IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence

Similar documents
IBM QRadar Security Intelligence April 2013

IBM Security Intelligence Strategy

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Security strategies to stay off the Børsen front page

The webinar will begin shortly

IBM Security QRadar SIEM Product Overview

IBM Security IBM Corporation IBM Corporation

How to Choose the Right Security Information and Event Management (SIEM) Solution

IBM Security QRadar QFlow Collector appliances for security intelligence

Security Intelligence

IBM SECURITY QRADAR INCIDENT FORENSICS

Effectively Using Security Intelligence to Detect Threats and Exceed Compliance

Under the Hood of the IBM Threat Protection System

IBM Security QRadar Risk Manager

IBM Security QRadar Risk Manager

Introducing IBM s Advanced Threat Protection Platform

The Current State of Cyber Security

IBM QRadar Security Intelligence Platform appliances

AMPLIFYING SECURITY INTELLIGENCE

Strengthen security with intelligent identity and access management

Data Security: Fight Insider Threats & Protect Your Sensitive Data

and Security in the Era of Cloud

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

The Value of QRadar QFlow and QRadar VFlow for Security Intelligence

Safeguarding the cloud with IBM Dynamic Cloud Security

QRadar SIEM and Zscaler Nanolog Streaming Service

Boosting enterprise security with integrated log management

Leverage security intelligence for retail organizations

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

Addressing Security for Hybrid Cloud

IBM Security Intrusion Prevention Solutions

Protecting against cyber threats and security breaches

IBM Security QRadar Vulnerability Manager

IBM Security X-Force Threat Intelligence

Q1 Labs Corporate Overview

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

IBM Advanced Threat Protection Solution

Let s talk about assets in QRadar

QRadar SIEM and FireEye MPS Integration

QRadar SIEM 7.2 Flows Overview

Security Intelligence Solutions

IBM Security. Managed Security Services. SOC Poland / GSOC. Damian Staroscic Security Operations Center (SOC) Manager.

Introduction to PCI DSS

True in Depth Security through Next Generation SIEM. Ray Menard Senior Principal Security Consultant Q1 Labs

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

What is Security Intelligence?

Application Security from IBM Karl Snider, Market Segment Manager March 2012

Cloud Security. Vaughan Harper IBM Security Architect

IBM Security Systems Support

Breaking down silos of protection: An integrated approach to managing application security

Security for a Smarter Planet IBM Corporation All Rights Reserved.

IBM Security QRadar Vulnerability Manager Version User Guide

Applying IBM Security solutions to the NIST Cybersecurity Framework

Mobile Security. Luther Knight Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015.

Risk-based solutions for managing application security

L evoluzione del Security Operation Center tra Threat Detection e Incident Response & Management

IBM Security re-defines enterprise endpoint protection against advanced malware

Win the race against time to stay ahead of cybercriminals

IBM QRadar as a Service

QRadar Security Management Appliances

Extending security intelligence with big data solutions

IBM Security Privileged Identity Manager helps prevent insider threats

Log management & SIEM: QRadar Security Intelligence Platform

Tivoli Automation for Proactive Integrated Service Management

Five Ways to Use Security Intelligence to Pass Your HIPAA Audit

Three significant risks of FTP use and how to overcome them

IBM Security Network Protection

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Extreme Networks Security Hardware Guide

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

QRadar Security Intelligence Platform Appliances

Information Technology Policy

How To Buy Nitro Security

Securing and protecting the organization s most sensitive data

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

IBM Security Framework

QRadar SIEM 7.2 Windows Event Collection Overview

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

Extreme Networks Security Analytics G2 Risk Manager

Reducing the cost and complexity of endpoint management

IBM Security QRadar SIEM Version MR1. Vulnerability Assessment Configuration Guide

Managing security risks and vulnerabilities

PCI DSS Top 10 Reports March 2011

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

White Paper: Meeting and Exceeding GSI/GCSx Information Security Monitoring Requirements

