Securing the Cloud infrastructure with IBM Dynamic Cloud Security



Similar documents
Addressing Security for Hybrid Cloud

Security Intelligence

The Current State of Cyber Security

Safeguarding the cloud with IBM Dynamic Cloud Security

Security of Cloud Computing for the Power Grid

IBM QRadar Security Intelligence April 2013

and Security in the Era of Cloud

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

The webinar will begin shortly

How to Choose the Right Security Information and Event Management (SIEM) Solution

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

Strengthen security with intelligent identity and access management

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

IBM SECURITY QRADAR INCIDENT FORENSICS

Application Security from IBM Karl Snider, Market Segment Manager March 2012

Staying Ahead of the Cyber Security Game. Nigel Tan ASEAN Technical Leader IBM Security

IBM Security Intelligence Strategy

Under the Hood of the IBM Threat Protection System

Protecting against cyber threats and security breaches

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

IBM Security Privileged Identity Manager helps prevent insider threats

IBM Security QRadar Risk Manager

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Security strategies to stay off the Børsen front page

IBM Security QRadar Risk Manager

Data Security: Fight Insider Threats & Protect Your Sensitive Data

IBM Security QRadar Vulnerability Manager

Mobile Security. Luther Knight Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015.

How Safe are you in your Cloud?

Security Intelligence Solutions

What is Security Intelligence?

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Let s talk about assets in QRadar

Cloud Security. Vaughan Harper IBM Security Architect

Lunch and Learn: BlueMix to Mainframe making development accessible in the

Q1 Labs Corporate Overview

IBM Security IBM Corporation IBM Corporation

Powering Security and Easy Authentication in a Multi-Channel World

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

AMPLIFYING SECURITY INTELLIGENCE

Developing in the Cloud Environment. Rosalind Radcliffe IBM Distinguished Engineer, IBM Academy of Technology

Security for a Smarter Planet IBM Corporation All Rights Reserved.

Securing the mobile enterprise with IBM Security solutions

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

Breaking down silos of protection: An integrated approach to managing application security

Leverage security intelligence for retail organizations

Applying IBM Security solutions to the NIST Cybersecurity Framework

Introducing IBM s Advanced Threat Protection Platform

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

IBM Security X-Force Threat Intelligence

The Benefits of an Integrated Approach to Security in the Cloud

IBM Security Systems Support

IBM QRadar Security Intelligence Platform appliances

IBM Security Intrusion Prevention Solutions

Boosting enterprise security with integrated log management

L evoluzione del Security Operation Center tra Threat Detection e Incident Response & Management

Risk-based solutions for managing application security

IBM Advanced Threat Protection Solution

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

IBM Tivoli Federated Identity Manager

Analytics In the Cloud

SOLUTION BRIEF SEPTEMBER Healthcare Security Solutions: Protecting your Organization, Patients, and Information

Simplify security management in the cloud

Securing and protecting the organization s most sensitive data

IBM Security. Managed Security Services. SOC Poland / GSOC. Damian Staroscic Security Operations Center (SOC) Manager.

IBM Security re-defines enterprise endpoint protection against advanced malware

Tivoli Automation for Proactive Integrated Service Management

Payment Card Industry Data Security Standard

IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence

Authentication Strategy: Balancing Security and Convenience

IBM Security QRadar SIEM Product Overview

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

IBM Innovate AppScan: Introducin g Security, a first. Bobby Walters Consultant, ATSC bwalters@atsc.com Application Security & Compliance

Worldwide Security and Vulnerability Management Forecast and 2013 Vendor Shares

Practical Development with a Platform as a Service (PaaS) Beyond the Basics

Implementing Software- Defined Security with CloudPassage Halo

ALERT LOGIC FOR HIPAA COMPLIANCE

PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud

IBM & Security Gov. Point Of Views

Leveraging Privileged Identity Governance to Improve Security Posture

Cloud, Big Data, Mobile, Social and Security

IBM Security QRadar SIEM Version MR1. Vulnerability Assessment Configuration Guide

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

Easily deploy and move enterprise applications in the cloud

Transcription:

Securing the Cloud infrastructure with IBM Dynamic Cloud Security Ngo Duy Hiep Security Brand Manager Cell phone: +84 912216753 Email: hiepnd@vn.ibm.com 12015 IBM Corporation

