Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives.



Similar documents
Provide access control with innovative solutions from IBM.

Preemptive security solutions for healthcare

Strengthen security with intelligent identity and access management

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

IBM Tivoli Netcool network management solutions for enterprise

Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

IBM Security QRadar Risk Manager

White paper December Addressing single sign-on inside, outside, and between organizations

Security management solutions White paper. Extend business reach with a robust security infrastructure.

IBM Security QRadar Risk Manager

How To Protect Your Network From Attack From A Network Security Threat

IBM Security Privileged Identity Manager helps prevent insider threats

IBM Tivoli Netcool network management solutions for SMB

Life insurance policy administration: Operate efficiently and capitalize on emerging opportunities.

Strategies for assessing cloud security

Implement a unified approach to service quality management.

The IBM Solution Architecture for Energy and Utilities Framework

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.

Business resilience: The best defense is a good offense

Gain a competitive edge through optimized B2B file transfer

Extend the value of your service desk and integrate ITIL processes with IBM Tivoli Change and Configuration Management Database.

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

The Benefits of an Integrated Approach to Security in the Cloud

IBM Global Business Services Microsoft Dynamics AX solutions from IBM

Tapping the benefits of business analytics and optimization

Service assurance for communications service providers White paper. Improve service quality and enhance the customer experience.

Address IT costs and streamline operations with IBM service request and asset management solutions.

Establishing a business performance management ecosystem.

ROUTES TO VALUE. Business Service Management: How fast can you get there?

Enhance visibility into and control over software projects IBM Rational change and release management software

Software asset management White paper. Improving IT service delivery through an integrated approach to software asset management.

CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes.

Breaking down silos of protection: An integrated approach to managing application security

White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK. By James Christiansen, VP, Information Risk Management

Information technology infrastructure key to your business success.

IBM Security QRadar Vulnerability Manager

Optimizing government and insurance claims management with IBM Case Manager

Modernizing enterprise application development with integrated change, build and release management.

Use product solutions from IBM Tivoli software to align with the best practices of the Information Technology Infrastructure Library (ITIL).

Safeguarding the cloud with IBM Dynamic Cloud Security

Supporting information technology risk management

SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM

White Paper Achieving HIPAA Compliance through Security Information Management. White Paper / HIPAA

IBM Software Cloud service delivery and management

Services for the CFO Financial Management Consulting

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

IBM Global Small and Medium Business. Keep Your IT Infrastructure and Assets Secure

How can Identity and Access Management help me to improve compliance and drive business performance?

Data Center Solutions

Accelerate Your Enterprise Private Cloud Initiative

How To Use Ibm Tivoli Monitoring Software

IBM Sales and Distribution IBM and Manhattan Associates

Boosting enterprise security with integrated log management

System Security and Auditing for IBM i

Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities.

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES

Payment Card Industry Data Security Standard

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Add the compliance and discovery benefits of records management to your business solutions. IBM Information Management software

Cyber Governance Preparing for the Inevitable Perimeter Breach

IBM Service Management solutions White paper. Make ITIL actionable with Tivoli software.

Extreme Networks Security Analytics G2 Risk Manager

IBM Rational AppScan: Application security and risk management

Address IT costs and streamline operations with IBM service desk and asset management.

Beyond converged networks: driving user productivity through unified communications and collaboration.

IBM asset management solutions White paper. Using IBM Maximo Asset Management to manage all assets for hospitals and healthcare organizations.

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

IBM Tivoli Service Request Manager

White paper December IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

Software development for the on demand enterprise. Building your business with the IBM Software Development Platform

IBM System x and VMware solutions

IBM Tivoli Asset Management for IT

Networking for cloud computing

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

Zend and IBM: Bringing the power of PHP applications to the enterprise

Managed Services For Business FAQ Blue Saffron IT Resource Management

Simply Sophisticated. Information Security and Compliance

The Smart Archive strategy from IBM

Proven LANDesk Solutions

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

50x Zettabytes*

Make better underwriting decisions and help reduce loss ratios with efficient, streamlined processes.

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

Risk-based solutions for managing application security

Smart Data Center Solutions

IBM Executive Point of View: Transform your business with IBM Cloud Applications

Agile enterprise content management and the IBM Information Agenda.

Applying IBM Security solutions to the NIST Cybersecurity Framework

Four keys to effectively monitor and control secure file transfer

Transcription:

Security solutions To support your business objectives Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives.

