IBM Presentations: Black Template

advertisement
Security
Business Partner Guide
Value Propositions
Click here for Table of Contents
1
© 2012 IBM Corporation
This document is for IBM and IBM Business Partner use only. It is not intended for client distribution or use with clients.
Market opportunity
Worldwide Security Segment Opportunity
Exceeds $73B by 2015
WW Security Products and Services Segment
Opportunity (2011 – 2015)
WW Security Product Opportunity
by Segment (2012)
Market Size ($B)
$80
Applications
$60
Data
Server and
Endpoint
$40
Security
Intelligence
and GRC
$20
Network
People
$0
2011
Products
2015
Services
Source: IBM Market Insights, 2H 2011 This report is based on internal IBM analysis and is not meant to be a statement of direction by
IBM nor is IBM committing to any particular technology or solution.
Click here for Table of Contents
2
© 2012 IBM Corporation
This document is for IBM and IBM Business Partner use only. It is not intended for client distribution or use with clients.
Portfolio overview
Leading Products & Services in Every Security Segment
Click here for Table of Contents
3
© 2012 IBM Corporation
This document is for IBM and IBM Business Partner use only. It is not intended for client distribution or use with clients.
Portfolio overview
Solution Area: Security Intelligence and Analytics
Portfolio Overview
Helping our customers optimize security with additional
context, automation and integration
QRadar SIEM
• Integrated log, threat, compliance management
• Asset profiling and flow analytics
• Offense management and workflow
QRadar Risk Manager
• Predictive threat modeling & simulation
• Scalable configuration monitoring and audit
• Advanced threat and impact analysis
QRadar Log Manager
• Turnkey log management
• Upgradeable to enterprise SIEM
QRadar Network Anomaly Detection
• Network analytics, behavior and anomaly detection
• Fully integrated with SIEM
Click here for Table of Contents
4
© 2012 IBM Corporation
This document is for IBM and IBM Business Partner use only. It is not intended for client distribution or use with clients.
Portfolio overview
Solution
PeopleArea: People
Portfolio Overview
Manage and extend enterprise identity context across all
security domains with end-to-end Identity Intelligence
IBM Security Identity Manager *
• Automate the creation, modification, and
termination of users throughout the entire lifecycle
• Identity control including role management and
auditing
IBM Security Access Manager Family *
• Automates sign-on and authentication to enterprise
web applications and services
• Entitlement management for fine-grained access
enforcement
IBM Security zSecure suite *
• User friendly layer over RACF to improve
administration and reporting
• Monitor, audit and report on security events and
exposures on mainframes.
Click here for Table of Contents
5
* Solution package purchase options available
This document is for IBM and IBM Business Partner use only. It is not intended for client distribution or use with clients.
© 2012 IBM Corporation
Portfolio overview
Solution Area: Data
Portfolio Overview
Enterprise-wide solutions for assuring the privacy and
integrity of trusted information in your data center
IBM InfoSphere Guardium Product Family
• Database Activity Monitoring - continuously monitor
and block unauthorized access to databases
• Privileged User Monitoring - detect or block
malicious or unapproved activity by DBAs,
developers and outsourced personnel
• Prevent Database Leaks - detect and block leakage
in the data center
• Database Vulnerability Assessment - scan
databases to detect vulnerabilities and take action
• Audit and Validate Compliance - simplify SOX, PCIDSS, and Data Privacy processes with preconfigured reports and automated workflows
IBM Security Key Lifecycle Manager
• Centralize and automate the encryption key
management process
• Simplify administration with an intuitive user
interface for configuration and management
Click here for Table of Contents
6
© 2012 IBM Corporation
This document is for IBM and IBM Business Partner use only. It is not intended for client distribution or use with clients.
Portfolio overview
Solution Area: Applications
Reducing the costs of developing secure applications and
assuring the privacy and integrity of trusted information
Portfolio Overview
AppScan Enterprise Edition
• Enterprise-class solution for application security
testing and risk management with governance,
collaboration and security intelligence
• Multi-user solution providing simultaneous security
scanning and centralized reporting
AppScan Standard Edition
• Desktop solution to automate web application
security testing for IT Security, auditors, and
penetration testers
AppScan Source Edition
• Adds source code analysis to AppScan Enterprise
with static application security testing
Click here for Table of Contents
7
© 2012 IBM Corporation
This document is for IBM and IBM Business Partner use only. It is not intended for client distribution or use with clients.
Portfolio overview
Solution Area: Infrastructure (Network)
Guard against sophisticated attacks using an Advanced
Threat Protection Platform with insight into users, content
and applications
Portfolio Overview
IBM Security
Network Intrusion Prevention (IPS)
• Delivers Advanced Threat Detection and Prevention designed
to stop targeted attacks against high value assets
• Proactively protects systems with IBM Virtual Patch®
technology.
• Protects web applications from threats such as SQL Injection
and Cross-site Scripting attacks
• Integrated Data Loss Prevention (DLP) monitors data security
risks throughout your network
• Network Anomaly Detection for predictive early detection of
network threats, system mis-configurations and out of policy
traffic
• Provides Ahead of the Threat® protection backed by world
renowned IBM X-Force Research
IBM Security SiteProtector
• Provides central management of security devices to control
policies, events, analysis and reporting for your business
Click here for Table of Contents
8
© 2012 IBM Corporation
This document is for IBM and IBM Business Partner use only. It is not intended for client distribution or use with clients.
Value Propositions
Why IBM Security Systems?
IBM Security Systems
 Unique and Comprehensive Security
Framework
 $1.8B investment in innovative
technologies
 6K+ security engineers and consultants
 Largest vulnerability database
 Award-winning X-Force® research
 Analyst-recognized leadership in every
segment
Intelligence
●
Integration
●
Expertise
Click here for Table of Contents
9
© 2012 IBM Corporation
This document is for IBM and IBM Business Partner use only. It is not intended for client distribution or use with clients.
Reference
Business Partner Reference
http://www.encodeinc.com

