IBM ISS Optimizacija Sigurnosti



Similar documents
Managed Security Services Portfolio

Payment Card Industry Data Security Standard

Selecting a Managed Security Services Provider: The 10 most important criteria to consider

IBM Internet Security Systems products and services

IBM Global Technology Services Preemptive security products and services

Managed Security Services for Data

Security Event and Log Management Service:

The Evolution of Managed Security Services ISS Virtual-SOC Solution, Security the Way You Need It

Preemptive security solutions for healthcare

Q1 Labs Corporate Overview

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Current IBAT Endorsed Services

What is Security Intelligence?

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems

Caretower s SIEM Managed Security Services

Injazat s Managed Services Portfolio

IBM Global Technology Services Preemptive Security Products and Services

Company Overview. Enterprise Cloud Solutions

Leveraging security from the cloud

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

How To Protect Your Network From Attack From A Network Security Threat

Security Event and Log Management Service:

Vulnerability Management

2012 North American Managed Security Service Providers Growth Leadership Award

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

NEC Managed Security Services

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

PREEMPTIVE SECURITY IS HERE INTERNET SECURITY THAT stops THREATS BEFORE impact Security Product Family Ahead of the threat.

Clavister InSight TM. Protecting Values

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Unified Threat Management, Managed Security, and the Cloud Services Model

Managed Services. Business Intelligence Solutions

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

IBM Internet Security Systems

Cisco Remote Management Services for Security

HP and netforensics Security Information Management solutions. Business blueprint

Boosting enterprise security with integrated log management

Cisco Cloud Web Security

Cisco Security IntelliShield Alert Manager Service

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

IBM Security QRadar Vulnerability Manager

Requirements When Considering a Next- Generation Firewall

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Managed Service Plans

MANAGED SERVICES PROVIDER. Dynamic Solutions. Superior Results.

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

IBM Security IBM Corporation IBM Corporation

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK

CLOUD GUARD UNIFIED ENTERPRISE

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Security management solutions White paper. Extend business reach with a robust security infrastructure.

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

Application Security Center overview

Remote Management Services Portfolio Overview

Avoiding the Top 5 Vulnerability Management Mistakes

IT Security & Compliance. On Time. On Budget. On Demand.

Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations

Cisco Security Optimization Service

IBM Australia. Integrated Network Security with IBM Global Technology Services

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview

Managed Security Monitoring Quick Guide 5/26/ EarthLink. Trademarks are property of their respective owners. All rights reserved.

Best Practices for Building a Security Operations Center

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Information & Asset Protection with SIEM and DLP

INFRASTRUCTURE SOLUTIONS OVERVIEW

Extreme Networks Security Analytics G2 Vulnerability Manager

Cisco Remote Management Services for Financial Services

IBM Security Intelligence Strategy

Security Controls What Works. Southside Virginia Community College: Security Awareness

IBM Global Small and Medium Business. Keep Your IT Infrastructure and Assets Secure

HP Application Security Center

Enterprise-Grade Security from the Cloud

PDQ Tek. PDQpos.com. 760 Veterans Circle; Warminster, PA

QRadar SIEM 6.3 Datasheet

How To Manage Security On A Networked Computer System

Hosted SharePoint: Questions every provider should answer

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

Brocade Network Monitoring Service (NMS) Helps Maximize Network Uptime and Efficiency

The Benefits of an Integrated Approach to Security in the Cloud

ALERT LOGIC FOR HIPAA COMPLIANCE

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

End-to-End Application Security from the Cloud

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

Security Services. A Solution for Providing BPM of Security Services within the Enterprise Environment.

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

End-to-End Infrastructure Solutions

IBM Security Intrusion Prevention Solutions

Endpoint Security More secure. Less complex. Less costs... More control.

Readiness Assessments: Vital to Secure Mobility

SANS Top 20 Critical Controls for Effective Cyber Defense

CALNET 3 Category 7 Network Based Management Security. Table of Contents

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Protecting against cyber threats and security breaches

Symantec Consulting Services

Transcription:

IBM ISS Optimizacija Sigurnosti Slaven Novak IBM ISS Technical Sales Specialist slaven.novak@hr.ibm.com 1

The Business Challenge: New Methods and Motives: Adding to the complexity and sheer number of risks Compliance Spending: Investing in more point products to solve more point problems IT Innovation: Requiring new ways to secure the new ways we collaborate The Global Economy: Driving new security support requirements Flexibility in Business Methods: To improve operations and serve customers Complexity remains the biggest security challenge!* Integration is key to managing the cost and complexity of the evolving landscape *InformationWeek 2008 Security Survey 2

The Economy is Still Strong for Hackers! Web Application Vulnerabilities on the Rise Percentage of Web Application Vulnerabilities with Available Patches In Q4 2008, IBM MSS witnessed millions of SQL Injection attacks across the world Hackers targeting web applications to steal data and redirect legitimate websites to malicious sites 90% of vulnerabilities disclosed in 2008 are remotely exploitable (i.e. hack-able) Hackers employing highly complex and malicious techniques to steal your data Source: 2008 IBM ISS X-Force Annual Report 3

Security Breaches Have a Cost The Facts: Companies that experienced a data breach in 2008 paid an average of $6.6 million to rebuild their brand and retain clients The average number of records exposed in each breach was approx. 33,000 The estimate cost spent on each consumer record was $202.00 84% of the organizations surveyed had at least one data breach or loss prior to 2008 The 2008 Survey found that churn i.e. clients who leave one brand for another, continues to increase and is highest in Financial and Healthcare sectors. The average cost of a data breach is escalating: Cost in 2008: 6.6 Million Cost in 2007: 6.3 Million Cost in 2006 : 4.7 Million * Some of the news out of this survey is that churn is really happening. People really do care when organizations screw up and lose their data * Dr. Larry Poneman of the Poneman Institute as reported by The Washington Post February 3, 2009 4

The IT Security Challenge: Manage Cost, Decrease Complexity, Improve Effectiveness, Assure Agility Cost of the average security and compliance program PRESSURE Complexity of the control environment Effectiveness of controls in addressing security risk Effect of security on operating Agility TIME 5

Security Solutions Must Address Key Business Challenges REDUCE COSTS MITIGATE RISKS Provide immediate savings and lower total cost of ownership Ensure business continuity INCREASE PRODUCTIVITY Enable innovation Complexity remains the biggest security challenge!* Integration is key to managing the cost and complexity of the evolving landscape *InformationWeek 2008 Security Survey 6

IBM MSS Value Proposition Guaranteed Protection Industry s leading performance-based service level agreement (SLA) with a cash-back payment enhances overall security posture Provides protection from known and unknown threats Lowers Total Cost of Ownership Reduced complexity Integrated services reduces security exposures Virtual-Security Operation Center: expert systems, management portal and global SOC infrastructure provides centralized management for multi-vendor environments and a comprehensive view of overall security posture to deliver actionable results Infrastructure optimization Maximized network uptime, availability, and bandwidth Seamless integration of disparate security technologies from multiple vendors and maximization of infrastructure investment Simplification of on-going security management, allows for re-allocation of cost savings Improves speed to protection and optimizes security capabilities Global, local capability and scalability for optimization of existing infrastructure Optimized employee productivity More efficient use of resources 24/7/365 or coverage on nights, weekends, off-hours Built-in security expertise (systems, people) Helps Demonstrate Compliance Helps address customer internal and regulatory controls for SOX, PCI, GLBA, HIPAA, etc. Process excellence that clients leverage to meet and maintain compliance Provides efficiencies in on-going compliance maintenance *Attack must be confirmed by IBM ISS 7

Guaranteed Protection Performance-based Outsourcing Goes beyond simple event monitoring and device management by offering the industry s leading performance-based service level agreement (SLA) with a cash-back payment* by the leading-edge IBM Internet Security Systems (ISS) X-Force research and development team. Accountability: Service Provider Accountability/Commitment to Customer Reliability: Leverages best of breed solutions to deliver guaranteed performance-based SLAs Protection: Offers a performance-based SLA with a cash-back payment of US$50,000 for any security breach resulting from a successful attack listed on the IBM ISS X-Force Certified Attack List, helping to ensure accountability from the service provider* 8

Guaranteed Protection Performance-based Outsourcing Keeping You Ahead of the Threat! 9

The Security Complexity & Cost Challenge IT Security Priorities % of IT Spend Security Solution Spend Priority Access/ID 5 Firewall 3 Endpoint Firewall 7 Virtual Private Network (VPN) 6 Intrusion Detection Service (IDS) 1 Antivirus 11 Anti-spam 12 Spam Filtering 10 Web Filtering 13 Patching 8 Security Information Management 2 Vulnerability Assessment (VA) 9 Other 4 9% 7% 15% 45% 24% Enterprises are looking to reduce security complexity Enterprises require integrated solutions that reduce total cost of protection and improves their security posture People consume the largest percent of IT spend Services People Software Hardware Appliances Source: Customer interviews 10

Lower Total Cost of Ownership - Reduced Complexity Consolidates multi-vendor environments for easier management and operational focus ISS, CheckPoint, Cisco, Juniper, Symantec, McAfee, TrendMicro, 3com and more Allows organizations to consolidate and efficiently manage global operational footprints Globally distributed resources, regional/remote offices, mobile workforce, independent security management, centralized framework Simplifies information overload Security Event and Log Data Example: Firewalls & IDS Over 150GB of data per week Generate over 250,000 alerts Complex environments can generate over 250,000,000 events and logs in a single day 11

Lower Total Cost of Ownership Infrastructure Optimization Aggressive elimination of malicious traffic resulting in maximized network uptime, availability, and bandwidth Preemptive protection, integrated vulnerability management and security intelligence, expert deployment and configuration Proactive risk management vs. reactive..."ahead of the Threat Integrated services delivery allows for the seamless integration of disparate security technologies from multiple vendors together with built in security intelligence allows for improved decision making and maximization of infrastructure investment Integrated X-Force security intelligence Virtual patching V-SOC XPS automated correlation, normalization and prioritization for both managed and unmanaged devices Integrated trouble ticketing and workflow for faster, automated remediation Simplification of on-going security management, allows for re-allocation of cost savings V-SOC portal presents single view for overall security management of disparate security technologies from multiple vendors for both managed and unmanaged devices V-SOC XPS automates many of the management functions that would other have to be performed manually Integrated ticketing and workflow for faster, automated remediation Unlimited security log and event storage in a forensically sound manner for easy retrieval for security investigation and forensics Improved evaluation, configuration and deployment of new security technologies, improves speed to protection and optimizes security capabilities Expert deployment and policy configuration and tuning to meet your specific business objectives Utilization of best security practices for compliance Vendor agnostic capabilities Global, local capability and scalability for optimization of existing infrastructure Consistent delivery of services from global SOCs with localized language and local resources 12

Lower Total Cost of Ownership Optimized Employee Productivity Cost optimization for on-going security management Addresses 24x7x365 coverage requirement (A single seat requires 6 9 resources) Reduces on-going investments in sophisticated analysis tools to accurately identify threats Reduces requirements for facilities and backend systems to manage Allows for reallocation of critical resources on business critical initiatives Extends capabilities leveraging security expertise and best practices (Specialized skills and training) Augments capabilities with protection, analysis, investigative and resolution skill sets Augments emergency response capabilities for resolution Reduces requirements for on-going hiring, training and retention initiatives Process excellence Integrates security intelligence for improved decision making Leverages security expertise for proactive threat mitigation and vulnerability protection Leverages X-Force for improved understanding of the latest attack methods and trends 13

Demonstrating Compliance Satisfies your internal and regulatory controls for SOX, PCI, GLBA, HIPAA, etc. Collecting, monitoring, archiving logs for access control policy violations (24/7/365) Reporting for system policies and change control Documented best practices in security infrastructure management Integrated delivery of security technologies required by many regulations such as firewall, IDS, Vuln Mgt, security event and log management, etc. Process excellence that clients leverage to meet and maintain compliance IBM ISS MSS follows security best practices in accordance to ISO and COBIT standards The same standards from which government and industry regulations are written Physical security, network security, facilities continuity, infrastructure security, fire protection, disaster recovery, security and privacy policies, certified processes and procedures IBM holds some of the industry s top certifications by which clients can leverage SAS70 Type II attested AICPA SysTrust certified for security, availability, & confidentiality Provides efficiencies in on-going compliance maintenance Save time and money maintaining compliance while improving your security posture! 14

Cost Savings At A Glance Source: Internet Security Systems, 2008 15

Security Optimization can help you gain operational efficiencies and IT capacity -- to save money and increase investments in new solutions IT Spending Liberating Funds 100% New Solutions Liberated funding for direct saving or transformational investment IT Spending Application Enhancements Cost of Operations Strategic Change Capacity New Solutions Operations Support Operations Maintenance Security Optimization Services Application Enhancements Operations Support Operations Maintenance 16

The Security Optimization Approach Redefine and Simplify Risk Management Re-evaluating priorities to balance risk in light of evolving challenges Establish a Total Security Framework and Solutions Portfolio Leveraging innovation and integration in consideration of holistic security and IT infrastructure Simplify the Security Risk Lifecycle Aligning with business processes to ensure continuous improvement Join with a Transformative Security Partner to Achieve these New World Imperatives Adding world-class expertise for success today and in the future 17

IBM Internet Security Systems delivers sustainable business through Security Optimization Designed to: Enable innovation through secured, end-to-end infrastructure and platforms Reduce number and complexity of required security controls Reduce redundant security expenses Improve organizational and operational agility and resiliency Leverage industry expertise to help unify policy management Deliver needed visibility, control and automation 18

IBM ISS Security Optimization Services World class security reducing cost and complexity A proven leader in security optimization of Professional Services, Integrated Security Products and Managed Services Proactive threat and vulnerability monitoring and management of an organization s IT infrastructure Prioritizes security risk management activities across physical and virtual systems Addresses compliance concerns by assessing and implementing the proper security controls 19 Intrusion prevention Firewall Universal threat management User identification Access control Security event and log management Intrusion prevention Vulnerability management and protection Remediation Security event and log management Host protection (server and desktop) Messaging and Web security Vulnerability management Data security Security event and log management

IBM Internet Security Systems solutions are designed to help you reduce costs, achieve greater IT value and improve productivity Cut costs Get more from existing infrastructure Increase productivity Defer capital expenditures Ease staffing pressures Provide immediate savings and lower total cost of ownership 20

We can help you reduce operational costs while maintaining or improving IT performance Actions to take: How IBM Internet Security Systems solutions can help: Conduct an assessment to identify cost savings IBM Information Security Assessment: Identify ways to optimize security infrastructure spending and create a transition road map that allows clients to reduce costs. Simplify and consolidate security infrastructure management IBM Managed Security Services: Reduce on-going security management costs by up to 55% percent through the reduction in security infrastructure complexity, and improved employee productivity 21

Our services can help you defer capital expenditures by getting more out of your existing infrastructure Actions to take: Ensure IT is responsive to changing business needs How IBM Internet Security Systems solutions can help: IBM Application Security Assessment: Optimize application performance by reducing downtime and the security risks associated with the extension of business on-line applications. Optimize security infrastructure performance and investments IBM Managed Security Services: Frees staff of repetitive, noncritical tasks while reducing the complexity of the IT environment, allowing the resources to be reallocated for projects that improve IT efficiency and new business capabilities. 22

And we can also help you reduce the pain and cost of unplanned outages and security exposures Actions to take: How IBM Global Technology Services can help: Reduce expense associated with downtime IBM Penetration Testing: Quickly identify and remediate security risks in your network infrastructure that could lead to costly security breaches and downtime. IBM Internet Security Systems, Proventia Protect your network assets and data from costly security breaches -- save an average of 15-20+ times your investment 1. IBM Managed Security Services: Protect your network assets and data from costly security breaches 24/7, with a guaranteed level of protection and cost savings of up to 55%. 23

Delivering Value Through Differentiation Breadth of services Monitored and Managed Services, vendor agnostic Cloud-based Security as a service Integrated services Correlation of security vulnerabilities with events to provide optimized security Single management view and control of enterprise wide security posture Integrated executive and technical reporting Flexible service options Maintain as much control as you want monitored, managed, unmanaged, combination of both Protection on demand nights, weekends, off-hours Strong Service Level Agreements (SLAs) Built on security best practices Performance-based Guaranteed Protection services Virtual Security Operations Center Integrated services architecture combining: Management Portal Integrated X-Force Security Intelligence XPS (Normalization, aggregation, correlation, archival, escalation, remediation) Finds the needle in the haystack Work flow, ticketing, emergency response and forensics, comprehensive reporting Security Expertise Security is all we do, focused on protection X-Force 24

Unmatched Global Security Reach and Expertise 8 Security Operations Centers 7 Security Research Centers 133 Monitored Countries 20,000+ Devices under Contract 3,700+ MSS Clients Worldwide 4 Billion+ Events Per Day 25

Breadth of Services 26

Integrated Services IBM ISS MSS Continuum Management Monitoring & Escalation Analytics & Reporting Log Collection What You Get Single view to overall security posture Integrated data sets across the entire breadth of services Correlation regardless of device type or vendor Integrated vulnerability management capabilities for improved accuracy and better protection Automated Virtual Patching capabilities for streamlined remediation Automated event escalation Built-in security intelligence 27

The Power of Integrated Services MSS In Action Managed Protection Services with Vulnerability Management Services Scan network to detect vulnerabilities. Use the Virtual-SOC portal to request application of patch updates to protect entire network or individual servers. Upon receipt of the patch request, an ISS SOC analyst will implement an IPS rule, if applicable; to block access to the specific vulnerability and apply protection for the system until it is patched. 28

The Power of Integrated Services MSS In Action Managed Intrusion Detection/Prevention Service with the Managed Firewall Services If ISS monitors and manages firewall and intrusion detection/prevention, and an attack is verified... ISS requests authorization to implement changes to firewall rules and/or IPS policies to prevent access from malicious hosts. 29

The Power of Integrated Services MSS In Action Security Event & Log Management Services & Managed Intrusion Detection/Prevention Services or Managed Firewall Services ISS provides the ability to manage, monitor, or view all of the customer's firewall, IDS and IPS devices. Provide customers with a consolidated security view and full reporting capabilities. Customers can access secure log/event archival of all aggregated security events for up to 7 years. Customer can leverage combined trouble ticketing capabilities to track issue resolution transparently across managed and unmanaged devices. 30

The Power of Integrated Services MSS In Action X-Force Threat Analysis and Vulnerability Management Services Schedule automated scans to identify OS's, applications, and their respective vulnerabilities. Scan results dynamically reconfigure the customer's XFTAS alerting preferences, providing real-time alert notifications for actionable vulnerabilities. Remediation workflow mgmt. features of the VMS service allow for generation of tickets for vulnerable assets with powerful grouping and prioritization capabilities. Validated remediation tasks have been completed by re-scanning of vulnerable assets. 31

Flexible Service Options What You Get IBM ISS MSS Continuum Multiple service levels to fit business goals Management Monitoring & Escalation Analytics & Reporting Log Collection Dynamic outsourcing: Anytime: Peak hours, off-peak hours, days, nights, weekends Anyhow: In-house, outsourced or a combination of both Anywhere: Multiple devices, globally, remotely Traditional and performance-based SLAs Vendor and device agnostic services Traditional managed service options, cloudbased, Security as a service delivery options (Security enablement services) 32

Strong SLAs 33

What is a Virtual-SOC Virtual-SOC is the integrated security architecture enabling IBM ISS to deliver marketleading Managed Security Services by combining advanced analysis and correlation capabilities, artificial intelligence, industry-leading security expertise and SLAs, and a high impact Web-based management portal in a single unified system. Allows You To: Optimize Resources Reduce Complexity Enforce Security Policy Improve Overall Security Posture Demonstrate Compliance 34

Total Cost of Ownership-Reducing Complexity, Improving Employee Productivity, Infrastructure Optimization Open vendor architecture Consolidated security views Managed Security Services Security Enablement Services Powerful query & reporting options Automated event/ log analyses Unlimited event/ log archive Granular permissions system Guaranteed availability Integrated trouble ticketing & workflow Integrated IBM Internet Security Systems X-Force intelligence Virtual-SOC Portal 35

Virtual-SOC Integrated Services Architecture 36

Virtual-SOC Integrated Services Architecture A. Multi-vendor security systems generate overwhelming numbers of raw logs, events & alerts. 37

Virtual-SOC Integrated Services Architecture B. In real-time, all the security data is imported into ISS technology platform at our Security Operation Centers (SOC). The data is then authenticated, encrypted, verified, & normalized. 38

Virtual-SOC Integrated Services Architecture C. Security event data enters ISS data warehouse A powerful data mining engine queries, analyzes, correlates & prioritizes the data. 39

Virtual-SOC Integrated Services Architecture D. ISS security professionals analyze & evaluate the results. Security threat patterns are identified & valid events reported. 40

Virtual-SOC Integrated Services Architecture E. ISS analysts keep in constant touch with their assigned clients, proactively contacting & continually helping them shore up their defenses. 41

Virtual-SOC Integrated Services Architecture F. Enables companies to see the global state of their security any time. Provides constant threat profile, security posture, & attack status. F Provides powerful query tools for custom searches. 42

The Analysts Unanimous Leader in MSS Our MSS Market Leadership Position is Strong! Frost & Sullivan, March 2009 Gartner, April 2009 Forrester, 2007 43

Security Expertise X-Force Research & Development The IBM Internet Security Systems X-Force research and development team: the world s leading enterprise security organization The core of all IBM Internet Security Systems products and services Focuses on analyzing and researching threats and vulnerabilities to develop preemptive protection technologies Integrates with IBM MSS for global threat monitoring Maintains the most comprehensive vulnerability DB in the world, and analyzes each and every one to determine impact against threats 44

HVALA NA PAŽNJI 45