IBM Security Systems IBM Security Systems Division Intelligence, Integration and Expertise February 2013 Shiraz Baksh, Security Systems Division Sales Specialist © 1 2012 IBM Corporation © 2012 IBM Corporation IBM Security Systems The world is becoming more digitized and interconnected, opening the door to emerging threats and leaks… 2 DATA EXPLOSION The age of Big Data – the explosion of digital information – has arrived and is facilitated by the pervasiveness of applications accessed from everywhere CONSUMERIZATION OF IT With the advent of Enterprise 2.0, social business and BYOD, the line between personal and professional hours, devices and data has disappeared EVERYTHING IS EVERYWHERE Organizations continue to move to new platforms including cloud, virtualization, mobile, social business and more ATTACK SOPHISTICATION The speed and dexterity of attacks has increased coupled with new actors with new motivations from cyber crime to terrorism to state-sponsored intrusions © 2012 IBM Corporation IBM Security Systems Proof points: Targeted attacks shake businesses & governments 3 Source: IBM X-Force® 2011 Trend and Risk Report © 2012 IBM Corporation IBM Security Systems IT Security is a board room discussion Business results 4 Brand image *Sources for all breaches shown in speaker notes Supply chain Legal exposure Impact of hacktivism Audit risk © 2012 IBM Corporation IBM Security Systems Solving a security issue is a complex, four-dimensional puzzle People Employees Consultants Hackers Terrorists Outsourcers Customers Suppliers Data Structured Unstructured At rest In motion Applications Systems applications Web applications Web 2.0 Mobile apps Infrastructure It is no longer enough to protect the perimeter – siloed point products will not secure the enterprise 5 © 2012 IBM Corporation IBM Security Systems In this “new normal”, organizations need an intelligent view of their security posture In Sec te u lli rit ge y nc e Manual Reactive 6 ed iz im pt Automated O nt ie ic of Pr Organizations employ perimeter protection, which regulates access and feeds manual reporting c si Ba Basic Optimized Organizations use predictive and automated security analytics to drive toward security intelligence Proficient Security is layered into the IT fabric and business operations Proactive © 2012 IBM Corporation IBM Security Systems IBM Security: Delivering intelligence, integration and expertise across a comprehensive framework Only vendor in the market with end-toend coverage of the security foundation 6K+ security engineers and consultants Award-winning X-Force® research Largest vulnerability database in the industry Intelligence Intelligence 7 ● ● Integration Integration ● ● Expertise Expertise © 2012 IBM Corporation IBM Security Systems Security Intelligence is enabling progress to optimized security Security Intelligence: Information and event management Advanced correlation and deep analytics External threat research Security Intelligence Optimized Role based analytics Identity governance Data flow analytics Privileged user controls Data governance User provisioning Proficient Access mgmt Strong authentication Basic Centralized directory People 8 Access monitoring Data loss prevention Encryption Access control Data Secure app engineering processes Fraud detection Application firewall Source code scanning Application scanning Applications Advanced network monitoring Forensics / data mining Secure systems Virtualization security Asset mgmt Endpoint / network security management Perimeter security Anti-virus Infrastructure © 2012 IBM Corporation IBM Security Systems Intelligence: A comprehensive portfolio of products and services 9 New in 2012 Products Services © 2012 IBM Corporation IBM Security Systems Analysts recognize IBM’s superior products and performance Domain Segment / Report Analyst Recognition Security Security Information & Event Management (SIEM) Intelligence, Analytics and GRC Enterprise Governance Risk & Compliance Platforms 2012 2011 Identity & Access Governance 2012 User Provisioning / Administration 2012 People Role Management & Access Recertification Data Applications Infrastructure 2011* Web Access Management (WAM) 2012** Database Auditing & Real-Time Protection 2013 Static Application Security Testing (SAST) 2010 Dynamic Application Security Testing (DAST) 2011 Network Intrusion Prevention Systems (NIPS) 2012 EndPoint Protection Platforms (EPP) 2013 Leader 10 Niche Player Strong Performer Leader (#1, 2, or 3 in segment) Challenger Contender 2012*** 2010 2011 Data Masking Visionary 2011 2011 Enterprise Single Sign-on (ESSO) Leader 2010 * Gartner MarketScope (discontinued in 2012) ** Gartner MarketScope *** 2012 IDC MarketScape ranked IBM #1 in IAM 2010 2010 V13-05 © 2012 IBM Corporation IBM Security Systems Expertise: Unmatched global coverage and security awareness Security Operations Centers Security Research Centers Security Solution Development Centers Institute for Advanced Security Branches IBM Research World Wide Managed Security Services Coverage 11 20,000+ 20,000+ devices devices under under contract contract 3,700+ MSS MSS clients 3,700+ clients worldwide worldwide 9B+ 9B+ events events managed managed per per day day 1,000+ security patents 1,000+ security patents 133 monitored monitored countries countries (MSS) (MSS) 133 © 2012 IBM Corporation IBM Security Systems Intelligent solutions provide the DNA to secure a Smarter Planet Security Intelligence, Analytics & GRC People Data Applications Infrastructure 12 © 2012 IBM Corporation IBM Security Systems ibm.com/security © Copyright IBM Corporation 2012. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United © 2012 IBM Corporation 13 States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. IBM Security Systems Videos Introduce CyberCrime Topic http://www.youtube.com/watch?v=iSx6NWNPoDc What is X-Force - 2min Video http://www.youtube.com/watch?v=YPqRC_fI-_Y&feature=relmfu Security Commercials http://www.youtube.com/watch?v=4mEojERizjc http://www.youtube.com/watch?v=rLDxOh8a2w0&list=UUlAgZm2OXFpX8WoMsOpWo XA&index=3&feature=plcp 14 © 2012 IBM Corporation