Cloud is rapidly transforming the enterprise Data archive HR, CRM, SCM 100+ 100+ IBM IBM Offerings Offerings Online website IaaS Infrastructure services PaaS Development services SaaS Business applications App development Traditional Enterprise IT External Stakeholders Private Cloud Public Cloud 2

Cloud presents the opportunity to radically transform security practices Traditional Security Manual, static, and reactive Dynamic Cloud Security Standardized, automated, agile, and elastic Cloud security is not only achievable, it is an opportunity to drive the business, improve defenses and reduce risk 3

Clients focus on three imperatives for improving security How can I understand who is accessing the cloud from anywhere, at anytime? How can I fix vulnerabilities and defend against attacks before they re exploited? How can I obtain a comprehensive view of cloud and traditional environments? Govern the usage of cloud Protect workloads and data in the cloud Detect threats with visibility across clouds Going to the cloud gives me a single choke point for all user access it provides much more control. Cloud gives me security APIs and preconfigured policies to help protect my data and workloads I can take advantage of centralized cloud logging and auditing interfaces to hunt for attacks. 4

Introducing the world s most comprehensive portfolio of cloud security products and services IBM Dynamic Cloud Security IaaS PaaS SaaS Manage Access IBM Dynamic Cloud Security Protect Data Gain Visibility Optimize Security Operations 5

Help securely connect people, devices, and applications to the cloud Manage identity and access with speed NEW! Cloud Identity Services Easily onboard and manage users through IBM-hosted infrastructure and expertise Safeguard access to cloud-deployed apps NEW! Cloud Sign On Service (for Bluemix) Allow developers to quickly introduce single sign on to web and mobile apps via APIs with OpenID, OAuth 2.0 support NEW! Cloud Access Manager (for SoftLayer) Defend cloud applications with pattern-based protection, multi-factor authentication, and context-based access control Govern privileged user access NEW! Cloud Privileged Identity Manager (for SoftLayer) Audit privileged SoftLayer accounts and track app-to-app credentials Manage Access Protect Data Gain Visibility Optimize Security Operations 6

Identify vulnerabilities and help prevent attacks targeting sensitive data Protect enterprise data in cloud repositories Discover vulnerabilities before putting cloud and mobile apps into production NEW! Cloud Data Activity Monitoring (for SoftLayer and AWS) Monitor sensitive data access in cloud repositories Automatically discover, classify, and assess sensitive data in the cloud Create centralized auditing for data sources deployed on cloud virtual images NEW! Cloud Web and Mobile Application Analyzers (for Bluemix) Scan applications prior to putting them into production (Dynamic Analyzer) Scan mobile applications prior to release in app stores (Mobile Analyzer) Requires minimal developer training / preparation Manage Access Protect Data Gain Visibility Optimize Security Operations 7

Continuous monitoring for security breaches and compliance violations Dynamically analyze security posture of users, apps, networks, and other assets across the enterprise and in the cloud NEW! Cloud Security Intelligence (QRadar support for hybrid clouds and SoftLayer) Integration with multiple cloud services IBM SoftLayer Qualys Amazon CloudTrail CloudPassage Salesforce.com IBM Security Trusteer Apex Zscaler OpenStack Built-in encryption and compressed data transfers between clouds and on-premise data centers Installation on SoftLayer and/or Amazon Web Services for visibility to event and flow data across physical, virtual, and cloud infrastructures Manage Access Protect Data Gain Visibility Optimize Security Operations 8

Optimize security intelligence and operations for the cloud Deploy intelligence-driven security maturity across all environments IBM security experts to help keep your cloud secure and compliant Enhanced monitoring and correlation of hybrid cloud security events NEW! Security Intelligence and Operations Consulting Services Assess security practices, plan, design and build out world-class Security Operations Centers to extend security to the cloud NEW! Cloud Security Managed Services (for SoftLayer) Highly trained analysts in global Security Operations Centers manage security and provide emergency response services NEW! Intelligent Threat Protection Cloud Consolidated view using big data, visualization, and intelligent threat analysis with expert knowledge to respond to security incidents Manage Access Protect Data Gain Visibility Optimize Security Operations 9

