and Security in the Era of Cloud



Similar documents
The Current State of Cyber Security

Security Intelligence

The webinar will begin shortly

IBM Security Intelligence Strategy

Cloud Security. Vaughan Harper IBM Security Architect

Addressing Security for Hybrid Cloud

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

Staying Ahead of the Cyber Security Game. Nigel Tan ASEAN Technical Leader IBM Security

IBM QRadar Security Intelligence April 2013

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

Under the Hood of the IBM Threat Protection System

Security strategies to stay off the Børsen front page

How to Choose the Right Security Information and Event Management (SIEM) Solution

Do not forget the basics!!!!!

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

IBM MobileFirst Build a mobile enterprise agenda

Data Security: Fight Insider Threats & Protect Your Sensitive Data

Security for a Smarter Planet IBM Corporation All Rights Reserved.

IBM Security X-Force Threat Intelligence

Mobile Security. Luther Knight Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015.

Protecting against cyber threats and security breaches

Society Protection Best Practices from Industry

Strengthen security with intelligent identity and access management

IBM SECURITY QRADAR INCIDENT FORENSICS

Safeguarding the cloud with IBM Dynamic Cloud Security

BigData Analytics per la sicurezza delle Infrastrutture Critiche

Securing the Cloud: Making Cloud an Opportunity to Enhance Security

IBM Security re-defines enterprise endpoint protection against advanced malware

IBM Security QRadar Risk Manager

IBM X-Force 2012 Cyber Security Threat Landscape

Introducing IBM s Advanced Threat Protection Platform

IBM Advanced Threat Protection Solution

IBM Security QRadar Risk Manager

IBM Security QRadar Vulnerability Manager

IBM Security. Managed Security Services. SOC Poland / GSOC. Damian Staroscic Security Operations Center (SOC) Manager.

AMPLIFYING SECURITY INTELLIGENCE

Application Security from IBM Karl Snider, Market Segment Manager March 2012

Breaking down silos of protection: An integrated approach to managing application security

Security Intelligence Solutions

Selecting the right cybercrime-prevention solution

Cyber security - the business critical issues facing organisations

IBM Security Strategy

IBM Security IBM Corporation IBM Corporation

Applying IBM Security solutions to the NIST Cybersecurity Framework

Beyond passwords: Protect the mobile enterprise with smarter security solutions

IBM X-Force 2012 Cyber Security Threat Landscape

Risk-based solutions for managing application security

Securing the mobile enterprise with IBM Security solutions

IBM Security Privileged Identity Manager helps prevent insider threats

IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence

IBM Security Systems Trends and IBM Framework

Leverage security intelligence for retail organizations

Let s talk about assets in QRadar

IBM Security Intrusion Prevention Solutions

Reducing the cost and complexity of endpoint management

Gaining the upper hand in today s cyber security battle

Introduction to PCI DSS

Powering Security and Easy Authentication in a Multi-Channel World

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Streamlining Web and Security

10 Things Every Web Application Firewall Should Provide Share this ebook

L evoluzione del Security Operation Center tra Threat Detection e Incident Response & Management

Boosting enterprise security with integrated log management

Win the race against time to stay ahead of cybercriminals

IBM Security Framework

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

IBM Endpoint Manager Product Introduction and Overview

IBM & Security Gov. Point Of Views

Extending security intelligence with big data solutions

Some thoughts about cloud computing risks. Andris Soroka 28 th of January, 2015 Riga, Latvia

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

Effectively Using Security Intelligence to Detect Threats and Exceed Compliance

IBM Tivoli Federated Identity Manager

Commissioned Study. SURVEY: Web Threats Expose Businesses to Data Loss

IBM Security Systems Support

Q1 Labs Corporate Overview

What is Security Intelligence?

Create Extraordinary Online Consumer Experiences. Your Journey Begins with Nominum

Security of Cloud Computing for the Power Grid

How To Create An Insight Analysis For Cyber Security

ESG Brief. Overview by The Enterprise Strategy Group, Inc. All Rights Reserved.

Preemptive security solutions for healthcare

Cloud, Big Data, Mobile, Social and Security

Leveraging security from the cloud

Tivoli Automation for Proactive Integrated Service Management

IBM Security QRadar SIEM Product Overview

Safeguarding the cloud with IBM Security solutions

IBM Security QRadar QFlow Collector appliances for security intelligence

Managing security risks and vulnerabilities

Technology and Trends for Smarter Business Analytics

WEBSENSE TRITON SOLUTIONS

Concierge SIEM Reporting Overview

IBM Innovate AppScan: Introducin g Security, a first. Bobby Walters Consultant, ATSC bwalters@atsc.com Application Security & Compliance

IBM Kenexa Lead Manager can help you source top talent, build strong relationships and generate qualified applications

ADY-1727: IBM Watson Analytics and Cognos Business Intelligence for Line of Business Smart Data Discovery

Transcription:

Re-imagine i Enterprise Mobility and Security in the Era of Cloud Brendan Hannigan General Manager, IBM Security Systems

Leverage Cloud as a growth engine for business Exploit Mobile to build customer and employee engagement 91 % Of net new software in 2014 is built for cloud delivery 84 % Of CIOs rate mobility solutions as a critical area for investment to get closer to customers 2

Business Process as a Service Software as a Service Platform as a Service Infrastructure as a Service IBM Cloud Solutions Smarter Smarter Commerce Workforce Bluemix TM Big Data & Analytics Watson Solutions On Premises Cloud Infrastructure Smarter Cities Software Solutions GBS Cloud Business Solutions Cloud Managed Services Infrastructure Services 3

