29
IBM Security Intelligence, Integration and Expertise © 2012 IBM Corporation Optimizing the World’s Infrastructure May 2012 Copenhagen Fabio Panada – Security Tech Sales Leader

PCTY 2012, IBM Security and Strategy v. Fabio Panada

Embed Size (px)

DESCRIPTION

Præsentation fra PCTY 2012 v. Fabio Panada, Security Technical Professional Leader, IBM

Citation preview

Page 1: PCTY 2012, IBM Security and Strategy v. Fabio Panada

IBM Security

Intelligence, Integration and Expertise

© 2012 IBM Corporation

Optimizing the World’s InfrastructureMay 2012 Copenhagen

Fabio Panada – Security Tech Sales Leader

Page 2: PCTY 2012, IBM Security and Strategy v. Fabio Panada

2

The world is becoming more digitized and interconnected, opening the door to emerging threats and leaks…

Organizations continue to move to new platforms including cloud, virtualization, mobile, social business and more

EVERYTHING IS EVERYWHERE

With the advent of Enterprise 2.0 and social business, the line between personal and professional hours, devices and data has disappeared

CONSUMERIZATION OF IT

The age of Big Data – the explosion of digital information – has arrived and is facilitated by the pervasiveness of applications accessed from everywhere

DATA EXPLOSION

The speed and dexterity of attacks has increased coupled with new motivations from cyber crime to state sponsored to terror inspired

ATTACK SOPHISTICATION

…making security a top concern, from the boardroom down

Page 3: PCTY 2012, IBM Security and Strategy v. Fabio Panada

3

2011 – The Year of the Breach

Page 4: PCTY 2012, IBM Security and Strategy v. Fabio Panada

4

The future of security – The Darwinian challenge: Evolve or lose

• The business environment is evolving• The IT environment is evolving• The cyber threat environment is evolving

• The challenge every function is facing is how to evolve with them to deliver New Security Solutions

• If the information security function does not change, the result will be losing influence, control and in this environment a real opportunity for impact with the business

Page 5: PCTY 2012, IBM Security and Strategy v. Fabio Panada

5

The future of security - The scale of evolution

Page 6: PCTY 2012, IBM Security and Strategy v. Fabio Panada

6

The future of security – Business Evolution

• A greater reliance on:– Data (business information, competitive advantage, as the business)– Technology for employees and customers

• Globalisation and 24x7 operations– Offices, users and IT assets around the globe

• Changing customer perceptions– Baby boomers to Generation X, and now Generation Y not forgetting

Generation G

• Competitive advantage is difficult - the economy makes it even harder

– Top UK supermarket profits are between £3.46 and £6.30 for every £100 sold – that’s not much to work with

Page 7: PCTY 2012, IBM Security and Strategy v. Fabio Panada

7

The future of security - Technology evolution

• Know your technical environment (technologies, vulnerabilities, threats) but don’t be defined by it‒ Define normal to identify abnormal

• Prepare for handling technology-related incidents in a way the business ‘gets’‒ Monitor, and know how to react

Page 8: PCTY 2012, IBM Security and Strategy v. Fabio Panada

8

IT Security is a board room discussion

Business results

Sony estimates potential $1B long term impact – $171M / 100 customers*

Supply chain

Epsilon breach impacts 100 national brands

Legal exposure

TJX estimates $150M class action settlement in release of credit / debit card info

Impact of hacktivism

Lulzsec 50-day hack-at-will spree impacts Nintendo, CIA, PBS, UK NHS, UK SOCA, Sony …

Audit risk

Zurich Insurance PLc fined £2.275M ($3.8M) for the loss and exposure of 46K customer records

Brand image

HSBC data breach discloses 24K private banking customers

*Sources for all breaches shown in speaker notes

Page 9: PCTY 2012, IBM Security and Strategy v. Fabio Panada

9

Security is one of the top concerns of cloud, as customers drastically rethink the way IT resources are designed, deployed and consumed.

2. Cloud Computing

Key drivers affecting the security software business

Regulatory and compliance pressures continue to mount as companies store sensitive data and become susceptible to audit failures.

4. Regulations and Compliance

Sophisticated, targeted attacks, designed to gain continuous access to critical information, are increasing in severity and occurrence.

1. Advanced Threats

It is no longer enough to protect the perimeter – sophisticated attacks are bypassing traditional defenses, IT resources are moving outside the firewall, and enterprise applications and data are becoming distributed across multiple devices

Managing employee owned devices and securing connectivity to corporate applications are top of mind as CIOs broaden their support for mobile devices.