For an On Demand Business, security is not an option it s a requirement IBM helps companies of all sizes, in all industries combine new technologies and business models to unleash new capabilities and customer experiences. Your customers and business partners demand these changes. The chance to streamline operations and capitalize on new revenuegenerating opportunities makes business transformation exciting and rewarding. An On Demand Business is an enterprise whose business processes integrated end to end across the company with key business partners, suppliers and customers can respond securely with flexibility and speed to any customer demand, market opportunity or external threat. To help maximize its business resilience and security the ability to rapidly adapt and respond to opportunities, regulations and risks an On Demand Business: Maintains secure, continuous business operations. Acts as a highly trusted business partner. Enables its own growth. Security is crucial to an On Demand Business. Making applications and data available to business partners and customers creates risks and increases responsibilities to protect sensitive information across your enterprise. Furthermore, providing the right access levels to the right people while maximizing business continuity despite the threats is a primary goal. To be more productive and to concentrate on your business priorities, it s important to help free your users from downtime and your valuable IT staff from repetitive monitoring and security administration tasks. That s why companies just like yours turn to IBM for a wide range of integrated security solutions hardware, software and services that help you: Drive business agility. Integrate processes and information. Enable people and technology to concentrate on key business objectives. With IBM security solutions, you can leverage existing assets to help create a proactive, self-protecting on demand operating environment that addresses your immediate business goals and can help you achieve additional On Demand Business objectives later. For IBM and its customers, security isn t an option it s embedded in virtually everything we do. 2

In security, the best defense is a good offense, and the more proactive you can be, the more secure you will be. * Vic Wheatman, Gartner Inc. An On Demand Business thinks of security differently because its perspective is focused squarely on achieving its business priorities now and in the future. For the On Demand Business, security: A new definition of security for the On Demand Business era The demands and opportunities that drive On Demand Business initiatives force companies to reconsider the relationship between business and IT. Similarly, the challenges and rewards of security for the On Demand Business lead companies away from an outdated definition of security that was rooted in silos. Generally, data security, network security and security policies each used to be administered separately. Application-level security was hard-coded into and optimized for specific applications on an individual basis. IT security was handled separately from physical security. And each one of these silos was managed with the help of a different vendor or proprietary solution. Represents not a cost but an investment in growth because it can strengthen key relationships and optimize productivity. Employs an enterprise-level view of managing resources formerly in silos to help maximize efficiency and consistency. Operates in a proactive, self-protecting fashion to help minimize the frequency, impact and resolution times of security events. Is designed to assess and address the greatest risks first to help minimize loss and liability. Aligns with business priorities to enable the right business systems, people and devices to help securely engage in On Demand Business processes and procedures. In other words, as a company becomes an On Demand Business, it should spend less time and money on security administration, reacting to threats after damage occurs, and audit requests. Instead, an On Demand Business should deploy automated, integrated security solutions to enable people, processes and technology to work together and advance the company s business objectives. The information held within the UPS enterprise is of extraordinary value. We depend upon IBM to provide secure, automated and policy-based security solutions for our enterprise. Jim Flynn, Information Security Systems Manager, United Parcel Service 3

IBM security solutions can help your business achieve the following goals: Respond to changing business needs with agility Support growth, change and consolidation initiatives Accommodate applications as they change and facilities as they move Integrate with business partners, customers and acquired companies and rapidly determine which parties have access to which resources Protect your reputation and enhance trust in your brand Safeguard data privacy and integrity to minimize intellectual property loss and damage to business relationships Maximize secure transactions and continuity of business operations to earn the confidence of your customers and partners Optimize operational efficiency Simplify and coordinate identity management to help end users collaborate and be highly productive Leverage centralized views of security status, tools that facilitate administrative best practices and self-protecting, autonomic capabilities to enable skilled IT staff to focus on high-value tasks Gain a company-wide view of risks to contain costs Identify the exposures to loss and liability that have the greatest potential business impact dollar loss, downtime, contract penalties, compliance with regulations or other business policies and address them first Sense when internal and external changes impact enterprise-wide risks and respond accordingly Protect your systems and networks from threats, not only by sensing threats before they happen, but also through integrated, closed-loop responses across your IT infrastructure Identify and maintain security compliance Facilitate comprehensive, simplified management of risk, regulatory compliance and business controls Provide a centralized policy auditing mechanism while helping to minimize staff and compliance costs 4

Security for the On Demand Business delivers extensive benefits IBM s wide range of security-enabled products hardware and software and security service capabilities are helping companies just like yours. The first step is to identify the type of security solution that can have the greatest business impact. That can mean minimizing your largest security risks or facilitating your biggest business opportunity. The following section helps you start to identify the security elements on which your organization can concentrate, based on the nature of threats and the damage they can do to your business. Elements that provide security to an On Demand Business Security needs typically vary based on the nature of the organization s business. How extensive is its Web presence? What level of protection does it require as it extends its business processes to consumers or partners? Even the number and variety of an organization s resources can make basic operational security mean something different. Because IBM recognizes that your approach to security should reflect the specific priorities of your business, IBM provides a number of different entry points you can use for the security of your On Demand Business: Business controls, risk management and security governance Identity and access control Security management Data protection and disclosure control Secure systems and networks Secure transactions A typical security infrastructure suitable for an On Demand Business consists of a mechanism to drive your security policies and management with business controls, risk management and security governance; a central view from which to manage, monitor and audit IT security; a strategy to manage identities, protect data and secure transactions; and a foundation of security-rich systems and networks. Business controls, risk management and security governance: policies and objectives designed to enable a business to drive its business objectives into IT security processes through an integrated, umbrella IT security management system. Security management, monitoring and auditing: enabling proactive sense and response to vulnerabilities, threat events, forensic analysis of security breaches that do occur and auditing for regulatory compliance and other business purposes. IBM experts can perform a company-wide security assessment to help you prioritize your risk situations and business opportunities. 5