IBM Dynamic Cloud Security: Agile, intelligent, and flexible Customer Need IBM Dynamic Cloud Security Built for Hybrid Cloud Consistent protection against threats whether they occur on-premise or in the cloud A portfolio to help customers leverage existing security investments and bridge a mix of traditional IT, private, public, and hybrid cloud models Integrated Security Intelligence End-to-end visibility and defense for users, data, and applications across multiple cloud infrastructures Integrated, enterprise-grade security with advanced analytics and controls throughout the cloud to help achieve a single-pane-of-glass Flexible Delivery Options Security that fits the business and each cloud initiative there is no one size fits all approach to cloud A portfolio aligned to specific cloud users with ease of use for lines of business, APIs for developers, and advanced features for security teams 10

IBM Dynamic Cloud Security Portfolio Manage Access Protect Data Gain Visibility Hosted MssP SaaS Cloud Identity Services Intelligent Threat Protection Cloud PaaS Cloud Sign On Service Cloud Web and Mobile Application Analyzers IaaS Cloud Access Manager Cloud Privileged Identity Manager Cloud Data Activity Monitoring Cloud Security Intelligence Security Intelligence and Operations Consulting Services Cloud Security Managed Services Optimize Security Operations 11 Managed Security Services Provider (MssP)

Learn more about IBM Security IBM Security Intelligence. Integration. Expertise. Visit our website IBM Security Website Watch our videos IBM Security YouTube Channel Read new blog posts SecurityIntelligence.com Follow us on Twitter @ibmsecurity 12

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY www.ibm.com/security 13 Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

IBM is uniquely positioned to offer Security for the Cloud 40 15 500 IBM Cloud IBM global data centers expanded from 25 Countries and 5 continents covered by IBM Cloud IBM developers working on cloud open source 40K + IBM Cloud experts with deep industry knowledge 80 % Of Fortune 100 companies use IBM Cloud capabilities 30K + IBM Cloud clients 300K + Trading communities connected to IBM s B2B cloud network 1B Passengers in 30 of the busiest + airports get to their destinations with the help of IBM Cloud 13 10 133 IBM Security Security segments with industry leading capabilities IBM Security Operations Centers (SOCs) IBM Security supported countries 6K + IBM Security professionals worldwide 10K + IBM Security customers worldwide 270M + Endpoints protected from the cloud 20B Customer security events monitored each day Industry leading security research team 14

IBM Dynamic Cloud Security Portfolio IaaS PaaS SaaS Manage Access Safeguard people, applications, and devices connecting to the cloud Protect Data Identify vulnerabilities and help prevent attacks targeting sensitive data Gain Visibility Monitor the cloud for security breaches and compliance violations Cloud Identity Services NEW! Cloud Sign On Service NEW! Cloud Access Manager NEW! Cloud Privileged Identity Manager NEW! Cloud Data Activity Monitoring NEW! Cloud Mobile Application Analyzer NEW! Cloud Web Application Analyzer NEW! Cloud Security Intelligence NEW! Optimize Security Operations Deliver a consolidated view of your security operations at unprecedented speed and agility Security Intelligence and Operations Consulting Services NEW! Cloud Security Managed Services NEW! Intelligent Threat Protection Cloud NEW! 15

Mapping of new capabilities to formal product names Manage Access New Capability Cloud Identity Services Cloud Sign On Service Cloud Access Manager Cloud Privileged Identity Manager Protect Data Cloud Data Activity Monitoring Cloud Mobile App Analyzer Service Cloud Web App Analyzer Service Gain Visibility Cloud Security Intelligence Optimize Security Operations Security Intelligence and Operations Consulting Services Cloud Security Managed Services Intelligent Threat Protection Cloud IBM Product / Service IBM Cloud Identity Services IBM Single Sign On IBM Security Access Manager IBM Security Privileged Identity Manager (v2.0) IBM InfoSphere Guardium Data Activity Monitoring IBM AppScan Mobile Analyzer IBM AppScan Dynamic Analyzer IBM QRadar Security Intelligence (v7.2.4) IBM Security Intelligence and Operations Consulting Services IBM Cloud Security Managed Services IBM Intelligent Threat Protection Cloud 16