Build Protect Engage Transform IBM Mobile Capabilities Mobile App Development Platform Cloud Services Development and Integration Services Enterprise Mobility Management Software and Services Mobile Analytics Software Strategy and Design Services Strategy and Design Services Infrastructure Consulting Services 4

Yesterday s security does not work 5

Sophisticated attackers break through safeguards every day 2011 Year of the breach 2012 40% increase 2013 500,000,000+ records breached Attack types SQL injection Spear phishing DDoS Third-party software Physical access Malware XSS Watering hole Undisclosed $3.5M 61 % of organizations say 3.5M+ data theft and cybercrime average cost are their greatest threats of a data breach 6 IBM X-Force Threat Intelligence Quarterly 1Q 2014, circle size estimates relative cost to business 2012 IBM Global Reputational Risk & IT Study 2014 Cost of Data Breach, Ponemon Institute

85 security tools from 45 vendors IBM client example IBM client example 7

Cloud and mobile: risk or opportunity? 8

Cloud and mobile raise security concerns 70 % 614 % of security executives have cloud and mobile concerns Top 3: Data, access, and auditing Mobile malware growth in just one year 2013 IBM CISO Survey 2012-2013 Juniper Mobile Threat Report 9

1 Cloud is an opportunity for enhanced security IaaS PaaS SaaS Maintain cloud visibility and control Leverage crowd sourced threat intelligence Use secure cloud infrastructure and services 10

Employ cloud to improve security with IBM solutions IaaS PaaS SaaS Maintain cloud Leverage crowd sourced Use secure cloud visibility and control threat intelligence infrastructure and services Streamlined number of user A global electronics firm helps protect access to cloud-based applications for 10K employees IBM Security Access Manager An international bank reduced phishing attacks by 90% and phone fraud to almost $0 IBM Trusteer Fraud Protection accounts with cloud-delivered identity and access management for 8.5M automobile customers and employees IBM Lighthouse Gateway 11

2 Build security into mobile deployments from day one Personal DATA Enterprise Security Intelligence Transaction Security Application Security Content Security Device Security Enterprise Applications and Cloud Services Identity, Fraud, and Data Protection Device Security Content Security Application Security Transaction Security IBM Security Solutions IBM MaaS360 IBM MobileFirst Platform (includes Worklight) IBM Security AppScan IBM Tealeaf IBM Trusteer IBM Security Access Manager 12

Unlock mobile value with new security solutions Personal DATA Enterprise Security Intelligence Transaction Security Application Security Content Security Device Security Enterprise Applications and Cloud Services Identity, Fraud, and Data Protection Discovered and enrolled devices in the first 36,000 70,000000 + minutes with ability 60 to wipe the device if lost <500 Chemical company users migrated in the first month Help desk calls (<.5%) IBM Corporation 13

Sophisticated Attackers: traditional defense or a big data solution? 14

For sophisticated attacks, traditional defenses are not enough Users Easy Customer Accounts 15 Easy

Security is a big data and analytics problem Traditional Security Operations and Technology Logs Events Alerts 16 Big Data Analytics System audit trails External threat t feeds Configuration information Business process data Identity context Network flows and anomalies Malware information E-mail and social activity Full packet and DNS captures

3 Stop advanced threats with security intelligence Detect advanced threats with security intelligence Protect against fraud and targeted attacks Deploy integrated security 17

Threat Protection System: Integrated advanced threat defense Endpoint Protection Security Intelligence Incident Forensics Network Protection Emergency Response Services XGS Open Integrations Global Threat Intelligence 18

Helping clients stop advanced threats An International An International A Major Energy Firm Commodities Exchange Health Care Provider Analyzed Maintained system Monitors 2B uptimes of + events per day to find 99.9% + 25K endpoints with 0 and blocked 20-25 reported breaches potential offenses in 3 years in the first 6 months to investigate 200 + high risk infections 19

Leverage intelligence to help prevent fraud Comprehensive solution built upon real-time intelligence and adaptable protection Prevent Root Cause of Fraud Reduce Operational Impact Advanced Fraud Prevention Improve Your Customer Experience Utilize Real-time Intelligence Service 20

IBM Security Solutions 21

IBM Security Portfolio Consulting and Managed Services Integrated Security Technologies Security Intelligence and Operations Security Intelligence and Analytics Strategy, Risk and Compliance Cloud and Managed Services Advanced Fraud Protection Identity and Access Management Services Data and Application Security Services Cybersecurity Assessment and Response Identity and Access Management Data Security Application Security Infrastructure and Threat Protection Advanced Threat and Security Research Key Security Trends Advanced Threats Cloud Adoption Mobile Concerns Compliance Mandates Skills Shortage 22

1 2 3 Cloud is an opportunity for enhanced security Build security into mobile deployments from day one Stop advanced threats with security intelligence 23

IBM has global breadth and scale in Cloud, Mobile and Security Cloud Mobile Security 100 + SaaS offerings 1,500 cloud patents 40K + cloud experts 3,000 1,700 + mobile experts 18 security patents 25 MobileFirst studios global security labs 8 mobile acquisitions 15B+ security events monitored daily in 130 countries 24

Visit us at New Cloud Services and Apps in a Fraction of the Time Wednesday @ 10:15 am Dolphin, Southern 2 IBM Engagement Zone Dolphin Hotel Lobby Made With IBM Booth 10 Expo Join us at the IBM Cloud Café Yacht and Beach Club Schedule your own IBM-supported hackathon. Develop apps in the time it takes to order a latte. 25 #THINKTech

Learn more IBM Security IBM MobileFirst IBM Security Website IBM MobileFirst Website Watch our videos Download the IBV Mobile Study Read our blog Sign up for a free Mobile Agenda Workshop @ibmsecurity @ibmmobile 26

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. www.ibm.com/security Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, 27 or service names may be trademarks or service marks of others.