Security Intelligence Solutions



Similar documents
Q1 Labs Corporate Overview

Log management & SIEM: QRadar Security Intelligence Platform

Security strategies to stay off the Børsen front page

What is Security Intelligence?

IBM QRadar Security Intelligence April 2013

The webinar will begin shortly

Effectively Using Security Intelligence to Detect Threats and Exceed Compliance

IBM Security IBM Corporation IBM Corporation

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

IBM Security Intelligence Strategy

Tivoli Automation for Proactive Integrated Service Management

IBM SECURITY QRADAR INCIDENT FORENSICS

How to Choose the Right Security Information and Event Management (SIEM) Solution

IBM Security QRadar SIEM Product Overview

IBM Security QRadar Risk Manager

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

Strengthen security with intelligent identity and access management

IBM QRadar Security Intelligence Platform appliances

Boosting enterprise security with integrated log management

IBM Security QRadar Risk Manager

Managing and Securing the Mobile Device Invasion IBM Corporation

Security of Cloud Computing for the Power Grid

IBM Rational AppScan: enhancing Web application security and regulatory compliance.

Enterprise content management solutions Better decisions, faster. Storing, finding and managing content in the digital enterprise.

How To Buy Nitro Security

AMPLIFYING SECURITY INTELLIGENCE

IBM Tivoli Netcool network management solutions for enterprise

Breaking down silos of protection: An integrated approach to managing application security

IBM Security QRadar Vulnerability Manager

QRadar SIEM and FireEye MPS Integration

Security Intelligence

Introducing IBM s Advanced Threat Protection Platform

and Security in the Era of Cloud

Powering Security and Easy Authentication in a Multi-Channel World

IBM Tivoli Netcool Configuration Manager

Ten questions to ask when evaluating contract management solutions

Four keys to effectively monitor and control secure file transfer

IBM Sterling Order Management

Safeguarding the cloud with IBM Dynamic Cloud Security

Ecom Infotech. Page 1 of 6

IBM QRadar as a Service

QRadar SIEM and Zscaler Nanolog Streaming Service

Under the Hood of the IBM Threat Protection System

Optimizing government and insurance claims management with IBM Case Manager

How To Create An Insight Analysis For Cyber Security

IBM Security X-Force Threat Intelligence

Agile enterprise content management and the IBM Information Agenda.

IBM Advanced Threat Protection Solution

The Current State of Cyber Security

A proven 5-step framework for managing supplier performance

IBM Software Integrated Service Management: Visibility. Control. Automation.

FIVE PRACTICAL STEPS

IBM Tivoli Provisioning Manager V 7.1

Risk-based solutions for managing application security

Data Security: Fight Insider Threats & Protect Your Sensitive Data

Predictive and Prescriptive Analytics An Example: Advanced Sales & Operations Planning

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

QRadar SIEM 6.3 Datasheet

Rational Asset Manager 7.2 Editions and Licensing

Addressing Security for Hybrid Cloud

Empowering intelligent utility networks with visibility and control

Gain a competitive edge through optimized B2B file transfer

Improving sales effectiveness in the quote-to-cash process

Stay ahead of insiderthreats with predictive,intelligent security

IBM Security Intrusion Prevention Solutions

Enhance visibility into and control over software projects IBM Rational change and release management software

<Insert Picture Here> Oracle Identity And Access Management

IBM Unstructured Data Identification and Management

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

IBM Sterling Warehouse Management System

Five Ways to Use Security Intelligence to Pass Your HIPAA Audit

White paper December IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

Three significant risks of FTP use and how to overcome them

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Manage your IT Resources with IBM Capacity Management Analytics (CMA)

IBM Security QRadar QFlow Collector appliances for security intelligence

Realizing business flexibility through integrated SOA policy management.

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

IBM Global Business Services Microsoft Dynamics CRM solutions from IBM

Managing security risks and vulnerabilities

Extreme Networks Security Analytics G2 Vulnerability Manager

Protecting against cyber threats and security breaches

L evoluzione del Security Operation Center tra Threat Detection e Incident Response & Management

IBM RATIONAL PERFORMANCE TESTER

Simplify and Automate IT

Implement a unified approach to service quality management.

Contract management's effect on in house counsel

IBM ediscovery Identification and Collection

QRadar SIEM 7.2 Flows Overview

Effective Storage Management for Cloud Computing

Transcription:

Security Intelligence Solutions Know what is going on inside your enterprise with QRadar Joseph Skocich, WW Sales Integration Executive Q1 Labs, an IBM Company June 2012 jskocich@us.ibm.com

What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the IT security and risk posture of an enterprise Security Intelligence provides actionable and comprehensive insight for managing risks and threats from protection and detection through remediation 1

The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2012, 2011, 2010, 2009 Magic Quadrant Award-winning solutions: Family of next-generation Log Management, SIEM, Risk Management, Security Intelligence solutions Proven and growing rapidly: Thousands of customers worldwide Five-year average annual revenue growth of 70%+ Now part of IBM Security Systems: Unmatched security expertise and breadth of integrated capabilities 2

IT Security is a board room discussion Business results Brand image Supply chain Legal exposure Impact of hacktivism Audit risk Sony estimates potential $1B long term impact $171M / 100 customers* HSBC data breach discloses 24K private banking customers Epsilon breach impacts 100 national brands TJX estimates $150M class action settlement in release of credit / debit card info Lulzsec 50-day hack-at-will spree impacts Nintendo, CIA, PBS, UK NHS, UK SOCA, Sony Zurich Insurance PLc fined 2.275M ($3.8M) for the loss and exposure of 46K customer records *Sources for all breaches shown in speaker notes 3

