Simplify security management in the cloud



Similar documents
IBM Endpoint Manager for Server Automation

Reducing the cost and complexity of endpoint management

IBM Endpoint Manager for Lifecycle Management

IBM Tivoli Endpoint Manager for Security and Compliance

IBM Tivoli Endpoint Manager for Lifecycle Management

IBM Tivoli Endpoint Manager for Lifecycle Management

IBM Tivoli Endpoint Manager for Security and Compliance

IBM Endpoint Manager for Mobile Devices

Move beyond monitoring to holistic management of application performance

IBM Security QRadar Risk Manager

IBM SmartCloud Monitoring

IBM Security QRadar Risk Manager

IBM Security X-Force Threat Intelligence

IBM Software Cloud service delivery and management

Optimize workloads to achieve success with cloud and big data

IBM Security QRadar Vulnerability Manager

Safeguarding the cloud with IBM Dynamic Cloud Security

For healthcare, change is in the air and in the cloud

IBM SmartCloud Workload Automation

IBM Security Intrusion Prevention Solutions

Strengthen security with intelligent identity and access management

Automated, centralized management for enterprise servers

IBM Endpoint Manager for Core Protection

Driving workload automation across the enterprise

IBM Security Privileged Identity Manager helps prevent insider threats

Taking control of the virtual image lifecycle process

IBM QRadar Security Intelligence Platform appliances

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Securing the mobile enterprise with IBM Security solutions

Boosting enterprise security with integrated log management

Effective storage management and data protection for cloud computing

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

IBM Tivoli Storage Manager for Virtual Environments

Selecting the right cybercrime-prevention solution

IBM Systems and Technology IBM SmartCloud Desktop Infrastructure

Effective Storage Management for Cloud Computing

IBM PowerSC. Security and compliance solution designed to protect virtualised data centres. Highlights. IBM Systems and Technology Data Sheet

Easily deploy and move enterprise applications in the cloud

The business value of improved backup and recovery

IBM Tivoli Netcool Configuration Manager

Breaking down silos of protection: An integrated approach to managing application security

Platform as a Service: The IBM point of view

IBM Security re-defines enterprise endpoint protection against advanced malware

IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet

IBM PureFlex System. The infrastructure system with integrated expertise

IBM Tivoli Netcool network management solutions for enterprise

Applying IBM Security solutions to the NIST Cybersecurity Framework

Big data management with IBM General Parallel File System

Business-driven governance: Managing policies for data retention

Accelerate server virtualization to lay the foundation for cloud

IBM WebSphere Application Server Family

Preparing your network for the mobile onslaught

IBM Global Business Services Microsoft Dynamics AX solutions from IBM

IBM System x and VMware solutions

IBM Tivoli Federated Identity Manager

Develop enterprise mobile applications with IBM Rational software

IBM InfoSphere Optim Test Data Management

IBM Tivoli Directory Integrator

IBM PureFlex and Atlantis ILIO: Cost-effective, high-performance and scalable persistent VDI

Reduce your data storage footprint and tame the information explosion

Rewriting the rules of patch management

The IBM Cognos family

IBM System x reference architecture solutions for big data

Tivoli Automation for Proactive Integrated Service Management

Risk-based solutions for managing application security

Consolidated security management for mainframe clouds

IBM FlashSystem and Atlantis ILIO

IBM Software Integrated Service Management: Visibility. Control. Automation.

CA Automation Suite for Data Centers

IBM Tivoli Netcool network management solutions for SMB

IBM Enterprise Linux Server

The IBM Cognos Platform

IBM QRadar Security Intelligence April 2013

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

IBM Storwize V5000. Designed to drive innovation and greater flexibility with a hybrid storage solution. Highlights. IBM Systems Data Sheet

IBM PureApplication System for IBM WebSphere Application Server workloads

Data center and cloud management. Enabling data center modernization and IT transformation while simplifying IT management

White paper December Addressing single sign-on inside, outside, and between organizations

Stay ahead of insiderthreats with predictive,intelligent security

Leverage security intelligence for retail organizations

IBM Tivoli Storage Manager Suite for Unified Recovery

The Smart Archive strategy from IBM

Collaboration solutions for midsized businesses Buyer s guide

How To Create An Insight Analysis For Cyber Security

IBM Endpoint Manager Product Introduction and Overview

Transcription:

Simplify security management in the cloud IBM Endpoint Manager and IBM SmartCloud offerings provide complete cloud protection Highlights Ensure security of new cloud services by employing scalable, optimized IBM solutions Reduce costs and complexity of cloud management while increasing business agility, speed to remediation and accuracy Address key security challenges of distributed environments with endpoint management and security in a single solution Support cloud provisioning and optimize the cloud environment through workload automation The increasingly rapid pace of business demands that organizations deliver services faster than ever, and being able to react with agility is key to survival in the changing competitive landscape. The promised benefits of cloud computing include rapid service delivery and lower operational costs. However, the adoption of a cloud model can lead to a variety of new challenges, including data governance, access control, activity monitoring and the visibility of dynamic resources in essence, all aspects of IT security. So how should organizations address IT security in these more efficient, yet more complex, environments? As a proven leader in IT management solutions, IBM takes a holistic approach to security and offers optimized solutions that span the spectrum from mobile devices to data center servers in the cloud. The IBM Endpoint Manager family and IBM SmartCloud solutions can play a key role in securing and maintaining your cloud environments and are designed to manage all of your computer assets across desktops, laptops and servers regardless of connectivity. This is especially critical on today s smarter planet, where instrumented, interconnected and intelligent businesses collect, process, use and store more information than ever before. IBM security solutions are instrumental to your organization s cloud evolution, no matter where you are in the process. With the IBM platform-based approach, you can choose

the solution that meets your needs today, whether simple or complex and rest assured that your investments will be protected into the future. Addressing security in a virtual world Historically, virtual machine technologies were most often used in development and test environments. But with the growing prevalence of cloud computing, they are increasingly being leveraged in production to either host or supplement businesscritical applications. The ever-expanding use of virtualization technologies brings both benefits and challenges. Some of the benefits such as higher server utilization, faster deployment and the ability to more quickly clone, copy and deploy servers are partially offset by the proliferation of virtual machines and the associated risks to your organization. Hypervisor host servers and their associated virtual machines need to be carefully monitored and managed, because even short-lived virtual machines can pose a risk to your organization. For example, many virtual machines often spend weeks, or even months, in a dormant state and are not updated with the latest critical security patches. Restarting these dormant virtual machines introduces additional security risks and can leave organizations open to hacking and virus outbreaks. Endpoint Manager provides a better way to manage these dormant machines, by automatically enforcing patch compliance across physical and virtual servers, across a range of hypervisors and operating systems. Extending your cloud security capabilities Endpoint Manager solutions enable you to see all your endpoints, whether physical, virtual, fixed or mobile. You can fix issues anywhere in minutes, regardless of bandwidth or connectivity, and deploy over any network or geography in days. These comprehensive solutions enable you to achieve continuous configuration compliance cross-platform and help simplify IT operations. As your cloud security needs grow, IBM Endpoint Manager for Security and Compliance built on BigFix technology enables you to address the security challenges of even the most complex and highly distributed environments. It provides patch management and security configuration management in a single solution one that can help your organization both protect endpoints and assure regulators that you are meeting security compliance standards, even on cloud assets. This easy-to-manage, quick-to-deploy solution supports security in an environment that is likely to include a large variety and large number of endpoints from servers to desktop PCs, roaming Internet-connected laptops, and also specialized equipment such as point-of-sale devices, ATMs and self-service kiosks. The closed-loop capabilities of Endpoint Manager for Security and Compliance can be grouped into four key areas: report, assess, remediate and enforce. 2

Managed = Secure Systems management Common management agent Unified management console Common infrastructure Single server Security management IBM Endpoint Manager Desktops / laptops / servers Mobile devices Purpose-specific devices 3

