Mobile, Cloud, Advanced Threats: A Unified Approach to Security



Similar documents
IBM QRadar Security Intelligence April 2013

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Addressing Security for Hybrid Cloud

Security Intelligence

Powering Security and Easy Authentication in a Multi-Channel World

Safeguarding the cloud with IBM Dynamic Cloud Security

IBM Advanced Threat Protection Solution

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

The Current State of Cyber Security

Strengthen security with intelligent identity and access management

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

IBM Security Intelligence Strategy

Data Security: Fight Insider Threats & Protect Your Sensitive Data

Ahead of the threat with Security Intelligence

Under the Hood of the IBM Threat Protection System

Mobile Security. Luther Knight Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015.

IBM Security X-Force Threat Intelligence

How to Choose the Right Security Information and Event Management (SIEM) Solution

IBM Security Framework

The webinar will begin shortly

and Security in the Era of Cloud

Cloud Security. Vaughan Harper IBM Security Architect

Security strategies to stay off the Børsen front page

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Application Security from IBM Karl Snider, Market Segment Manager March 2012

IBM Security Strategy

Introducing IBM s Advanced Threat Protection Platform

Security of Cloud Computing for the Power Grid

Breaking down silos of protection: An integrated approach to managing application security

BigData Analytics per la sicurezza delle Infrastrutture Critiche

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Protecting against cyber threats and security breaches

IBM Security IBM Corporation IBM Corporation

Risk-based solutions for managing application security

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

IBM Security QRadar Risk Manager

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Society Protection Best Practices from Industry

IBM Security Privileged Identity Manager helps prevent insider threats

What is Security Intelligence?

IBM Security Intrusion Prevention Solutions

Applying IBM Security solutions to the NIST Cybersecurity Framework

Safeguarding the cloud with IBM Security solutions

Q1 Labs Corporate Overview

Security Intelligence Solutions

Let s talk about assets in QRadar

IBM SECURITY QRADAR INCIDENT FORENSICS

IBM Security QRadar Vulnerability Manager

IBM Security Briefing: Differentiators & Maturity Model

Leverage security intelligence for retail organizations

The Benefits of an Integrated Approach to Security in the Cloud

IBM Security QRadar Vulnerability Manager Version User Guide

IBM Security QRadar Risk Manager

IBM & Security Gov. Point Of Views

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Securing the mobile enterprise with IBM Security solutions

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Stay ahead of insiderthreats with predictive,intelligent security

IBM X-Force 2012 Cyber Security Threat Landscape

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

IBM Security QRadar SIEM Version MR1. Vulnerability Assessment Configuration Guide

IBM Security Access Manager for Web

AMPLIFYING SECURITY INTELLIGENCE

Effectively Using Security Intelligence to Detect Threats and Exceed Compliance

Securing the Cloud: Making Cloud an Opportunity to Enhance Security

IBM X-Force 2012 Cyber Security Threat Landscape

INFORMATION PROTECTION

IBM Tivoli Federated Identity Manager

How To Protect Data From Attack On A Computer System

Healthcare: La sicurezza nel Cloud October 18, IBM Corporation

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

IBM Security QRadar SIEM Product Overview

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

Security for a Smarter Planet IBM Corporation All Rights Reserved.

IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence

Tivoli Automation for Proactive Integrated Service Management

IBM Security. Managed Security Services. SOC Poland / GSOC. Damian Staroscic Security Operations Center (SOC) Manager.

Introduction to PCI DSS

Boosting enterprise security with integrated log management

8 Steps to Holistic Database Security

Improve your mobile application security with IBM Worklight

Consolidated security management for mainframe clouds

IBM Security QRadar QFlow Collector appliances for security intelligence

IBM Security re-defines enterprise endpoint protection against advanced malware

Simplify security management in the cloud

IBM United States Software Announcement , dated February 3, 2015

L evoluzione del Security Operation Center tra Threat Detection e Incident Response & Management

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Securing and protecting the organization s most sensitive data

IBM QRadar Security Intelligence Platform appliances

QRadar SIEM 7.2 Windows Event Collection Overview

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

Network Segmentation

IBM Security QRadar Version Vulnerability Assessment Configuration Guide IBM

Reducing the cost and complexity of endpoint management

Transcription:

Mobile, Cloud, Advanced Threats: A Unified Approach to Security David Druker, Ph.D. Senior Security Solution Architect IBM 1

Business Security for Business 2

Common Business Functions Manufacturing or some other type of production Sales & distribution, both retail and through channels Marketing Management and administration Finance, accounting and legal Human Resources Information Technology (IT) How Much Security? 3

4

IBM Security Framework 5

Infrastructure Description Network Servers Endpoints (clients) Security Load balancing Firewall Intrusion Prevention Network Endpoints Endpoint management 6

People Description Employees Contractors & partners Customers Customers of partners Security Identity management Role management User provisioning Privileged identity management Governance Entitlements AAA Authentication Authorization Auditing Identity federation Single sign-on 7

Applications Description System apps Traditional Web apps Web 2.0 apps Security Discovery Scanning & pentesting Static Dynamic Vulnerability analysis Runtime enforcement of entitlements 8

