Security Intelligence



Similar documents
The Current State of Cyber Security

and Security in the Era of Cloud

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

Staying Ahead of the Cyber Security Game. Nigel Tan ASEAN Technical Leader IBM Security

The webinar will begin shortly

IBM QRadar Security Intelligence April 2013

Under the Hood of the IBM Threat Protection System

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

Addressing Security for Hybrid Cloud

Data Security: Fight Insider Threats & Protect Your Sensitive Data

How to Choose the Right Security Information and Event Management (SIEM) Solution

Protecting against cyber threats and security breaches

IBM Security Intelligence Strategy

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Safeguarding the cloud with IBM Dynamic Cloud Security

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Security strategies to stay off the Børsen front page

IBM SECURITY QRADAR INCIDENT FORENSICS

Cloud Security. Vaughan Harper IBM Security Architect

IBM Security re-defines enterprise endpoint protection against advanced malware

Mobile Security. Luther Knight Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015.

IBM Security QRadar Risk Manager

IBM Security X-Force Threat Intelligence

IBM Security QRadar Risk Manager

IBM Security QRadar Vulnerability Manager

IBM Advanced Threat Protection Solution

Leverage security intelligence for retail organizations

IBM Security IBM Corporation IBM Corporation

Application Security from IBM Karl Snider, Market Segment Manager March 2012

Strengthen security with intelligent identity and access management

Introducing IBM s Advanced Threat Protection Platform

Applying IBM Security solutions to the NIST Cybersecurity Framework

Breaking down silos of protection: An integrated approach to managing application security

IBM Security Strategy

IBM & Security Gov. Point Of Views

Selecting the right cybercrime-prevention solution

Security for a Smarter Planet IBM Corporation All Rights Reserved.

L evoluzione del Security Operation Center tra Threat Detection e Incident Response & Management

AMPLIFYING SECURITY INTELLIGENCE

Do not forget the basics!!!!!

Risk-based solutions for managing application security

IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence

Let s talk about assets in QRadar

IBM Security. Managed Security Services. SOC Poland / GSOC. Damian Staroscic Security Operations Center (SOC) Manager.

IBM Security Intrusion Prevention Solutions

IBM Security Systems Trends and IBM Framework

IBM Security Systems Support

Extending security intelligence with big data solutions

Win the race against time to stay ahead of cybercriminals

Beyond passwords: Protect the mobile enterprise with smarter security solutions

IBM Security Privileged Identity Manager helps prevent insider threats

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

Reducing the cost and complexity of endpoint management

IBM Security QRadar QFlow Collector appliances for security intelligence

Gaining the upper hand in today s cyber security battle

Managing security risks and vulnerabilities

Security Intelligence Solutions

Effectively Using Security Intelligence to Detect Threats and Exceed Compliance

Securing the mobile enterprise with IBM Security solutions

How To Create An Insight Analysis For Cyber Security

Boosting enterprise security with integrated log management

Security of Cloud Computing for the Power Grid

Introduction to PCI DSS

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

IBM Security QRadar SIEM Product Overview

IBM QRadar Security Intelligence Platform appliances

Zak Khan Director, Advanced Cyber Defence

IBM Security Framework

Simplify security management in the cloud

Powering Security and Easy Authentication in a Multi-Channel World

BIG DATA: Big Opportunity, Big Headaches Protect your Big Data with data security

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Integrating MSS, SEP and NGFW to catch targeted APTs

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

IBM Counter Fraud Signature Solutions

IBM Security Briefing: Differentiators & Maturity Model

THE EVOLUTION OF SIEM

Stop advanced targeted attacks, identify high risk users and control Insider Threats

IBM Endpoint Manager Product Introduction and Overview

IBM Security QRadar SIEM Version MR1. Vulnerability Assessment Configuration Guide

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Securing and protecting the organization s most sensitive data

Transcription:

IBM Security Security Intelligence Security for a New Era of Computing Erno Doorenspleet Consulting Security Executive 1

PARADIGM SHIFT in crime

Sophistication is INCREASING Attacks are More Targeted Attackers are More Organized

Cyber criminals use BUSINESS INTELLIGENCE

Criminals COLLABORATE on a global scale

EVERYONE in this room is a target

NOBODY IS IMMUNE Attack types Year of the Breach 40% Increase 500,000,000+ Records 2011 2012 2013 Source: IBM X-Force Threat Intelligence Quarterly 1Q 2014

A new way to think about SECURITY

Your company IS NOT infected

REALITY Attackers bypass traditional defenses every day

NETWORKS ENDPOINTS DATA APPLICATIONS Stop unknown threats Identify anomalies and weaknesses Understand and remediate incidents Global Behavioral Advanced Threat Analytics Intelligence Controls PHYSICAL VIRTUAL CLOUD

DETECT Security IBM QRadar Intelligence Security Managed Intelligence Services Platform Global IBM Security Security Operations Information Centers IBM Global Threat Data PREVENT Behavioral IBM Trusteer Malware Apex Prevention Malware Prevention Zero-day IBM Security Exploit Prevention Network Protection Real-time IBM Guardium Data Data Security Security RESPOND Incident IBM QRadar Forensics Endpoint Incident Forensics Management Emergency IBM Endpoint Response Manager IBM Emergency Response Services

You can do this ALONE

REALITY Security requires collective defense

LEVEL THE PLAYING FIELD with IBM threat research and information sharing Monitoring of more than 23B web pages and images 83K vulnerabilities 8M spam and phishing attacks 860K malicious IP addresses 1,000 malware samples collected IBM X-Force and Trusteer 1,000+ security threat researchers

Open Beta: IBM X-FORCE EXCHANGE A threat intelligence exchange

FIGHT CYBERCRIME with IBM Trusteer experts and technology Assess activity on MILLIONS of endpoints and Websites A North American health care organization Global Threat Database Malware Research Phishing Sites 30K endpoints protected advanced threats 200 blocked in first 8 weeks

DEPLOY DEEP EXPERTISE with IBM Security Services ASSESS 10,000+ customers BUILD 6,000 security experts MANAGE 100M 20B endpoints events per day Strategy, Risk and Compliance, Cybersecurity Assessment and Response, and Security Operations

You are investing WISELY

REALITY Focus on your most critical assets.01 % to 2 % is your critical data ~70 % of the company s value

up 6% $154 Average cost per record compromised $3.79 million Average total cost per data breach 23% increase Total cost of a data breach net change over two years REALITY Cost of a data breach is on the rise Source: Ponemon Institute Cost of Data Breach Study up 7% $136 $145 $154 Net change over 1 year = 6% Net change over 2 years = 12% FY 2013 FY 2014 FY 2015 Average per capita cost

ADOPT A RISK-BASED DEFENSE Discover your organization s crown jewels Protect critical data and applications Monitor data access and usage IBM Data Security Services, IBM InfoSphere Guardium, IBM Security AppScan, and IBM Identity and Access Manager

Innovation is TOO RISKY

REALITY Cloud and Mobile will reinvent security IaaS PaaS SaaS Protect Cloud Manage Access Protect Data Gain Visibility Protect Mobile Devices Applications Transactions

Security INTELLIGENCE

IBM Security Twitter @ibmsecurity and @ibmxforce IBM X-Force Threat Intelligence Quarterly and other research reports: http://www.ibm.com/security/xforce/ Find more on SecurityIntelligence.com

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. www.ibm.com/security Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.