IBM Security Systems
IBM Security Systems Division
Intelligence, Integration and Expertise
February 2013
Shiraz Baksh, Security Systems Division Sales Specialist
©
1 2012 IBM Corporation
© 2012 IBM Corporation
IBM Security Systems
The world is becoming more digitized and interconnected,
opening the door to emerging threats and leaks…
2
DATA
EXPLOSION
The age of Big Data – the explosion of digital
information – has arrived and is facilitated by
the pervasiveness of applications accessed
from everywhere
CONSUMERIZATION
OF IT
With the advent of Enterprise 2.0, social
business and BYOD, the line between
personal and professional hours, devices and
data has disappeared
EVERYTHING
IS EVERYWHERE
Organizations continue to move to new
platforms including cloud, virtualization,
mobile, social business and more
ATTACK
SOPHISTICATION
The speed and dexterity of attacks has
increased coupled with new actors with new
motivations from cyber crime to terrorism
to state-sponsored intrusions
© 2012 IBM Corporation
IBM Security Systems
Proof points: Targeted attacks shake businesses & governments
3
Source: IBM X-Force® 2011 Trend and Risk Report
© 2012 IBM Corporation
IBM Security Systems
IT Security is a board room discussion
Business
results
4
Brand image
*Sources for all breaches shown in speaker notes
Supply chain
Legal
exposure
Impact of
hacktivism
Audit risk
© 2012 IBM Corporation
IBM Security Systems
Solving a security issue is a complex, four-dimensional puzzle
People
Employees Consultants Hackers Terrorists Outsourcers Customers Suppliers
Data
Structured
Unstructured
At rest
In motion
Applications
Systems
applications
Web applications
Web 2.0
Mobile apps
Infrastructure
It is no longer enough to protect the perimeter –
siloed point products will not secure the enterprise
5
© 2012 IBM Corporation
IBM Security Systems
In this “new normal”, organizations need an intelligent view of their
security posture
In Sec
te u
lli rit
ge y
nc
e
Manual
Reactive
6
ed
iz
im
pt
Automated
O
nt
ie
ic
of
Pr
Organizations
employ perimeter
protection, which
regulates access and
feeds manual reporting
c
si
Ba
Basic
Optimized
Organizations use
predictive and
automated security
analytics to drive toward
security intelligence
Proficient
Security is layered
into the IT fabric and
business operations
Proactive
© 2012 IBM Corporation
IBM Security Systems
IBM Security: Delivering intelligence, integration and expertise across a
comprehensive framework
 Only vendor in the market with end-toend coverage of the security foundation
 6K+ security engineers and consultants
 Award-winning X-Force® research
 Largest vulnerability database in the
industry
Intelligence
Intelligence
7
●
●
Integration
Integration
●
●
Expertise
Expertise
© 2012 IBM Corporation
IBM Security Systems
Security Intelligence is enabling progress to optimized security
Security Intelligence:
Information and event management
Advanced correlation and deep analytics
External threat research
Security
Intelligence
Optimized
Role based analytics
Identity governance
Data flow analytics
Privileged user
controls
Data governance
User provisioning
Proficient
Access mgmt
Strong authentication
Basic
Centralized directory
People
8
Access monitoring
Data loss prevention
Encryption
Access control
Data
Secure app
engineering
processes
Fraud detection
Application firewall
Source code
scanning
Application scanning
Applications
Advanced network
monitoring
Forensics / data
mining
Secure systems
Virtualization security
Asset mgmt
Endpoint / network
security management
Perimeter security
Anti-virus
Infrastructure
© 2012 IBM Corporation
IBM Security Systems
Intelligence: A comprehensive portfolio of products and services
9
New in 2012
Products
Services
© 2012 IBM Corporation
IBM Security Systems
Analysts recognize IBM’s superior products and performance
Domain
Segment / Report
Analyst Recognition
Security Security Information & Event Management (SIEM)
Intelligence,
Analytics and
GRC Enterprise Governance Risk & Compliance Platforms
2012
2011
Identity & Access Governance
2012
User Provisioning / Administration
2012
People Role Management & Access Recertification
Data
Applications
Infrastructure
2011*
Web Access Management (WAM)
2012**
Database Auditing & Real-Time Protection
2013
Static Application Security Testing (SAST)
2010
Dynamic Application Security Testing (DAST)
2011
Network Intrusion Prevention Systems (NIPS)
2012
EndPoint Protection Platforms (EPP)
2013
Leader
10
Niche Player
Strong Performer
Leader (#1, 2, or 3 in segment)
Challenger
Contender
2012***
2010
2011
Data Masking
Visionary
2011
2011
Enterprise Single Sign-on (ESSO)
Leader
2010
* Gartner MarketScope (discontinued in 2012)
** Gartner MarketScope
*** 2012 IDC MarketScape ranked IBM #1 in IAM
2010
2010
V13-05
© 2012 IBM Corporation
IBM Security Systems
Expertise: Unmatched global coverage and security awareness
Security Operations Centers
Security Research Centers
Security Solution Development Centers
Institute for Advanced Security Branches
IBM Research
World Wide Managed
Security Services Coverage





11
20,000+
20,000+ devices
devices under
under contract
contract
3,700+ MSS
MSS clients
3,700+
clients worldwide
worldwide
9B+
9B+ events
events managed
managed per
per day
day
1,000+
security
patents
1,000+ security patents
133 monitored
monitored countries
countries (MSS)
(MSS)
133
© 2012 IBM Corporation
IBM Security Systems
Intelligent solutions provide the DNA to secure a Smarter Planet
Security
Intelligence,
Analytics &
GRC
People
Data
Applications
Infrastructure
12
© 2012 IBM Corporation
IBM Security Systems
ibm.com/security
© Copyright IBM Corporation 2012. All rights reserved. The information contained in these materials is provided for informational purposes
only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use
of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any
warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement
governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in
all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole
discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any
way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United
© 2012 IBM Corporation
13 States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
IBM Security Systems
Videos
 Introduce CyberCrime Topic
http://www.youtube.com/watch?v=iSx6NWNPoDc
 What is X-Force - 2min Video
http://www.youtube.com/watch?v=YPqRC_fI-_Y&feature=relmfu
 Security Commercials
http://www.youtube.com/watch?v=4mEojERizjc
http://www.youtube.com/watch?v=rLDxOh8a2w0&list=UUlAgZm2OXFpX8WoMsOpWo
XA&index=3&feature=plcp
14
© 2012 IBM Corporation