Ragy Magdy Regional Channel Manager MEA IBM Security Systems



Similar documents
Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

What is Security Intelligence?

Q1 Labs Corporate Overview

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

Safeguarding the cloud with IBM Dynamic Cloud Security

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

The Benefits of an Integrated Approach to Security in the Cloud

The Current State of Cyber Security

Security Intelligence

Staying Ahead of the Cyber Security Game. Nigel Tan ASEAN Technical Leader IBM Security

IBM Security Strategy

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Security Officer s Checklist in a Sourcing Deal

IBM & Security Gov. Point Of Views

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

IBM QRadar Security Intelligence April 2013

How to Choose the Right Security Information and Event Management (SIEM) Solution

Security Issues in Cloud Computing

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

IBM Security IBM Corporation IBM Corporation

Worldwide Security and Vulnerability Management Forecast and 2013 Vendor Shares

Cloud Security. Vaughan Harper IBM Security Architect

Cloud Courses Description

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Securing and protecting the organization s most sensitive data

Cloud computing White paper November IBM Point of View: Security and Cloud Computing

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

Applying IBM Security solutions to the NIST Cybersecurity Framework

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

How To Protect Your Cloud From Attack

IBM Security QRadar Vulnerability Manager

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

IBM Security Briefing: Differentiators & Maturity Model

Cloud Courses Description

Strengthen security with intelligent identity and access management

IBM EXAM QUESTIONS & ANSWERS

Security of Cloud Computing for the Power Grid

The Evolution of Application Monitoring

IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

IBM Security in the Cloud

Consolidated security management for mainframe clouds

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

CloudCheck Compliance Certification Program

Ecom Infotech. Page 1 of 6

Breaking down silos of protection: An integrated approach to managing application security

Introducing IBM s Advanced Threat Protection Platform

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

QRadar SIEM and Zscaler Nanolog Streaming Service

Release 1. ICAICT814A Develop cloud computing strategies for a business

IBM Exam M IBM Security Sales Mastery Test v4 Version: 7.0 [ Total Questions: 62 ]

2012 North American Managed Security Service Providers Growth Leadership Award

IBM Security Framework

Securing Smart City Platforms IoT, M2M, Cloud and Big Data

Leverage security intelligence for retail organizations

Boosting enterprise security with integrated log management

How To Buy Nitro Security

IBM Software IBM Security Products: Intelligence, Integration, Expertise

Logging In: Auditing Cybersecurity in an Unsecure World

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

IBM Endpoint Manager Product Introduction and Overview

IBM QRadar as a Service

QRadar SIEM and FireEye MPS Integration

How To Secure Cloud Computing

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013

IBM MobileFirst Launch David Lee Heyman

Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

Security and high availability in cloud computing environments

IT Security Strategy and Priorities. Stefan Lager CTO Services

OIT User Conference Security Team November 2014

IBM Security Systems Solutions

IBM Security QRadar Vulnerability Manager Version User Guide

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

IBM Security Systems Trends and IBM Framework

Security as Architecture A fine grained multi-tiered containment strategy

Cloud Security Who do you trust?

IBM Advanced Threat Protection Solution

IBM Security QRadar Risk Manager

CLOUD SECURITY: THE GRAND CHALLENGE

FIVE PRACTICAL STEPS

Securing the mobile enterprise with IBM Security solutions

Transcription:

Ragy Magdy Regional Channel Manager MEA IBM Security Systems 1

Started my career in Security in 2003 by Joining ISS 2005 was named the ISS Regional Manager for the Middle East 2006 ISS was acquired by IBM Led the Security Team in GTS for the Middle East 2009 was tasked to build IBM Security Practice for the MEA region 2012, moved to SWG to lead the Channel Business 2

3

4

5

THE COMMON DEFINITION Cloud solutions accelerate the delivery of new Cloud business solutions value and accelerate fundamentally the change the economics of IT delivery of new business value and fundamentally change the economics of IT 6

7

The major breach of RSA in 2011.. 8

And YES, the plan was indeed successful!! Breached May 21st Breached May 26 th Breached April 6th 9

10

The world s first Cyber weapon exploded IBM Security Systems In a Nuclear Power Plant that had NO internet connection!!!!!!!!!!!!!!!!!!!!!!!!!! 11

Private cloud Hybrid IT Public cloud. Changes in Security, Privacy, and Control Security responsibility and control passes from consumer to provider, presenting unique challenges High multi-tenancy and data separation Image management and compliance Security of the virtual / hypervisor layer Virtual network visibility Need for Service Level Agreements (SLAs) Provider responsibility for infrastructure Customization of security controls Visibility into day-to-day operations Access to logs and policies Public exposure of applications and data 12

IAAS PAAS SAAS Security and Cloud Computing IBM Security Systems Collaboration CRM/ERP/HR Business Processes Industry Applications Software as a Service Web 2.0 Application Runtime Java Runtime Middleware Database Development Tooling Platform as a Service Servers Data Center Fabric Networking Storage Infrastructure as a Service 13

Needed Security Controls for Private Clouds 14

Needed Security Assessments for Private Clouds Assessment and Consultative Services Managed Security Services for Cloud Environments Secure Network Communications Critical Server Protection Vulnerability Scanning 24x7 Security Management User Activity Monitoring Identity and Access Management Incident Response 15

A balanced Security Framework backed up by Deep Security Intelligence is the answer. IBM Security Systems Unique Security Framework $1.8B investment in innovative technologies 6K+ security engineers and consultants Largest vulnerability database Award-winning X-Force research Analyst recognized Leadership in every segment Intelligence Integration Expertise 16

: The industry s most comprehensive Smart IBM Security Systems Security portfolio Intgerating Security with BUSINESS Analytics IBM OpenPages Algorithmics (recent acquisition) i2 Corporation (recent acquisition) IBM Security Portfolio IT Security and Compliance Analytics & Reporting QRadar SIEM QRadar Log Manager QRadar Risk Manager IT Infrastructure Operational Security Domains IBM Privacy, Audit and Compliance Assessment Services Security Consulting People Data Applications Infrastructure Network Endpoint Identity & Access Management Suite Guardium Database Security AppScan Source Edition Network Intrusion Prevention Endpoint Manager (BigFix) Managed Services Federated Identity Manager Optim Data Masking AppScan Standard Edition DataPower Security Gateway zsecure, Server and Virtualization Security Enterprise Single Sign-On Identity Assessment, Deployme nt and Hosting Services Key Lifecycle Manager Data Security Assessment Service Encryption and DLP Deployment Security Policy Manager Application Assessment Service AppScan OnDemand Software as a Service QRadar Anomaly Detection / QFlow Managed Firewall, Unified Threat and Intrusion Prevention Services Native Server Security (RACF, IBM Systems) Penetration Testing Services X-Force and IBM Research 17

Recognized as the #1 Cloud Security Solutions Provider By SC Magazine in 2012 2012 Gold Winner: IBM Cloud Security Solutions 18

19