3. Mobile Computing

Advanced Persistent Threats

Stealth Bots Designer Malware

Targeted Attacks Zero-days

EnterpriseCustomers

Page 10: PCTY 2012, IBM Security and Strategy v. Fabio Panada

10

Solving a security issue is a complex, four-dimensional puzzle

People

Data

Applications

Infrastructure

Employees Consultants Hackers Terrorists Outsourcers Customers Suppliers

Systems applications Web applications Web 2.0 Mobile apps

Structured Unstructured At rest In motion

It is no longer enough to protect the perimeter – siloed point products will not secure the enterprise

Page 11: PCTY 2012, IBM Security and Strategy v. Fabio Panada

11

Helping Organizations Progress in Their Security Maturity

People Data Applications Infrastructure Security Intelligence

Optimized

Role based analytics

Identity governance

Privileged user controls

Data flow analytics

Data governance

Secure app engineering processes

Fraud detection

Advanced network

monitoring

Forensics / data mining

Securing systems

Advanced threat detection

Network anomaly detection

Predictive risk management

Proficient

User provisioning

Access mgmt

Strong authentication

Access monitoring

Data loss prevention

Application firewall

Source code scanning

Virtualization security

Asset mgmt

Endpoint / network security

management

Real-time event correlation

Network forensics

BasicCentralized

directoryEncryption

Access controlApplication scanning

Perimeter security

Anti-virus

Log management

Compliance reporting

Page 12: PCTY 2012, IBM Security and Strategy v. Fabio Panada

12

IBM’s Comprehensive, Integrated Security Portfolio

Security Consulting

ManagedServices

X-Forceand IBM

Research

IBM Security PortfolioIBM Security Portfolio

People Data Applications Infrastructure

IT Infrastructure – Operational Security Domains

QRadar SIEM

QRadar Log Manager

QRadar Risk Manager

IBM Privacy, Audit and Compliance Assessment Services

Identity & Access Management Suite

Federated Identity Manager

Enterprise Single Sign-On

Identity Assessment, Deployment and Hosting Services

Guardium Database Security

Optim Data Masking

Key Lifecycle Manager

Data Security Assessment Service

Encryption and DLP Deployment

AppScan Source Edition

AppScan Standard Edition

Security Policy Manager

ApplicationAssessment Service

AppScan OnDemand Software as a Service

Network Intrusion Prevention

DataPowerSecurity Gateway

QRadar Anomaly Detection / QFlow

Managed Firewall, Unified Threat and Intrusion PreventionServices

Endpoint Manager (BigFix)

zSecure, Server and Virtualization Security

Penetration Testing Services

Native Server Security (RACF, IBM Systems)

Network Endpoint

IT Security / Compliance Analytics & Reporting

Enterprise Governance, Risk and Compliance Management

IBM OpenPages Algorithmics (recent acquisition) i2 Corporation (recent acquisition)

Products Services

Page 13: PCTY 2012, IBM Security and Strategy v. Fabio Panada

13

How is IBM solving complex security challenges?

Page 14: PCTY 2012, IBM Security and Strategy v. Fabio Panada

14

Prediction & Prevention Reaction & RemediationSIEM. Log Management. Incident Response.

Network and Host Intrusion Prevention. Network Anomaly Detection. Packet Forensics.

Database Activity Monitoring. Data Loss Prevention.

Risk Management. Vulnerability Management. Configuration Monitoring. Patch Management.

X-Force Research and Threat Intelligence. Compliance Management. Reporting and Scorecards.

What are the external and internal threats?

Are we configuredto protect against

these threats?

What is happening right now?

What was the impact?

Solutions for the Full Compliance and Security Intelligence Timeline

Page 15: PCTY 2012, IBM Security and Strategy v. Fabio Panada

15

IBM is integrating across IT silos with Security Intelligence solutions

Page 16: PCTY 2012, IBM Security and Strategy v. Fabio Panada

16

Solving complex problems that point solutions cannot

Discovered 500 hosts with “Here You Have” virus, which all other security products missed

Improving threat detection

2 billion log and events per day reduced to 25 high priority offenses

Consolidating data silos

Automating the policy monitoring and evaluation process for configuration changes in the infrastructure

Predicting risks against your business

Real-time monitoring of all network activity, in addition to PCI mandates

Addressingregulatory mandates

Page 17: PCTY 2012, IBM Security and Strategy v. Fabio Panada

17

Solutions Integration

© 2011 IBM Corporation17

Page 18: PCTY 2012, IBM Security and Strategy v. Fabio Panada

19

Increase security awareness and accuracyQRadar SIEM consolidates siloed information to more effectively detect and manage complex threats. Information is normalized and correlated to quickly deliver intelligence that allows organizations to detect, notify and respond to threats missed by other security solutions with isolated visibility

Support for over 400+ information sources, including many IBM products and technologies

User and Asset Context - Contextual data from IAM products and vulnerability scanners

Application Logs - ERP, workflow, application databases, management platforms, etc.