Each security element depends on successfully integrating with your existing IT infrastructure making IBM s breadth and experience incredibly valuable for your security initiatives. Identity and access control: central management of the life cycle of identities (from provisioning to updates to deletion) and application of access policies to those identities all in alignment with business priorities. Data protection and disclosure control: policy-based processes and capabilities within the computing infrastructure to control who can access particular data and for what reason. Secure transactions: leveraging the identity infrastructure and access control policies to achieve an appropriate level of confidentiality, integrity and authenticity for every level of transaction, from interdepartmental connections to exchanges with institutions outside the enterprise. Secure systems and networks: enterprise IT systems and networks with embedded security capabilities required for an end-to-end solution. Any of these elements or some combination of them can serve as a starting place for your security initiatives in support of your On Demand Business objectives. Leverage the breadth of IBM security expertise and solutions To help you understand and address security challenges for an On Demand Business, IBM offers an extensive portfolio of security solutions: General and industry-specific business processes and infrastructure services to help you assess, plan, implement and manage secure infrastructures. Security-enabled software, including risk management, policy and compliance software for integrated management. Security-rich hardware platforms. A growing list of government security evaluations. Integration with a strong business partner ecosystem. This section enables you to learn more about the components of the IBM solutions and the security value you can achieve by deploying them. Services, flexible payment and delivery With solutions ranging from assessments and design to implementation and management services and the ability to deliver industry-specific security solutions such as identity management, data integrity, threat management and security governance IBM Global Services has the skills and expertise to assist enterprises making the shift from traditional security to security for the on demand world. Services include analysis to pinpoint greatest risks of business damage; planning to focus on the logical next steps for people, process and technology that can have the greatest benefit; implementing integrated, closed-loop solutions to close gaps; managed services options; and auditing and continual improvement. These services seek to both protect business value from threats and enhance flexibility to take advantage of business opportunities. 6

Security-enabled software IBM software offers a strong security management portfolio that you can use to provide proactive, integrated security management in your business, including security event management, security policy and compliance management, identity management and remediation. Additionally, IBM software provides security-rich solutions that help you: Integrate data and content. Optimize collaboration and human interaction. Develop software and systems. Manage and integrate transactions. IBM routinely submits products hardware and software for third-party security validation with existing and emerging standards. Security-rich hardware From personal computers with IBM ThinkVantage technology to IBM ~ offerings (and the operating systems that run on them), IBM hardware includes an array of security capabilities you can use to: Facilitate identity authentication, including single sign-on. Maximize data security, both in storage and in transit. Enforce and refine security policy. Identify and dynamically recover from intrusion and data corruption. Security-rich networks Capitalize on the IBM partnership with Cisco to achieve a highly secure network as well. Because IBM and Cisco integrate security solutions from their respective portfolios, you can build a network that protects the enterprise from unwanted users and noncompliant devices in alignment with robust security policies. Take advantage of Cisco end-point security capabilities for intrusion prevention and secure connection. Partner ecosystem The security of your On Demand Business can depend not just on your IBM security solutions but also on a wide range of products, services and technologies throughout your enterprise. With IBM security solutions, you can integrate your current security infrastructure with security elements that enable you to deliver end-to-end security value. IBM solutions: Rely on open standards to interact seamlessly with other vendor solutions. Enable your systems integrators to smoothly incorporate IBM solutions into their environments. Facilitate centralized management of solutions across your enterprise. 7

Integrate IT security with your enterprise The bottom-line and brand-image impact of IT security have gained the attention of those at the highest corporate levels. But IT security alone does not fully address the security needs of an On Demand Business. In fact, integrating physical security (badges and readers, video surveillance, biometrics and more) with the supporting computing infrastructure (servers, connectivity and support staff) can enable you to realize tremendous economic efficiencies. Furthermore, when you develop and enforce security access policies that address both IT and the physical world, you can maximize the overall effectiveness of your security implementation. For more information To learn more about IBM security solutions and integrated solutions from IBM, contact your IBM sales representative or visit ibm.com/security Copyright IBM Corporation 2004 IBM Corporation Software Group Route 100 Somers, NY 10589 U.S.A. Produced in the United States of America 10-04 All Rights Reserved ~, IBM, the IBM logo, the On Demand Business logo and ThinkVantage are trademarks of International Business Machines Corporation in the United States, other countries or both. Other company, product and service names may be trademarks or service marks of others. For more information on security evaluations for IBM products, see ibm.com/security/standards/st_evaluations.shtml The IBM home page on the Internet can be found at ibm.com * Source: Gartner Inc. The Future of Enterprise Security. September 2004. In short, the scope of today s security challenges and opportunities continues to grow. To implement a security solution that can contribute to the success of your On Demand Business initiatives, find a business partner with the experience you can rely on when you protect your mission-critical systems. Turn to a business partner with a broad range of integrated hardware, software and services to address your immediate security needs and to position you for those that you tackle in the future. Choose IBM security solutions. G507-1094-00