IBM Endpoint Manager Assess Remediate Endpoint Manager for Security and Compliance enables you to stay on top of fast-changing cloud assets with real-time visibility, providing agentless asset discovery and vulnerability assessment, security, and compliance analytics. Use this capability to discover 10 to 30 percent more assets than previously reported. Assess Endpoint Manager for Security and Compliance includes a library of more than 5,000 compliance settings to help you quickly assess the compliance of cloud assets. It offers out-of-box best practices to meet US Federal Desktop Configuration Control regulations and Defense Information Systems Agency Security Technical Implementation Guides. It is also the first product to be certified by the National Institute of Standards and Technology (NIST) for both assessment and remediation. Remediate This solution can help you achieve a greater than 95 percent first-pass success rate within hours of policy or patch deployment with a unified physical and virtual approach. You can run an Endpoint Manager agent on any system, whether it is physical or virtual so you can use it to patch traditional systems, as well as to patch running virtual machines in a cloud environment. And the platform s closed-loop design enables you to patch as quickly as you can provision. Finally, Endpoint Manager for Security and Compliance provides automated, continuous compliance enforcement, which puts you in control with the most up-to-date information a requirement in fast-changing cloud environments. The solution enables security and operations teams to work together to continually strengthen security and adjust to evolving requirements. 4

Traditional solutions IBM Endpoint Manager Publish Publish Evaluate Evaluate Evaluate Decide Decide Getting started with security in virtualized and cloud environments IBM SmartCloud Patch Management is an effective entry point into delivering and securing virtual and cloud environments. IBM SmartCloud Patch Management enables unified management of patch compliance across your physical and virtual systems in near real time and supports self-service delivery of cloud services. The unified IBM endpoint management approach provides the benefits of unmatched visibility and control of your systems, regardless of context, location or connectivity. The patch capabilities of IBM SmartCloud Patch Management feature: Heterogeneous platform support For multiple operating systems, including Microsoft Windows, Unix, Linux and Mac OS Continuous, automatic patch assessment and remediation of all systems Including physical and virtual systems Enterprise-class scalability and security Proven scalability, including fine-grained authorization and access control capabilities IBM SmartCloud Patch Management also includes IBM SmartCloud Provisioning, which provides an entry-level platform to allow organizations to become cloud-enabled within a few hours while serving as a solid foundation for adding advanced cloud capabilities as customer needs evolve. IT organizations can rapidly implement the specific type of cloud environment they need, whether small, medium or large. This solution: Provides rapid deployment of virtual systems, as well as network and storage virtualization, with preconfigured images that help organizations get the cloud up and running quickly Enables standardization of IT processes for new levels of operational efficiency Provides virtual machine provisioning, typically standardized images that can be deployed to tens, hundreds or thousands of virtual machines very rapidly Offers advanced image management capabilities, including the ability to consolidate all of your images in a virtual image library 5

IBM SmartCloud Provisioning helps you reduce the cost and complexity associated with deploying cloud computing while providing comprehensive capabilities for visibility, control and automation. Why IBM? IBM offers security solutions at every level a customer may need. Depending on your cloud adoption timeline, you can start with entry-level patch management solutions, then expand to broader security management solutions, and finally to our cloud solutions. To access even greater cloud security benefits, you can get started with IBM SmartCloud Patch Management and quickly benefit from an optimized and secure cloud solution. The integrated IBM SmartCloud family of solutions will help you to truly reap the benefits of cloud computing. For more information To learn more about IBM Endpoint Manager, please contact your IBM representative or IBM Business Partner, or visit ibm.com/tivoli/endpoint to access white papers, data sheets and more. To learn more about IBM SmartCloud offerings, please visit ibm.com/smartcloud Additionally, IBM Global Financing can help you acquire the software capabilities that your business needs in the most cost-effective and strategic way possible. We ll partner with credit-qualified clients to customize a financing solution to suit your business and development goals, enable effective cash management, and improve your total cost of ownership. Fund your critical IT investment and propel your business forward with IBM Global Financing. For more information, visit: ibm.com/financing Copyright IBM Corporation 2012 IBM Corporation Software Group Route 100 Somers, NY 10589 Produced in the United States of America October 2012 IBM, the IBM logo, ibm.com, and IBM SmartCloud are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at Copyright and trademark information at ibm.com/legal/copytrade.shtml BigFix is a registered trademark of BigFix, Inc., an IBM Company. Linux is a registered trademark of Linus Torvalds in the United States, other countries or both. Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries or both. UNIX is a registered trademark of The Open Group in the United States and other countries. This document is current as of the initial date of publication and may be changed by IBM at any time. THE INFORMATION IN THIS DOCUMENT IS PROVIDED AS IS WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that systems and products are immune from the malicious or illegal conduct of any party. Please Recycle TIS14126-USEN-00