Network Events - Switches, routers, servers, hosts, etc.

Network Activity Context - Layer 7 application context from network and application traffic

Security Events - Events from firewalls, VPNs, IPS, etc.

Automate compliance tasks and assess risksQRadar Risk Manager leverages and extends the value of a SIEM deployment to greatly improve the ability to automate risk management functions in mission critical areas, including network and security configuration, compliance management, and vulnerability assessment

Hundreds of 3rd party information sources

Page 19: PCTY 2012, IBM Security and Strategy v. Fabio Panada

20

Examples of integrated X-Force research

X-Force Database - 63,000+ unique vulnerabilities, threats and security checks

Virtual Patch - Eliminates fire drills for new threats by mitigating vulnerabilities through network intrusion prevention

X-Force Hosted threat analysis service - offers threat information collected from globally networked security operations centers

Stay ahead of the changing threat landscapeThe X-Force team is one of the best-known commercial security research groups in the world. These security experts research vulnerabilities and security issues, collect worldwide threat data and develop countermeasure technologies for IBM products

Detect the latest web application vulnerabilitiesInformation on the latest threats, updated automatically when you launch a AppScan product – including OWASP and SANS top vulnerabilities

Intelligence to assess and harden databasesGuardium contains hundreds of preconfigured vulnerability tests, encompassing CIS and STIG best practices, updated regularly through IBM’s Knowledge Base service

Global Threat Intelligence

Page 20: PCTY 2012, IBM Security and Strategy v. Fabio Panada

21

Customized protection to block web attacksAppScan Enterprise Edition software integrates with the IBM security solution for network and server security to protect specific vulnerabilities using scan results

AppScan scans and tests web applications to identify risks and vulnerabilities

SiteProtector consumes AppScan results and builds recommended policies

Customized protection policies are pushed to IPS appliances and server agents

Automated policy enforcementIBM’s suite of Identity and Access Management tools are leveraged by DataPower SOA gateways to provide central policy management and user access enforcement across web services deployments, including credentials for the gateways themselves.

Identify users associated with database activityInfoSphere Guardium leverages identity information for in-depth database security analysis when monitoring suspicious activity

1

2

3

Page 21: PCTY 2012, IBM Security and Strategy v. Fabio Panada

22

X-Force – Intelligence Research

© 2011 IBM Corporation22

Page 22: PCTY 2012, IBM Security and Strategy v. Fabio Panada

23

IBM Security: Delivering intelligence, integration and expertise across a comprehensive framework

Intelligence ● Integration ● ExpertiseIntelligence ● Integration ● Expertise

Only vendor in the market with end-to-end coverage of the security foundation

6K+ security engineers and consultants

Award-winning X-Force® research

Largest vulnerability database in the industry

Page 23: PCTY 2012, IBM Security and Strategy v. Fabio Panada

24

Expertise: Unmatched global coverage and security

awareness

20,000+ devices under contract 3,700+ MSS clients worldwide 9B+ events managed per day 1,000+ security patents 133 monitored countries (MSS)

20,000+ devices under contract 3,700+ MSS clients worldwide 9B+ events managed per day 1,000+ security patents 133 monitored countries (MSS)

World Wide Managed Security Services Coverage

Security Operations Centers

Security Research Centers

Security Solution Development Centers

Institute for Advanced Security Branches

IBM Research

Page 24: PCTY 2012, IBM Security and Strategy v. Fabio Panada

25

IdentityFederation

Web ApplicationScanning

VirtualizationSecurity

NetworkSecurity

Image & Patch Management

DatabaseMonitoring

IBM Security Intelligence

Everything is Everywhere

Page 25: PCTY 2012, IBM Security and Strategy v. Fabio Panada

26

Security is Everywhere

Page 26: PCTY 2012, IBM Security and Strategy v. Fabio Panada

27

Less a technical problem, More a business challenge

Many of the breaches could have been prevented However, significant effort required to inventory, identify and close every vulnerability Financial & operational resistance is always encountered, so how much of an investment is enough?

Page 27: PCTY 2012, IBM Security and Strategy v. Fabio Panada

28

Security Evolution

“It is not the strongest of the speciesthat survives, nor the most intelligentthat survives. It is the one that is the

most adaptable to change.”

Charles Darwin

Page 28: PCTY 2012, IBM Security and Strategy v. Fabio Panada

29

ibm.com/security

© Copyright IBM Corporation 2012. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Page 29: PCTY 2012, IBM Security and Strategy v. Fabio Panada

30

Please note:• IBM’s statements regarding its plans, directions, and intent are

subject to change or withdrawal without notice at IBM’s sole discretion. • Information regarding potential future products is intended to outline

our general product direction and it should not be relied on in making a purchasing decision.

• The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion.

• Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here.