IBM Premier Level Business Partner in Partner World

SVP Authorized in all five IBM software brands

Track record of over 700 security engagements, and a world-class Support Services organization
with over 100 long-term customers

Recipient of multiple IBM excellence awards:
•
2009 IBM Beacon Award For Delivery Excellence
•
2008 Avnet Crystal Growth Award
•
2010 IBM Beacon Award Finalist, Overall Technical Excellence.
•
Member IBM Security Global Advisory Board
•
Member Business Partner Advisory Council, Security Systems Division
Click here for Table of Contents
10
© 2012 IBM Corporation
This document is for IBM and IBM Business Partner use only. It is not intended for client distribution or use with clients.
Partner Profile
Security Business Partner Profile
 The ideal Business Partner for IBM Security Systems has a
well-developed security practice selling across one or
multiple security segments: Network/Threat, People/Identity,
Application, Data or Security Intelligence.
 Many of our Business Partners are specialists in one of those
areas, bringing very deep skills and expertise to our
customers.
 Key cornerstones of a great security business are:
 consultative selling approach
 pre-sales technical support
 deployment/implementation practice
 New Business Partners must also be willing to participate in
IBM incentive programs and invest in marketing and
opportunity identification.
Click here for Table of Contents
11
© 2012 IBM Corporation
This document is for IBM and IBM Business Partner use only. It is not intended for client distribution or use with clients.
Resources
Security Business Partner Resources
ibm.com/partnerworld/security
Sales Plays, Security Talk
Replays, Sales Kits, Top Gun
Prep, Certifications
Pre-packaged marketing
campaigns – it’s easy!
Click here for Table of Contents
12
© 2012 IBM Corporation
This document is for IBM and IBM Business Partner use only. It is not intended for client distribution or use with clients.
Resources
5 Quick Steps to Get Started
Join PartnerWorld to become an IBM Business
Partner, then…
1
Visit the Security PartnerWorld site to access Business Partner sales
and marketing tools and materials and training
2
Complete your Security Business Partner profile
3
4
5
Plan to maximize your profitability & your team’s education path by
reviewing the Software Value Plus (SVP) &
Software Value Incentive (SVI) criteria & product categories.
Educate your sales and delivery teams & become SVP Authorized to
resell security through Training & Certification.
Develop a marketing plan and take advantage of IBM’s programs and
drive demand with IBM Co-Marketing.
Click here for Table of Contents
13
© 2012 IBM Corporation
This document is for IBM and IBM Business Partner use only. It is not intended for client distribution or use with clients.
Download