The webinar will begin shortly



Similar documents
IBM QRadar Security Intelligence April 2013

IBM Security Intelligence Strategy

Security strategies to stay off the Børsen front page

The Current State of Cyber Security

IBM Security IBM Corporation IBM Corporation

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

How to Choose the Right Security Information and Event Management (SIEM) Solution

Security Intelligence

IBM SECURITY QRADAR INCIDENT FORENSICS

Under the Hood of the IBM Threat Protection System

and Security in the Era of Cloud

Security Intelligence Solutions

Protecting against cyber threats and security breaches

Staying Ahead of the Cyber Security Game. Nigel Tan ASEAN Technical Leader IBM Security

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

Q1 Labs Corporate Overview

AMPLIFYING SECURITY INTELLIGENCE

IBM QRadar Security Intelligence Platform appliances

IBM Security QRadar SIEM Product Overview

What is Security Intelligence?

IBM Advanced Threat Protection Solution

IBM Security QRadar Risk Manager

IBM Security QRadar Risk Manager

Win the race against time to stay ahead of cybercriminals

IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence

QRadar SIEM and FireEye MPS Integration

Introducing IBM s Advanced Threat Protection Platform

IBM Security X-Force Threat Intelligence

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

Strengthen security with intelligent identity and access management

Effectively Using Security Intelligence to Detect Threats and Exceed Compliance

Cloud Security. Vaughan Harper IBM Security Architect

IBM Security QRadar QFlow Collector appliances for security intelligence

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Data Security: Fight Insider Threats & Protect Your Sensitive Data

IBM Security QRadar Vulnerability Manager

Log management & SIEM: QRadar Security Intelligence Platform

Safeguarding the cloud with IBM Dynamic Cloud Security

Leverage security intelligence for retail organizations

Boosting enterprise security with integrated log management

QRadar SIEM and Zscaler Nanolog Streaming Service

Let s talk about assets in QRadar

Addressing Security for Hybrid Cloud

IBM Security re-defines enterprise endpoint protection against advanced malware

Do not forget the basics!!!!!

Application Security from IBM Karl Snider, Market Segment Manager March 2012

Breaking down silos of protection: An integrated approach to managing application security

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

IBM Security QRadar Vulnerability Manager Version User Guide

Risk-based solutions for managing application security

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

The Value of QRadar QFlow and QRadar VFlow for Security Intelligence

IBM Security Intrusion Prevention Solutions

How To Buy Nitro Security

IBM Security Strategy

Extending security intelligence with big data solutions

Applying IBM Security solutions to the NIST Cybersecurity Framework

L evoluzione del Security Operation Center tra Threat Detection e Incident Response & Management

IBM Security. Managed Security Services. SOC Poland / GSOC. Damian Staroscic Security Operations Center (SOC) Manager.

How To Create An Insight Analysis For Cyber Security

IBM Security Systems Support

Mobile Security. Luther Knight Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015.

Managing security risks and vulnerabilities

Attack Intelligence: Why It Matters

IBM QRadar as a Service

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

Extreme Networks Security Analytics G2 Vulnerability Manager

Beyond passwords: Protect the mobile enterprise with smarter security solutions

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

QRadar Security Intelligence Platform Appliances

THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE

Selecting the right cybercrime-prevention solution

Reference Architecture: Enterprise Security For The Cloud

Integrating MSS, SEP and NGFW to catch targeted APTs

Detect & Investigate Threats. OVERVIEW

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

Vulnerability Management

Advanced Threat Protection with Dell SecureWorks Security Services

QRadar SIEM 7.2 Flows Overview

The Hillstone and Trend Micro Joint Solution

Unified Security, ATP and more

Reducing the cost and complexity of endpoint management

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Introduction to PCI DSS

Securing and protecting the organization s most sensitive data

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

SPEAR PHISHING AN ENTRY POINT FOR APTS

Transcription:

The webinar will begin shortly

An Introduction to Security Intelligence Presented by IBM Security Chris Ross Senior Security Specialist, IBM Security

Agenda The Security Landscape An Introduction to Security Intelligence The IBM Security Radar Security Intelligence Platform Summary Q&A

Questions? Step 1: Please ensure that the window is expanded by clicking the orange arrow Step 2: Expand the Questions tab and type your questions within the input box

Security Landscape

Security is now everyday news

What do these numbers mean? 1+ Billion - Data Records leaked in 2014 265 days - the average time in which companies detect an APT 6.5 Million Dollars - Average cost of a U.S Data Breach

