Do not forget the basics!!!!!



Similar documents
IBM Security Strategy

Staying Ahead of the Cyber Security Game. Nigel Tan ASEAN Technical Leader IBM Security

and Security in the Era of Cloud

IBM Endpoint Manager Product Introduction and Overview

IBM Security Intelligence Strategy

The Current State of Cyber Security

The webinar will begin shortly

Under the Hood of the IBM Threat Protection System

IBM Security re-defines enterprise endpoint protection against advanced malware

Security Intelligence

Cloud Security. Vaughan Harper IBM Security Architect

How to Choose the Right Security Information and Event Management (SIEM) Solution

IBM Advanced Threat Protection Solution

Introducing IBM s Advanced Threat Protection Platform

IBM Security Systems Trends and IBM Framework

IBM Security Network Protection

IBM Security X-Force Threat Intelligence

What is Security Intelligence?

IBM & Security Gov. Point Of Views

QRadar SIEM and FireEye MPS Integration

The Hillstone and Trend Micro Joint Solution

INSERT COMPANY LOGO HERE

IBM Security IBM Corporation IBM Corporation

The Cyber Threat Landscape

THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE

Q1 Labs Corporate Overview

Leverage security intelligence for retail organizations

L evoluzione del Security Operation Center tra Threat Detection e Incident Response & Management

Win the race against time to stay ahead of cybercriminals

IBM Exam M IBM Security Sales Mastery Test v4 Version: 7.0 [ Total Questions: 62 ]

Securing Cloud-Based

ControlFabric Interop Demo Guide

Advanced Endpoint Protection

Safeguarding the cloud with IBM Dynamic Cloud Security

IBM Security Briefing: Differentiators & Maturity Model

IBM QRadar Security Intelligence April 2013

Requirements When Considering a Next- Generation Firewall

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

DYNAMIC DNS: DATA EXFILTRATION

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

You ll learn about our roadmap across the Symantec and gateway security offerings.

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Advanced Threat Protection with Dell SecureWorks Security Services

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Comprehensive real-time protection against Advanced Threats and data theft

The Changing Nature of Risk and the Role of Big Data

Unified Security, ATP and more

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

Modular Network Security. Tyler Carter, McAfee Network Security

IBM SECURITY QRADAR INCIDENT FORENSICS

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Changing the Enterprise Security Landscape

Securing Your Business with DNS Servers That Protect Themselves

IBM Security QRadar Risk Manager

IBM Security QRadar Vulnerability Manager

AppGuard. Defeats Malware

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Strengthen security with intelligent identity and access management

ESG Brief. Overview by The Enterprise Strategy Group, Inc. All Rights Reserved.

Persistence Mechanisms as Indicators of Compromise

IBM QRadar as a Service

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

SANS Top 20 Critical Controls for Effective Cyber Defense

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Closing the Vulnerability Gap of Third- Party Patching

Using SIEM for Real- Time Threat Detection

The SIEM Evaluator s Guide

Security strategies to stay off the Børsen front page

Vulnerability Management

McAfee Network Security Platform

QRadar SIEM and Zscaler Nanolog Streaming Service

UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC)

The Benefits of an Integrated Approach to Security in the Cloud

IBM Security QRadar Risk Manager

Carbon Black and Palo Alto Networks

Applying IBM Security solutions to the NIST Cybersecurity Framework

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

Security Intelligence Services. Cybersecurity training.

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

Modern Approach to Incident Response: Automated Response Architecture

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

The Evolution of Application Monitoring

Cisco Security Intelligence Operations

Protect Your Business and Customers from Online Fraud

Advanced Threats: The New World Order

CryptoLocker la punta dell iceberg, impariamo a difenderci dagli attacchi mirati. Patrick Gada 18 March 2015 Senior Sales Engineer

Transcription:

Do not forget the basics!!!!! Domenico Raguseo IBM Europe Security Systems Technical Sales Manager

Attackers are relentless, victims are targeted, and the damage toll is rising We are in an era of continuous breaches Near Daily Leaks of Sensitive Data 40% increase in reported data breaches and incidents Relentless Use of Multiple Methods 500,000,000+ records were leaked, while the future shows no sign of change 2011 2012 2013 Attack types SQL injection Spear phishing DDoS Third-party software Physical access Malware XSS Watering hole Undisclosed Source: IBM X-Force Threat Intelligence Quarterly 1Q 2014 Note: Size of circle estimates relative impact of incident in terms of cost to business.

Four truths about advanced threat protection Despite increasing challenges, organizations can protect themselves by adopting the right strategy 1 Prevention is mandatory Traditional methods of prevention have often failed, leaving many to believe detection is the only way forward. This is a dangerous proposition. 2 Security Intelligence is the underpinning Specialized knowledge in one domain is not enough. It takes enterprise-wide visibility and maximum use of data to stop today s threats. 3 Integration enables protection 4 Openness must be embraced The best defense is relentless improvement. Technologies must seamlessly integrate with processes and people across the entire lifecycle of attacks. Security teams need the ability to share context and invoke actions between communities of interest and numerous new and existing security investments.

Introducing the IBM Threat Protection System A dynamic, integrated system to disrupt the lifecycle of advanced attacks and help prevent loss Made possible by the following: Accelerated Roadmap Significant investment across 10 development labs to fast-track advanced threat protection offerings Unique Integrations Strategic focus on connecting IBM products to streamline intelligence sharing and take action New Partnerships Coordinated outreach across the industry to bring together interoperable products for our customers

IBM is uniquely positioned to offer integrated protection Smarter Prevention Security Intelligence Continuous Response Trusteer Apex Endpoint Malware Protection Java Lockdown Protection - granular control of untrusted code, cloud-based file inspection, and QRadar integration IBM Security Network Protection XGS Advanced Threat Quarantine integration from QRadar and third-party products, inclusion of Trusteer intelligence into XGS IBM Security QRadar Security Intelligence Data Node appliance, new flow and event APIs, and vulnerability management improvements Threat Monitoring and Intelligence Services Managed SIEM enhancements, new cyber threat intelligence IBM Security QRadar Incident Forensics Integrated forensics module with full packet search and visual reconstruction of threat actor relationships IBM Emergency Response Services Increased global coverage and expertise related to malware analysis and forensics Open Integrations Global Threat Intelligence Ready for IBM Security Intelligence Ecosystem New functionality from partners including FireEye, TrendMicro, Damballa and other protection vendors IBM X-Force Threat Intelligence New virtual real-time sharing of Trusteer threat intelligence from 100M+ endpoints with X-Force

Leverage threat intelligence with product integrations that draw upon human and machine-generated information Global Threat Intelligence Combines the renowned expertise of X-Force with Trusteer malware research Catalog of 70K+ vulnerabilities, 22B+ web pages, and data from 100M+ endpointsreal-time sharing of Intelligence databases dynamically updated on a minute-by-minute basis Trusteer intelligence Zero-day Research Malware Analysis Exploit Triage IP/Domain Reputation URL/Web Filtering Web App Control X-Force Intelligence Network