off the Børsen front page
Security strategies to stay off the Børsen front page Steve Durkin, Channel Director for Europe, Q1 Labs, an IBM Company 1 2012 IBM Corporation Given the dynamic nature of the challenge, measuring the
8 Steps to Holistic Database Security
Information Management White Paper 8 Steps to Holistic Database Security By Ron Ben Natan, Ph.D., IBM Distinguished Engineer, CTO for Integrated Data Management 2 8 Steps to Holistic Database Security
The webinar will begin shortly
The webinar will begin shortly An Introduction to Security Intelligence Presented by IBM Security Chris Ross Senior Security Specialist, IBM Security Agenda The Security Landscape An Introduction to Security
IBM Security QRadar QFlow Collector appliances for security intelligence
IBM Software January 2013 IBM Security QRadar QFlow Collector appliances for security intelligence Advanced solutions for the analysis of network flow data 2 IBM Security QRadar QFlow Collector appliances
IBM Software Choosing the right virtualization security solution
IBM Software Choosing the right virtualization security solution Meet the unique security challenges of virtualized environments 2 Choosing the right virtualization security solution Having the right tool
How To Create An Insight Analysis For Cyber Security
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada
El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada The Traditional Approach is Changing. Security is no longer controlled and enforced through the
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
What is Security Intelligence?
2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the
IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems
IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems Proactively address regulatory compliance requirements and protect sensitive data in real time Highlights Monitor and audit data activity
How to Choose the Right Security Information and Event Management (SIEM) Solution
How to Choose the Right Security Information and Event Management (SIEM) Solution John Burnham Director, Strategic Communications and Analyst Relations IBM Security Chris Meenan Director, Security Intelligence
Strategies for assessing cloud security
IBM Global Technology Services Thought Leadership White Paper November 2010 Strategies for assessing cloud security 2 Securing the cloud: from strategy development to ongoing assessment Executive summary
Securing the mobile enterprise with IBM Security solutions
Securing the mobile enterprise with IBM Security solutions Gain visibility and control with proven security for mobile initiatives in the enterprise Highlights Address the full spectrum of mobile risks
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
Under the Hood of the IBM Threat Protection System
Under the Hood of the System The Nuts and Bolts of the Dynamic Attack Chain 1 Balazs Csendes IBM Security Intelligence Leader, CEE balazs.csendes@cz.ibm.com 1 You are an... IT Security Manager at a retailer
IBM Advanced Threat Protection Solution
IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain
Q1 Labs Corporate Overview
Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,
Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.
Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?
Effectively Using Security Intelligence to Detect Threats and Exceed Compliance
Effectively Using Security Intelligence to Detect Threats and Exceed Compliance Chris Poulin Security Strategist, IBM Reboot Conference 2012 1 Security Threats Affect the Business Business Brand image
IBM Rational AppScan: Application security and risk management
IBM Software Security November 2011 IBM Rational AppScan: Application security and risk management Identify, prioritize, track and remediate critical security vulnerabilities and compliance demands 2 IBM
Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities.
Managing business infrastructure White paper Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities. September 2008 2 Contents 2 Overview 5 Understanding
IBM Endpoint Manager for Server Automation
IBM Endpoint Manager for Server Automation Leverage advanced server automation capabilities with proven Endpoint Manager benefits Highlights Manage the lifecycle of all endpoints and their configurations
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
White paper September 2009. Realizing business value with mainframe security management
White paper September 2009 Realizing business value with mainframe security management Page 2 Contents 2 Executive summary 2 Meeting today s security challenges 3 Addressing risks in the mainframe environment
IBM Tivoli Netcool network management solutions for enterprise
IBM Netcool network management solutions for enterprise The big picture view that focuses on optimizing complex enterprise environments Highlights Enhance network functions in support of business goals
Five Steps to Achieve Risk-Based Application Security Management Make application security a strategically managed discipline
IBM Security Thought Leadership White Paper Five Steps to Achieve Risk-Based Application Security Management Make application security a strategically managed discipline July 2015 2 Five Steps to Achieve
Gaining the upper hand in today s cyber security battle
IBM Global Technology Services Managed Security Services Gaining the upper hand in today s cyber security battle How threat intelligence can help you stop attackers in their tracks 2 Gaining the upper
AMPLIFYING SECURITY INTELLIGENCE
AMPLIFYING SECURITY INTELLIGENCE WITH BIG DATA AND ADVANCED ANALYTICS Chris Meenan Senior Product Manager, Security Intelligence 1 IBM Security Systems Welcome to a Not So Friendly Cyber World Biggest
What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options
White paper What a Vulnerability Assessment Scanner Can t Tell You Leveraging Network Context to Prioritize Remediation Efforts and Identify Options november 2011 WHITE PAPER RedSeal Networks, Inc. 3965
IBM SECURITY QRADAR INCIDENT FORENSICS
IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
IBM Software Four steps to a proactive big data security and privacy strategy
Four steps to a proactive big data security and privacy strategy Elevate data security to the boardroom agenda Contents 2 Introduction You ve probably heard the saying Data is the new oil. Just as raw
and Security in the Era of Cloud
Re-imagine i Enterprise Mobility and Security in the Era of Cloud Brendan Hannigan General Manager, IBM Security Systems Leverage Cloud as a growth engine for business Exploit Mobile to build customer
The Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
Extending security intelligence with big data solutions
IBM Software Thought Leadership White Paper January 2013 Extending security intelligence with big data solutions Leverage big data technologies to uncover actionable insights into modern, advanced data
IBM Unstructured Data Identification and Management
IBM Unstructured Data Identification and Management Discover, recognize, and act on unstructured data in-place Highlights Identify data in place that is relevant for legal collections or regulatory retention.
