View
3
Download
0
Category
Preview:
Citation preview
TechnicalPitch
Cibersegurança
Rui Barata RibeiroSecurity Software Sales da IBM Portugal
IBM SECURITY STRATEGYSECURING THE THREATS OF TOMORROW, TODAY
Rui Barata Ribeiro
June 2018
IBM Security
3 © 2018 IBM Corporation
We exist to protect the world, freeing you to thrive in the face of cyber uncertainty
Largest enterprise cybersecurity provider
Leader in 12 security market segments
3,700+ security patents
20+ security acquisitions
60B+ security events monitored per day
4 © 2018 IBM Corporation
Build a security immune system
Get help from the experts
Deploy meaningful innovations
Our unique approach will help transform your security
SECURITYORCHESTRATION
& ANALYTICS
APPS
MOBILE
ENDPOINT
THREATINTEL
NETWORK
ADVANCEDFRAUD
IDENTITY& ACCESS
DATA
Deploy meaningful innovations
AI and Orchestration
Cloud Security
Collaboration
Industry Consultants
Research & Development
World Class Designers
4 © 2018 IBM Corporation
5 © 2018 IBM Corporation
SECURITYORCHESTRATION
& ANALYTICS
THREATINTEL
ENDPOINT NETWORK
MOBILEADVANCED
FRAUD
DATA
APPSIDENTITY& ACCESS
Build an integrated security immune system
Criminal detection
Fraud protection
Data access control
Application security managementApplication scanning
Data protection
Device management
Transaction protection
Content security
Malware protection
Endpoint detection and responseEndpoint patching and management Network forensics and threat management
Firewalls and intrusion prevention
Network visibility and segmentation
Access management
Identity governance and administration
Privileged user management
IDaaS
Mainframe security
Threat sharing
Vulnerability managementSecurity analytics
Threat and anomaly detection
Incident responseUser behavior analytics
Threat hunting and investigation
IoCs
|
|
6 © 2018 IBM Corporation
Supported by hundreds of open integrations
… …
7 © 2018 IBM Corporation
The future of security is AI and OrchestrationWhat if you could augment your teams’ intelligence and response?
Respond quickly with confidenceOrchestrate a complete and dynamic response, enabling faster, more intelligent remediation
– Create dynamic playbooks built on NIST / CERT / SANS
– Deploy response procedures and expertise
Use AI to gain a head startAutomatically investigate incidents and anomalies to identify the most likely threats
– Quickly gather insights from millions of external sources
– Apply cognitive reasoning to build relationships
IBM QRadar Advisor with Watson IBM Resilient
8 © 2018 IBM Corporation
The future of security is CloudCan you confidently say yes to digital transformation?
Gain VisibilityIBM QRadar Cloud Security Analytics
Manage AccessIBM Cloud Identity Connect
Protect DataIBM Multi-Cloud Data Encryption
Get Help from Experts | IBM X-Force Cloud Security Service8 © 2018 IBM Corporation
9 © 2018 IBM Corporation
The future of security is CollaborationAre you part of the bigger picture?
Share real-time threat intelligenceInteract with 41K+ users and 800+ TB of threat intelligence on the IBM X-Force Exchange
Join an ecosystem of defensesCustomize your security with 140+ apps on the IBM Security App Exchange
10 © 2018 IBM Corporation
We’re investing in the skillsof the future
10 © 2018 IBM Corporation
Design Innovation
Engage with experts in IBM Design Thinking
– 42 design studios
– Major influence on dozens of security offerings
X-Force Command Centers
Test your skills in the world’s 1st commercial Cyber Range
– 9 global SOCs
– Monitors more than one trillion events monthly
Research and Expertise
Take advantage of 6,000+ in security R&D and consulting
– Daily threat briefings
– Backed by X-Force and IBM Research, three IBM Fellows
11 © 2018 IBM Corporation
IBM Security offers proven solutions
“IBM provides us with long-term stability because of its well-planned product roadmaps, and scalability as its solutions easily scale as our business grows.”
- Operations Manager, South East Asian Industrial Company
“IBM Security enables us to manage over 2.2 million events daily and still keep our heads above water.”
- Director of Strategic Initiatives, Top University
“The security intelligence from X-Force and the out-of-the-box analytics capabilities made QRadar stand out...”
- CTO, Large IT Consulting Firm in Europe
“IBM Security solutions help us to keep the trust of our patients, which makes our practice grow.”
- IT Director, Healthcare Company with 1.8 million active patients
Market Segment Analyst Rankings
Security Analytics LEADER
Endpoint: Client Management Tools
LEADER
Identity Governance LEADER
Access Management LEADER
Identity as a Service LEADER
Identity Management LEADER
Database Security LEADER
Application Security LEADER
Enterprise Mobility Management
LEADER
Web Fraud Detection LEADER
Managed Security LEADER
Information Security Consulting Services
LEADER
© Copyright IBM Corporation 2018. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
OBRIGADOibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
FOLLOW US ON:
ibm.com/security/community
Rui Barata Ribeiro
IBM Security
Ruibribeiro@pt.ibm.com+351916380571
Recommended