18
IBM Cloud Security Enforcer SIMPLIFY AND SECURE ADOPTION OF CLOUD APPS June 2016

IBM Cloud Security Enforcer

Embed Size (px)

Citation preview

Page 1: IBM Cloud Security Enforcer

IBM Cloud Security EnforcerSIMPLIFY AND SECURE ADOPTION OF CLOUD APPS

June 2016

Page 2: IBM Cloud Security Enforcer

2 IBM Security

Cloud is here to stay, are you ready to move with the business?

EMPLOYEES IT OPERATIONS YOUR BUSINESS

Look for better ways to get their jobs done

Find cloud services quick and easy to use

Wants to save money and reduce complexity

Wants to automate and consolidate IT

Loses visibility and control over IT

New risk requires new safeguards

Page 3: IBM Cloud Security Enforcer

3 IBM Security

Security and IT leaders face new challenges

CISO / CIO:

Uncover “Shadow IT”

Gain visibility of all cloud app usage

Simplify connecting to approved apps

Remove mobile blind spots

Stop risky user behavior

Quickly react to cloud threats

Address compliance

and governance concerns

How does my organization?

“My team is not equipped to manage

the increased employee usage

and demand for cloud”

Page 4: IBM Cloud Security Enforcer

5 IBM Security

IBM Cloud Security Enforcer

PROTECTAgainst cloud-related threats

CONNECTUsers to approved cloud apps

DETECTUsage of cloud apps and actions

Page 5: IBM Cloud Security Enforcer

6 IBM Security

A SaaS solution to help securely deploy cloud services

Identity and Access Control

Threat Prevention

Policy Enforcement

Discovery and Visibility

Cloud Event Correlation

DETECT CONNECT PROTECT

MOBILE

BYOD

ON PREM

RISKY APPS

APPROVED APPS

EMPLOYEES

Page 6: IBM Cloud Security Enforcer

7 IBM Security

DETECTApp usage and user activity

Page 7: IBM Cloud Security Enforcer

8 IBM Security

Discover thousands of cloud apps

View analytics and risk reports

Chart progress over time

DETECT APPROVED / SHADOW APPS

Page 8: IBM Cloud Security Enforcer

9 IBM Security

Correlate cloud activity to employees

Understand business needs

Identify app usage inefficiencies

DETECT USER ACTIVITY DETAILS

Page 9: IBM Cloud Security Enforcer

10 IBM Security

CONNECTUsers to approved cloud apps

Page 10: IBM Cloud Security Enforcer

11 IBM Security

September 30, 2015

GitHub Connecter

GitHub Connecter for NA Dev Team

On/Off toggles for cloud access

Correct out of policy application usage

CONNECT THE BUSINESS TO

APPROVED APPS

Page 11: IBM Cloud Security Enforcer

12 IBM Security

Display approved app catalog

Enable self-onboarding

Find and use apps faster

CONNECT USERS TO CLOUD APPS

Page 12: IBM Cloud Security Enforcer

13 IBM Security

ProtectAgainst cloud-related threats

Page 13: IBM Cloud Security Enforcer

14 IBM Security

Understand cloud app score

Prioritize apps based on past threats

Limit interaction with unsafe apps

PROTECT AGAINST RISKY APPS

Page 14: IBM Cloud Security Enforcer

15 IBM Security

Establish user risk ratings

Address “rogue” cloud app usage

Block specific actions to/from the cloud

PROTECT AGAINST RISKY BEHAVIOR

Page 15: IBM Cloud Security Enforcer

16 IBM Security

Respond to new threats,

in or out of the office

Integrated with threat

intelligence from

IBM X-Force

PROTECT WITH RAPID

RESPONSE TO THREATS

Page 16: IBM Cloud Security Enforcer

17 IBM Security

Integrating leading IBM security technology into a single platform

• Risk scoring for 1000’s of apps

• Continuous stream of cloud activity data

• Mapping of network data to specific users

• Mobile integration to uncover blind spots

• Federated cloud SSO

• Connectors to popular cloud apps

• Simplified access controls

• Self-service catalogs

• Delegated administration

• User activity and traffic monitoring

• Behavioral analysis and correlation to company policies

• Alerting, reporting, and auditing

• Intrusion Prevention and global threat intelligence from IBM X-Force

• Threat signatures, network analysis, and zero-day threat protection

• User coaching

• Redirection for out-of-policy usage

• Policy and anomaly rule implementation

Identity and Access Control

Threat Prevention

Policy Enforcement

Discovery and Visibility

Cloud Event Correlation

DETECT CONNECT PROTECT

Page 17: IBM Cloud Security Enforcer

18 IBM Security

Key takeaways

Industry’s first solution to combine cloud discovery, access, and threat prevention

Connect users to Cloud apps in seconds

Protect against Cloud threats using IBM’s network of threat intelligence

Speed cloud adoption, making your employees more productive

1

2

3

4

ibm.com/security/cloud-enforcer

Page 18: IBM Cloud Security Enforcer

ibm.com/security

securityintelligence.com

xforce.ibmcloud.com

@ibmsecurity

youtube/user/ibmsecuritysolutions

© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express

or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of,

creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these

materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may

change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and

other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks

or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise.

Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or

product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are

designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective.

IBM DOES NOT WARRANT THAT ANYSYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT

OF ANY PARTY.

FOLLOW US ON:

THANK YOU