The Current State of Cyber Security Bob Kalka, Vice President, IBM Security
PARADIGM SHIFT in crime ORGANIZED COLLABORATIVE AUTOMATED 2
Cyber criminals use BUSINESS INTELLIGENCE 3
NOBODY IS IMMUNE 2012 40% increase 2013 800,000,000+ records 2014 Unprecedented impact Attack types XSS Heartbleed Physical Brute Misconfig. Watering Phishing SQLi DDoS Malware Undisclosed Access Force Hole Source: IBM X-Force Threat Intelligence Quarterly 1Q 2015
A NEW APPROACH TO SECURITY
1 Support the CISO agenda Innovate around 2 megatrends IBM Security Strategy Buyers CISO, CIO, and Line-of-Business Deliver a broad portfolio of solutions differentiated through their integration and innovation to address the latest trends Key Security Trends Advanced Threats Cloud Mobile and Internet of Things Compliance Mandates Skills Shortage Lead in selected 3 segments Advanced Fraud Protection Strategy, Risk and Compliance Identity and Access Management IBM Security Portfolio Security Intelligence and Operations Data Security Advanced Threat and Security Research Cybersecurity Assessment and Response Application Security Network, Mobile and Endpoint Protection
Four conversations driving information security Optimize the Security Program Stop Advanced Threats Protect Critical Assets Safeguard Cloud and Mobile
Optimize the security program Risk-Aware Culture & Strategy End-to-End Security Intelligence Assess and transform your security maturity Build a next generation security operations capability Intelligent Threat Protection and Response Get help from the experts
Stop advanced threats Prevent targeted attacks in real-time Detect threats with security intelligence Defend against web fraud and cybercrime
Protect critical assets Govern and administer users and their access Identify and protect your crown jewels Manage application security risk Manage and secure your network and endpoints
Safeguard cloud and mobile IaaS PaaS SaaS Protect Cloud Manage Access Protect Data Gain Visibility Protect Mobile Devices Applications Content Access Utilize cloud and mobile to reinvent security
Roll out 100,000 mobile devices in 6 weeks Protect Devices Secure Content and Collaboration Safeguard Applications and Data Manage Access and Fraud Extend Security Intelligence
Adopt the cloud but not the risk EMPLOYEES BYOD RISKY APPS ON PREM MOBILE APPROVED APPS DETECT Usage of cloud apps and actions CONNECT Users to approved cloud apps PROTECT Against cloud-related threats
Expand the value of security through integration Network Protection XGS SiteProtector Network QRadar Incident Forensics QRadar Risk Manager Endpoint BigFix Trusteer Apex zsecure Mobile MobileFirst Protect (MaaS360) MobileFirst Platform (Worklight) Trusteer Mobile AppScan Applications Security Intelligence QRadar SIEM QRadar Log Manager QRadar Vulnerability Manager Advanced Fraud Trusteer Pinpoint Trusteer Rapport Data Identity and Access Guardium Suite Key Lifecycle Manager Ecosystem Partners Consulting Services Managed Services Privileged Identity Manager Access Manager Identity Manager
Collaborate with 7,500+ security analysts xforce.ibmcloud.com IBM X-Force Exchange Participants across 16 industries, 5 of the world s top 10 banks, and 6 of the top 10 retailers 1 5
Learn more about IBM Security TOP 2 24 133 12K 22 enterprise security software vendor in total revenue industry analyst reports rank IBM Security as a LEADER countries where IBM delivers managed security services clients protected including of the top 29 banks in Japan, North America, and Europe Visit our website IBM Security Website Watch our videos on YouTube IBM Security Channel Read new blog posts SecurityIntelligence.com Follow us on Twitter @ibmsecurity
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. www.ibm.com/security Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of,or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of theinternational Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. 17