Simplify security management in the cloud

IBM Security Briefing: Differentiators & Maturity Model

Transcription:

IBM Security Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence Peter Kurfürst Vertrieb IBM Security Lösungen Enterprise-Kunden Baden-Württemberg und Bayern Juli 2015

Es ist keine Frage ob, sondern vielmehr wann und mit welcher Energie ein Unternehmen angegriffen wird. Reinhard Vesper, Abteilung Spionageabwehr, Verfassungsschutz NRW 2

63% der Betroffnen von Angriffen wurden von externen Organsiationen auf einen Einbruch in das Netzwerk aufmerksam gemacht. Anzahl an Tagen, die ein Angreifer im Netzwerk seines Opfers verbringt, bis der Angreifer erkannt wurde. 243 3

50% von befragten Unternehmen fühlen sich nicht sicher in ihrem bestehenden Sicherheitsumfeld. Ponemon Institute 2014 Global Cost of Data Breach Study Sponsored by IBM 4

5

Prevent. Detect. Respond. Quelle: Verizon DBIR 2013 Report 6

7

8

Alle Risiken im Blick Was sind die externen und internen Bedrohungen? Sind wir vor diesen Bedrohungen geschützt? Was passiert jetzt gerade? Was sind die Auswirkungen? Risk Management. Vulnerability Management. Configuration and Patch Management. X-Force Research and Threat Intelligence. Compliance Management. Reporting and Scorecards. Network and Host Intrusion Prevention. Network Anomaly Detection. Packet Forensics. Database Activity Monitoring. Data Leak Prevention. Security Information and Event Management. Log Management. Incident Response. 9

Kumulierte und intelligente Security Alerts Security devices Servers and mainframes Network and virtual activity Data activity Automated Offense Identification Unlimited data collection, storage and analysis Built in data classification Offenses Suspected Incidents Application activity Automatic asset, service and user discovery and profiling Configuration information Real-time correlation and threat intelligence Vulnerabilities and threats Activity baselining and anomaly detection Users and identities Detects incidents of the box Embedded Intelligence Global threat intelligence 10

Übersicht der Lösungskomponenten Portfolio Overview QRadar SIEM QRadar Risk Manager QRadar Log Manager Network Activity Collectors (QFlow / VFlow) Vulnerability Manager QRadar Incident Forensics 11

Eine integrierte Architektur Log Management Security Intelligence Network Activity Monitoring Risk Management Vulnerability Management Network Forensics 12

Use Cases

Erkennung von Bedrohungen Potential Botnet detected This is as far as traditional SIEM can go IRC on port 80 IBM Security QRadar QFlow detects a covert channel Irrefutable Botnet communication Layer 7 flow data contains botnet command control instructions Application layer flow analysis kann echte Bedrohungen erkennen 14

Einhaltung von Richtlinien PCI compliance at risk? Real-time detection of possible violation Unencrypted traffic IBM Security QRadar QFlow saw a cleartext service running on the accounting server PCI Requirement 4 states: Encrypt transmission of cardholder data across open, public networks Compliance Simplified 15

Erkennung von internen Bedrohungen Potential data loss Who? What? Where? Who? An internal user What? Oracle data Where? Gmail 16

Hoher Automatisierungsgrad für eine einfache Inbetriebnahme Simplified deployment Automated configuration of log data sources and asset database Immediate discovery of network assets Proactive vulnerability scans, configuration comparisons, and policy compliance checks Automated updates Stay current with latest threats, vulnerabilities, and protocols Out-of-the-box rules and reports Reduce incident investigations and meet compliance mandates 17

IBM QRadar Security Intelligence ist führend Leader in the Gartner Magic Quadrant since 2009 Security Information and Event Management (SIEM) IBM QRadar rated #1 by Gartner in 2014 in the following categories: Ability to execute Analytics and behavior profiling Compliance use cases SIEM use case, product rating, and overall use case 18

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. THANK YOU www.ibm.com/security Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.