Data Description SQL databases Non-relational databases Big data stores Unstructured data Security Discovery Data classification Vulnerability analysis Activity monitoring Data masking Encryption management 9

Security Intelligence and Analytics Description Information & insight from all security data Mathematical analyses of all relevant data Security Security Information and Event Management Network flow analysis Vulnerability scanning Event correlation Attack identification Anomaly Detection 10

Interrelated Technology Domains & Unpredictable Attack Paths People Employees Consultants Hackers Terrorists Outsourcers Customers Suppliers Data Structured Unstructured At rest In motion Applications Systems Applications Web Applications Web 2.0 Mobile Applications Infrastructure Datacenters PCs Laptops Mobile Cloud Non-traditional require unified security approaches. 11

Unified (Integrated) Security Other internal and external data sources 12

How Much Security: Security Maturity Model Security Intelligence: Flow analytics / predictive analytics Security information and event management Log management Optimized Identity governance Fine-grained entitlements Privileged user management Data flow analytics Data governance Encryption key management Fraud detection Vulnerability correlation Hybrid scanning Multi-faceted network protection Anomaly detection Hardened systems Proficient User provisioning Access management Strong authentication Data masking / redaction Database activity monitoring Data loss prevention Web application protection Source code scanning Virtualization security Asset management Endpoint / network security management Basic Directory management Encryption Database access control Application scanning Perimeter security Anti-virus People Data Applications Infrastructure 13

Trends Driving Security Innovation Advanced Threats Sophisticated, targeted attacks designed to gain continuous access to critical information are increasing in severity and occurrence Cloud Computing Cloud security is a key concern as customers rethink how IT resources are designed, deployed and consumed Advanced Persistent Threats Stealth Bots Targeted Attacks Designer Malware Zero-days Mobile Computing Securing employee-owned devices and connectivity to corporate applications are top of mind as CIOs broaden support for mobility Enterprise Customers Regulation and Compliance Regulatory and compliance pressures are mounting as companies store more data and can become susceptible to audit failures 14

Cloud Computing & Mobile Devices New Requirements? 15

Infrastructure with Cloud and Mobile Description Network Servers Endpoints (clients) Cloud Mobile devices Security Load balancing Firewall Intrusion Prevention Network Endpoints Endpoint management Hypervisor protection Mobile connection security Mobile device management 16

People with Cloud and Mobile Description Employees Contractors & partners Customers Customers of partners Cloud & Mobile users 17 Security Identity management Role management User provisioning Privileged ID management Governance Entitlements AAA at runtime Authentication Authorization Auditing Identity federation Single sign-on Context-based authentication & authorization

Applications with Cloud and Mobile Description System apps Traditional Web apps Web 2.0 apps Public & private cloud apps Mobile apps 18 Security Discovery Scanning & pentesting Static Dynamic Vulnerability analysis Runtime enforcement of entitlements Cloud app discovery Mobile app scanning Mobile app secure containers Mobile app registration

Data with Cloud and Mobile Description SQL databases Non-relational databases Big data stores Unstructured data Data in clouds and across clouds Data in compromised mobile devices Security Discovery Data classification Vulnerability analysis Activity monitoring Data masking Encryption management Cloud DB activity monitoring Secure mobile data design 19

Security Intelligence and Analytics with Cloud and Mobile Description Information & insight from all security data Mathematical analyses of all relevant data Separate and combine cloud instance data Identify attacks against mobile infrastructure 20 Security Security Information and Event Management Network flow analysis Vulnerability scanning Event correlation Attack identification Anomaly Detection Collect data from elastic cloud infrastructure Identify mobile attacks

Resources ibm.com/security Security Architecture Using the IBM Security Framework and IBM Security Blueprint to Realize Business- Driven Security, IBM Redbook Open Enterprise Security Architecture, The Open Group IBM Institute for Advanced Security IBM Security YouTube Channel IBM X-Force IBM Cloud Security IBM Mobile Security IBM Managed Security Services IBM Security Intelligence with Big Data IBM MobileFirst Security IBM developerworks Security 21

Resources & Backup Slides 22

23

24

25

26

27

28

29

30

31

32

Security Intelligence Database Monitor Browser SSO Proxy Network IPS Web App Database DB Console Endpoint Manager Vulnerability Scanner 33

Security Intelligence Database Monitor Browser SSO Proxy Network IPS Web App Database DB Console Endpoint Manager Vulnerability Scanner 34

IBM QRadar IBM Guardium Browser IBM Security Web Gateway IBM Network IPS Web App Database DB Console 35 IBM Endpoint Manager IBM AppScan Enterprise

Private Cloud IBM QRadar IBM Guardium Security Mgmt Cloud Instance IBM Endpt Mgr IBM AppScan Ent Mobile Device Browser Cloud DMZ IBM Access Manager Security Web Gateway IBM Network IPS Web App EPM Agent Compute Cloud Instance Database Guardium S-TAP 36 DB Console

Systems Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. ibm.com/security Copyright IBM Corporation 2013. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United 37 States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.