What do these numbers mean? 2012 40% increase 2013 800,000,000+ records 2014 Unprecedented impact Attack types XSS Heartbleed Physical Brute Misconfig. Watering Phishing SQLi DDoS Malware Undisclosed Access Force Hole Source: IBM X-Force Threat Intelligence Quarterly 1Q 2015 256 days average time to detect APTs Source: 2015 Cost of Data Breach Study, Ponemon Institute $6.5M average cost of a U.S. data breach

The top security incidents to which the IBM ERS teams responded in 2015 involved fundamental breakdowns in sound security practices Onion-layered security incidents on the rise The year of ransomware Malicious insiders on the attack Greater management awareness of security problems

The most commonly encountered security incident by the ERS team in 2015 was ransomware. Impact Spear-phishing emails Drive-by infection Unpatched vulnerabilities Impact varies based on size and level of preparedness, and ranges from operational disruptions lasting days or weeks to a loss of key intellectual capital causing a business shutdown. Contributing Factors Figure 1. The IBM ERS team estimates that three primary vectors are the source of ransomware infections. Not backing up data Poor patching procedures Lack of user awareness Source: IBM X-Force (R) Research and Development

Focusing on network visibility and consistent procedures can help combat threats from these types of attacks.

Introduction to Security Intelligence

What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the IT security and risk posture of an enterprise Security Intelligence provides actionable and comprehensive insight for managing risks and threats from protection and detection through remediation

Security Intelligence LOGS 450+ sources ASSETS Database VULNERABILITIES QVM or 3 rd Party FLOWS Network Behavior X-FORCE Threat Intelligence QRADAR SIEM Correlation Engine Sees An Attack High Profile Asset Vulnerable To Attack Abnormal Behaviour Creates An OFFENCE ALERTS REAL TIME SECURITY REAL TIME OFFENCES HIGH PRIORITY SIEM REPORTS AUDITING COMPLIANCE NON URGENT

IBM X-Force Research and Development Expert analysis and data sharing on the global threat landscape Zero-day Research IP Reputation URL / Web Filtering Malware Analysis Web Application Control Vulnerability Protection Anti-Spam The IBM X-Force Mission Monitor and evaluate the rapidly changing threat landscape Research new attack techniques and develop protection for tomorrow s security challenges Educate our customers and the general public Integrate and distribute Threat Protection and Intelligence to make IBM solutions smarter

IBM Security QRadar Security Intelligence Platform

IBM QRadar Security Intelligence Platform Providing actionable intelligence

Expandable and scalable QRadar platform solutions Log Management Turn-key log management and reporting SME to Enterprise Upgradeable to enterprise SIEM SIEM Log, flow, vulnerability & identity correlation Sophisticated asset profiling Offense management and workflow Network and Application Visibility Layer 7 application monitoring Content capture for deep insight & forensics Physical and virtual environments Risk & Vulnerability Management Network security configuration monitoring Vulnerability scanning & prioritization Predictive threat modeling & simulation Scalability Event Processors for remote site High Availability & Disaster Recovery Data Node to increase storage & performance Network Forensics Incident Forensics Reconstructs network sessions from PCAPs Data pivoting and visualization tools Accelerated clarity around who, what, when

An integrated, unified architecture in a single web-based console Log Management Security Intelligence Network Activity Monitoring Risk Management Vulnerability Management Network Forensics

Answering questions to help prevent and remediate attacks

IBM QRadar supports hundreds of third-party products IBM QRadar Security Intelligence Platform

Consolidation and integration help reduce costs and increase visibility Traditional SIEM 6 products from 6 vendors are needed IBM Security Intelligence and Analytics Flows Packets Vulnerabilities Configurations IBM QRadar Security Intelligence Platform Logs Events An integrated, unified architecture in a single webbased console

Client example: An international energy company reduces billions of events per day to find those that should be investigated Optimize threat analysis An international energy firm analyzes 2 billion events per day to find 20-25 potential offenses to investigate Business challenge Reducing huge number of events to find the ones that need to be investigated Automating the process of analyzing security data IBM Security Solutions (QRadar SIEM, QFlow, Risk Manager) Combined analysis of historical data with real-time alerts to gain a big picture view and uncover patterns of unusual activity humans miss and immediately block suspected traffic

Gartner Magic Quadrant for SIEM 2015 Source: Gartner (July 2015)

Learn more about IBM Security Intelligence and Analytics Visit the IBM Security Intelligence Website Watch the videos on the IBM Security Intelligence YouTube Channel Read new blog posts SecurityIntelligence.com Follow us on Twitter @ibmsecurity

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. THANK YOU www.ibm.com/security Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Questions? Step 1: Please ensure that the window is expanded by clicking the orange arrow Step 2: Expand the Questions tab and type your questions within the input box

Get in touch: email@apsu.com