Solving a security issue is a complex, four-dimensional puzzle People Employees Consultants Hackers Terrorists Outsourcers Customers Suppliers Data Structured Unstructured At rest In motion Applications Systems applications Web applications Web 2.0 Mobile apps Infrastructure It is no longer enough to protect the perimeter siloed point products will not secure the enterprise 4

Q1 Labs: Solving Customer Challenges with Total Security Intelligence Detecting threats others miss Arm Discovered yourself 500 with hosts total with security Here intelligence You Have virus, which all other security products missed Consolidating data silos Collect, 2 Billion archive logs and and events analyze per data day reduced in one integrated to 25 high solution priority offenses Detecting insider fraud Next Trusted generation insider stealing SIEM with and identity destroying correlation key data Predicting risks against your business Full Automating life cycle the of policy compliance monitoring and risk and management evaluation for network process and for config. security change infrastructures the infrastructure Exceeding regulation mandates Automated Real-time monitoring data collection of all and network configuration activity, in audits addition to PCI mandates 5

Solutions for the Full Compliance and Security Intelligence Timeline 6

QRadar: The Most Intelligent, Integrated, Automated Security Intelligence Platform 7

Intelligent: Context & Correlation Drive Deepest Insight 8

Integrated: Unified Platform for Scale & Ease of Use Bolted Together Solution QRadar Integrated Solution Scale problems Non-integrated reporting & searching No local decisions Multi-product administration Duplicate log repositories Operational bottlenecks Highly scalable Common reporting & searching Distributed correlation Unified administration Logs stored once Total visibility 9

Automated: No need for additional staff Auto-discovery of log sources, applications and assets Asset auto-grouping Centralized log mgmt Automated configuration audits Monitor Analyze Asset-based prioritization Auto-update of threats Auto-response Directed remediation Act Auto-tuning Auto-detect threats Thousands of pre-defined rules and role based reports Easy-to-use event filtering Advanced security analytics 10

Fully Integrated Security Intelligence Log Management Turnkey log management SME to Enterprise Upgradeable to enterprise SIEM SIEM Integrated log, threat, risk & compliance mgmt. Sophisticated event analytics Asset profiling and flow analytics Offense management and workflow Risk Management Predictive threat modeling & simulation Scalable configuration monitoring and audit Advanced threat visualization and impact analysis Network Activity & Anomaly Detection Network analytics Behavior and anomaly detection Fully integrated with SIEM Network and Application Visibility Layer 7 application monitoring Content capture Physical and virtual environments 11

Fully Integrated Security Intelligence Log Management Turnkey log management SME to Enterprise Upgradeable to enterprise SIEM One Console Security SIEM Integrated log, threat, risk & compliance mgmt. Sophisticated event analytics Asset profiling and flow analytics Offense management and workflow Risk Management Predictive threat modeling & simulation Scalable configuration monitoring and audit Advanced threat visualization and impact analysis Network Activity & Anomaly Detection Network analytics Behavior and anomaly detection Fully integrated with SIEM Network and Application Visibility Layer 7 application monitoring Content capture Physical and virtual environments Built on a Single Data Architecture 12

QRadar: The Most Intelligent, Integrated, Automated Security Intelligence Platform Proactive threat management Identifies most critical anomalies Rapid, complete impact analysis Eliminates silos Highly scalable Flexible, future-proof Easy deployment Rapid time to value Operational efficiency 13

Summary 1. Most intelligent, integrated and automated solution 2. Most sophisticated threat analytics and compliance automation 3. Rapid time to value, with low staffing requirements 4. Easily scales as deployments and security data grow 5. Established market leadership with excellent support 6. Easy to do business with, backed by best channel relationships 7. IBM s unmatched security expertise and breadth of integrated capabilities 14

What to do next? Read our blog: http://blog.q1labs.com/ Follow us on Twitter: @q1labs @ibmsecurity Watch our recent webcasts: http://q1labs.com/resource-center/media-center.aspx Download the 2012 Gartner SIEM Report http://q1labs.com/resource-center/analyst-reports/details.aspx?id=150 15

Thank You! Q1 Labs, an IBM Company jskocich@us.ibm.com

Acknowledgements, disclaimers and trademarks Copyright IBM Corporation 2012. All rights reserved. The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in this publication to IBM products, programs or services do not imply that they will be made available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth, savings or other results. All statements regarding IBM future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. Information concerning non-ibm products and services was obtained from a supplier of those products and services. IBM has not tested these products or services and cannot confirm the accuracy of performance, compatibility, or any other claims related to non-ibm products and services. Questions on the capabilities of non-ibm products and services should be addressed to the supplier of those products and services. All customer examples cited or described are presented as illustrations of the manner in which some customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer and will vary depending on individual customer configurations and conditions. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results. Prices are suggested U.S. list prices and are subject to change without notice. Starting price may not include a hard drive, operating system or other features. Contact your IBM representative or Business Partner for the most current pricing in your geography. IBM, the IBM logo, ibm.com, Tivoli, the Tivoli logo, Tivoli Enterprise Console, Tivoli Storage Manager FastBack, and other IBM products and services are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol ( or ), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at ibm.com/legal/copytrade.shtml 17