HP Application Security Center
HP Application Security Center Web application security across the application lifecycle Solution brief HP Application Security Center helps security professionals, quality assurance (QA) specialists and
Securing the Cloud infrastructure with IBM Dynamic Cloud Security
Securing the Cloud infrastructure with IBM Dynamic Cloud Security Ngo Duy Hiep Security Brand Manager Cell phone: +84 912216753 Email: hiepnd@vn.ibm.com 12015 IBM Corporation Cloud is rapidly transforming
Reference Architecture: Enterprise Security For The Cloud
Reference Architecture: Enterprise Security For The Cloud A Rackspace Whitepaper Reference Architecture: Enterprise Security for the Cloud Cover Table of Contents 1. Introduction 2 2. Network and application
IBM Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
How To Protect Data From Attack On A Computer System
Information Management White Paper Understanding holistic database security 8 steps to successfully securing enterprise data sources 2 Understanding holistic database security News headlines about the
Protecting against cyber threats and security breaches
Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez abenaventem@es.ibm.com IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So
Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.
Security management solutions White paper IBM Tivoli and Consul: Facilitating security audit and March 2007 2 Contents 2 Overview 3 Identify today s challenges in security audit and compliance 3 Discover
Security Intelligence Solutions
Security Intelligence Solutions Know what is going on inside your enterprise with QRadar Joseph Skocich, WW Sales Integration Executive Q1 Labs, an IBM Company June 2012 jskocich@us.ibm.com What is Security
Attack Intelligence: Why It Matters
Attack Intelligence: Why It Matters WHITE PAPER Core Security +1 617.399-6980 info@coresecurity.com www.coresecurity.com A Proactive Strategy Attacks against your organization are more prevalent than ever,
Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives.
Security solutions To support your business objectives Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives. For an On Demand Business, security
Protect the data that drives our customers business. Data Security. Imperva s mission is simple:
The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet
IBM PowerSC Security and compliance solution designed to protect virtualized datacenters Highlights Simplify security management and compliance measurement Reduce administration costs of meeting compliance
Automated, centralized management for enterprise servers
IBM Software Thought Leadership White Paper February 2012 Automated, centralized management for enterprise servers Servers present unique management challenges but IBM Endpoint Manager is up to the job
Leveraging security from the cloud
IBM Global Technology Services Thought Leadership White Paper IBM Security Services Leveraging security from the cloud The who, what, when, why and how of cloud-based security services 2 Leveraging security
IBM Tivoli Netcool Configuration Manager
IBM Netcool Configuration Manager Improve organizational management and control of multivendor networks Highlights Automate time-consuming device configuration and change management tasks Effectively manage
Consolidated security management for mainframe clouds
Security Thought Leadership White Paper February 2012 Consolidated security management for mainframe clouds Leveraging the mainframe as a security hub for cloud-computing environments 2 Consolidated security
Data Security: Fight Insider Threats & Protect Your Sensitive Data
Data Security: Fight Insider Threats & Protect Your Sensitive Data Marco Ercolani Agenda Data is challenging to secure A look at security incidents Cost of a Data Breach Data Governance and Security Understand
IT executive guide to security intelligence
IBM Software Thought Leadership White Paper January 2013 IT executive guide to security intelligence Transitioning from log management and SIEM to comprehensive security intelligence 2 IT executive guide
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture
Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture 2 Data Security and Privacy Principles for IBM SaaS Contents 2 Introduction
10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
IBM SmartCloud Monitoring
IBM SmartCloud Monitoring Gain greater visibility and optimize virtual and cloud infrastructure Highlights Enhance visibility into cloud infrastructure performance Seamlessly drill down from holistic cloud
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
IBM Security Strategy
IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration