How to Choose the Right Security Information and Event Management (SIEM) Solution



Similar documents
IBM Security Intelligence Strategy

The webinar will begin shortly

IBM QRadar Security Intelligence April 2013

The Current State of Cyber Security

Security Intelligence

IBM SECURITY QRADAR INCIDENT FORENSICS

Security strategies to stay off the Børsen front page

QRadar SIEM and FireEye MPS Integration

and Security in the Era of Cloud

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

QRadar SIEM and Zscaler Nanolog Streaming Service

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Q1 Labs Corporate Overview

IBM Security IBM Corporation IBM Corporation

IBM QRadar Security Intelligence Platform appliances

Under the Hood of the IBM Threat Protection System

Safeguarding the cloud with IBM Dynamic Cloud Security

What is Security Intelligence?

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

IBM Security QRadar SIEM Product Overview

Boosting enterprise security with integrated log management

Strengthen security with intelligent identity and access management

Security Intelligence Solutions

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

Leverage security intelligence for retail organizations

Cloud Security. Vaughan Harper IBM Security Architect

Staying Ahead of the Cyber Security Game. Nigel Tan ASEAN Technical Leader IBM Security

BigData Analytics per la sicurezza delle Infrastrutture Critiche

IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence

Protecting against cyber threats and security breaches

AMPLIFYING SECURITY INTELLIGENCE

Addressing Security for Hybrid Cloud

IBM QRadar as a Service

IBM Security QRadar Vulnerability Manager

IBM Security QRadar QFlow Collector appliances for security intelligence

IBM Security QRadar Risk Manager

IBM Security X-Force Threat Intelligence

Log management & SIEM: QRadar Security Intelligence Platform

IBM Security re-defines enterprise endpoint protection against advanced malware

Breaking down silos of protection: An integrated approach to managing application security

Introducing IBM s Advanced Threat Protection Platform

IBM Security QRadar Risk Manager

Applying IBM Security solutions to the NIST Cybersecurity Framework

IBM Security Intrusion Prevention Solutions

IBM Advanced Threat Protection Solution

How To Buy Nitro Security

Win the race against time to stay ahead of cybercriminals

Effectively Using Security Intelligence to Detect Threats and Exceed Compliance

Safeguarding the cloud with IBM Security solutions

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

Risk-based solutions for managing application security

QRadar Security Intelligence Platform Appliances

Securing the Cloud: Making Cloud an Opportunity to Enhance Security

Information Technology Policy

IBM Security Systems Support

QRadar Security Management Appliances

Data Security: Fight Insider Threats & Protect Your Sensitive Data

Securing and protecting the organization s most sensitive data

The Value of QRadar QFlow and QRadar VFlow for Security Intelligence

L evoluzione del Security Operation Center tra Threat Detection e Incident Response & Management

IBM Security Framework

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

The SIEM Evaluator s Guide

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Extending security intelligence with big data solutions

IBM Security Briefing: Differentiators & Maturity Model

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

The Benefits of an Integrated Approach to Security in the Cloud

IBM Security Strategy

IBM & Security Gov. Point Of Views

IBM Security. Managed Security Services. SOC Poland / GSOC. Damian Staroscic Security Operations Center (SOC) Manager.

IBM Endpoint Manager Product Introduction and Overview

IBM Security Privileged Identity Manager helps prevent insider threats

Society Protection Best Practices from Industry

IBM X-Force 2012 Cyber Security Threat Landscape

Powering Security and Easy Authentication in a Multi-Channel World

Ecom Infotech. Page 1 of 6

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

Do not forget the basics!!!!!

Application Security from IBM Karl Snider, Market Segment Manager March 2012

Mobile Security. Luther Knight Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015.

Reducing the cost and complexity of endpoint management

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

QRadar SIEM 6.3 Datasheet

CA Virtual Assurance for Infrastructure Managers

Tivoli Automation for Proactive Integrated Service Management

IBM X-Force 2012 Cyber Security Threat Landscape

Let s talk about assets in QRadar

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

CA Systems Performance for Infrastructure Managers

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

The power of collaboration: Accenture capabilities + Dell solutions

Detect & Investigate Threats. OVERVIEW

Leveraging security from the cloud

Cyber security in healthcare

Transcription:

How to Choose the Right Security Information and Event Management (SIEM) Solution John Burnham Director, Strategic Communications and Analyst Relations IBM Security Chris Meenan Director, Security Intelligence Product Management and Strategy IBM Security

Agenda Introduction 2015 Gartner Magic Quadrant for SIEM IBM Security QRadar SIEM Solutions How we got here 2

Agenda Introduction 2015 Gartner Magic Quadrant for SIEM IBM Security QRadar SIEM Solutions How we got here 3

QRadar in Gartner MQ Leaders Quadrant over the last 5 years 2011 2012 2013 2014 2015 leaders leaders IBM/Q1 Labs Vertical axis is Ability to Execute Horizontal Axis is Completeness of Vision 4

IBM QRadar is in SIEM Leadership Quadrant For Seventh Straight Year Magic Quadrant for Security Information and Event Management, Gartner, July 2015 2015 Gartner MQ for SIEM: IBM Security QRadar is highest on Ability to Execute (the Y-axis) AND furthest to the right on Completeness of vision (the X-axis) Ability to execute is an assessment of overall viability, product service, customer experience, market responsiveness, product track record, sales execution, operations, and marketing execution. Completeness of Vision is a rating of product strategy, innovation, market understanding, geographic strategy, and other factors The need for early detection of targeted attacks and data breaches is driving the expansion of new and existing SIEM deployments. Advanced users are looking to augment SIEM with advanced profiling and analytics. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose 5

IBM Security QRadar in Leadership Quadrant for Seventh Straight Year Magic Quadrant for Security Information and Event Management, Gartner, July 2015 What Gartner is Saying about QRadar #1 Midsize and large enterprises with general SIEM requirements, and those with use cases that require behavior analysis, network flow and packet analysis, should consider QRadar. Customer feedback indicates that the technology is relatively straightforward to deploy and maintain in both modest and large environments. QRadar provides behavior analysis capabilities for NetFlow and log events. The average of IBM reference customers satisfaction scores for scalability and performance, effectiveness of predefined correlation rules, report creation, ad hoc queries, product quality and stability, and technical support is higher than the average scores for all reference customers in those areas. 6

IBM Security QRadar in Leadership Quadrant for Seventh straight year Magic Quadrant for Security Information and Event Management, Gartner, July 2015 Other Gartner Comments about IBM Security QRadar: #1 IBM Security's QRadar Platform includes QRadar SIEM, Log Manager, Vulnerability Manager, Risk Manager, QFlow and VFLow Collectors, and Incident Forensics. QRadar can be deployed as an appliance, a virtual appliance or as SaaS/infrastructure as a service (IaaS). Components can be deployed in an all-in-one solution or scaled by using separate appliances for different functions. Recent enhancements include incident forensics support, new data storage appliances, improved query support across logs, flow data, threat intelligence, and vulnerability and asset data. The capability to replay historical event data through current correlation rules is also now available. IBM offers a hybrid delivery option for QRadar, with an on-premises QRadar deployment, a SaaS solution hosted on IBM Cloud and optional remote monitoring from IBM's managed security service operations centers. 7

And in case you had not heard.. According to IDC*, IBM Security Systems: Maintained the #1 position in Identity and Access Management Maintained #1 position in Security Vulnerability Management (which includes SIEM) Improved its share in Endpoint Security and Network Security. Significantly outpaced overall security software market growth, and remained the #3 security software vendor in 2013." (Approved 4/23/14, IDC Permissions/Michael Shirer) Gartner published their 2014 revenue/share estimate and IBM Security Systems: 2015 Gartner rates IBM #1 in SIEM (3rd year) and #2 in Enterprise Security IBM moved up to #3 in total share, and is the fastest growing security software vendor in the global market based on revenue (2014) Grew +3X faster than the overall market: 19/5% *According to IDC's Worldwide Semiannual Software Tracker analysis for calendar 2013 8

Agenda Introduction 2014 Gartner Magic Quadrant for SIEM IBM Security QRadar SIEM Solutions How we got here 9

The Need for Security Intelligence Drives Everything We Do Escalating Threats Increasing Complexity Resource Constraints Designer Malware Spear Phishing Persistence Backdoors Increasingly sophisticated attack methods Disappearing perimeters Accelerating security breaches Constantly changing infrastructure Too many products from multiple vendors; costly to configure and manage Inadequate antivirus products Struggling security teams Too much data with limited manpower and skills to manage it all 10

IBM QRadar Security Intelligence Platform Providing actionable intelligence INTELLIGENT Correlation, analysis and massive data reduction AUTOMATED Driving simplicity and accelerating time-to-value IBM QRadar Security Intelligence Platform INTEGRATED Unified architecture delivered in a single console 11

The Core of Our Solution: IBM Security QRadar SIEM Security devices Servers and mainframes Network and virtual activity Data activity Application activity Configuration information Vulnerabilities and threats Users and identities Global threat intelligence Automated Offense Identification Unlimited data collection, storage and analysis Built in data classification Automatic asset, service and user discovery and profiling Real-time correlation and threat intelligence Activity baselining and anomaly detection Detects incidents of the box Embedded Intelligence Prioritized Incidents Suspected Incidents 12

Answering questions to help prevent and remediate attacks 13

Extending the Core with In-Depth Forensics Investigation Security devices Application activity QRadar SIEM QRadar Incident Forensics Servers and mainframes Global threat intelligence Network and virtual activity Vulnerabilities and threats Configuration information Users and identities Automated data collection and asset discovery Real-time, and integrated analytics Massive data reduction Anomaly detection Offenses Identified by QRadar Full PCAP Forensics Detailed Incident Meta- Data Evidence Reconstruction of content and incident activity Data activity 14

An integrated, unified architecture in a single web-based console Log Management Security Intelligence Network Activity Monitoring Risk Management Vulnerability Management Network Forensics 15

IBM X-Force Exchange Enhancing Value of QRadar A new platform to consume, share, and act on threat intelligence IBM X-Force Exchange is: OPEN a robust platform with access to a wealth of threat intelligence data Research and collaboration platform and API ACTIONABLE an integrated solution to help quickly stop threats Security Analysts and Researchers Security Operations Centers (SOCs) Security Products and Technologies SOCIAL a collaborative platform for sharing threat intelligence Backed by the reputation and scale of IBM X-Force 16

Extending QRadar Security Intelligence Platform to the Cloud Extensive data sources Accelerate your ability to identify and stop cyber threats with Threat Indicators Security devices Servers and mainframes Network and virtual activity Data activity Application activity Configuration information Vulnerabilities and threats Users and identities Cloud-based offering of the #1 Security Intelligence solution IBM deploys, maintains and supports infrastructure Protects against threats and reduces compliance risk Leverages real-time threat intelligence from X-Force Collects data from both on-premise and cloud resources FLEXIBLE a full suite of upgradeable security analytics offerings and service levels to choose from COST EFFECTIVE acquire and deploy quickly with no CapEx investment PEACE OF MIND trusted IBM security service professionals available to provide guidance and meet your security requirements 17

IBM Security QRadar for MSSPs New capabilities creating profitable opportunities for MSSPs IBM QRadar is: COST EFFECTIVE Single and multi-tenanted enabling low cost, rapid delivery of security intelligence services Multi-tenant and single deployment options Master Console for centralized view of multiple clients System configuration template support Horizontal scalability Extensive APIs for enterprise integration Cloud-ready Flexible MSSP pricing options SCALABLE & FLEXIBLE Scales as needed from the smallest to the largest customers with centralized management AUTOMATED driving simplicity and accelerating time-to-value for service providers 18

Recent QRadar Investments and Innovations Advanced Search Historical Correlation X-Force Exchange Integration Real-Time Threat Intelligence Open API s for expanded integrations 500+ Devices, Systems and Applications Supported Rules/Building Blocks over 500 enabled out-of-the-box Over 1600 unique reports now available 19

QRadar is the Centerpiece of IBM Security Integration People IBM Security Access Manager IBM InfoSphere Guardium Data IBM zsecure IBM Security AppScan Applications IBM Security Privileged Identity Manager IBM Security Identity Manager IBM QRadar Security Intelligence Platform IBM Security Network Protection XGS Infrastructure IBM Endpoint Manager IBM Security Directory Server and Integrator IBM Trusteer Apex Advanced Fraud Protection 20

IBM QRadar Supports Hundreds of Third-Party Products IBM QRadar Security Intelligence Platform 21

QRadar Security Intelligence Solution Delivery Models Capital and Operating Expense Options: Hardware-based appliances Software for qualified, client-owned servers Virtual appliances for VMware environments Cloud Operational Expense Option: SaaS- Security Intelligence on Cloud 22

IBM Services Managed SIEM Delivering SIEM optimization with advanced threat protection SIEM optimization Managed SIEM Custom-tailored engagement SIEM design and build services Use case design and log acquisition SIEM implementation SIEM optimization Steady-state SIEM management Threat monitoring and response SIEM administrative support SIEM infrastructure management SIEM reporting More quickly identify and remediate Consolidate data silos Better predict business risks Detect insider fraud Address regulation mandates Optimize staff resources Deploy robust security intelligence and incident forensics Collect, correlate and report on data in one integrated solution Engage entire risk management lifecycle for infrastructures Adopt nextgeneration SIEM with identity correlation Automate data collection and configuration audits Offload security monitoring and device management 23

IBM X-Force and Security Services A Winning Combination IBM Security by the Numbers + monitored countries (MSS) + service delivery experts + devices under contract + endpoints protected + events managed per day 24

Client example: An international energy company reduces billions of events per day to find those that should be investigated Optimize threat analysis An international energy firm analyzes 2 billion events per day to find 20-25 potential offenses to investigate Business challenge Reducing huge number of events to find the ones that need to be investigated Automating the process of analyzing security data Solutions (QRadar SIEM, QFlow, Risk Manager) Combined analysis of historical data with real-time alerts to gain a big picture view and uncover patterns of unusual activity humans miss and immediately block suspected traffic 25

Learn more about IBM Security QRadar SIEM Download the 2015 Gartner Magic Quadrant for SIEM Read our blog Visit our Website: http://ibm.co/qradar 26

Learn more about IBM Security TOP 3 20 133 10K 24 enterprise security software vendor in total revenue industry analyst reports rank IBM Security as a LEADER countries where IBM delivers managed security services clients protected including of the top 33 banks in Japan, North America, and Australia Visit our web page IBM.com/Security Watch our videos IBM Security YouTube Channel Read new blog posts SecurityIntelligence.com Follow us on Twitter @ibmsecurity 27

Q&A

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. THANK YOU www.ibm.com/security Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.