IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software...

Preview:

Citation preview

IBM Security A New Era of Securityfor a New Era of Computing

Pelin Konakcı

IBM Security Software Sales Leader

© 2015 IBM Corporation

IBM Security

2

New technologies introduce new risks…

© 2015 IBM Corporation

IBM Security

3

Security leaders are more accountable than ever before

© 2015 IBM Corporation

IBM Security

4

IBM Security invests in best-of-breed technologies

© 2015 IBM Corporation

IBM Security

5

IBM Security Strategy

© 2015 IBM Corporation

IBM Security

6

IBM helps protect against new, complex security challenges

© 2015 IBM Corporation

IBM Security

7

Optimize your security programIntegrate security silos, reduce complexity, and lower costs

© 2015 IBM Corporation

IBM Security

8

Stop advanced threatsUse analytics and insights for smarter integrated defense

© 2015 IBM Corporation

IBM Security

9

Introducing the IBM Threat Protection System

© 2015 IBM Corporation

IBM Security

10

Focus on critical points in the attack chain with preemptive defenses on both the endpoint and network

© 2015 IBM Corporation

IBM Security

11

Continuously monitor security-relevant activity from across the entire organization

© 2015 IBM Corporation

IBM Security

12

Intelligent, integrated and automated vulnerability management

© 2015 IBM Corporation

IBM Security

14

Rapidly investigate breaches, retrace activity, and learn from findings to remediate weaknesses

© 2015 IBM Corporation

IBM Security

15

Share, analyze, and act upon information gathered from an ecosystem of third-party products

© 2015 IBM Corporation

IBM Security

16

Protect critical assetsUse context-aware, role-based controls to help prevent unauthorized access

© 2015 IBM Corporation

IBM Security

17

End-to-end products and services to protect your critical assets

© 2015 IBM Corporation

IBM Security

18

© 2015 IBM Corporation

IBM Security

19

Cloud is rapidly transforming the enterprise

© 2015 IBM Corporation

IBM Security

20

IBM Cloud Security Portfolio

© 2015 IBM Corporation

IBM Security

21

IBM Security solutions for the mobile enterprise

© 2015 IBM Corporation

IBM Security

22 -

Identity and Access Governance

Guardium Data Security

AppScan Source

Network Intrusion Prevention

Trusteer Apex

Identity and Access Management

Guardium Database Vulnerability Mgmt

AppScan Dynamic

Next Generation Network Protection

Mobile & Endpoint Management

Privileged Identity Management

Guardium / Optim Data Masking

DataPower SOA Security

SiteProtectorThreat Management

Virtualization and Server Security

Federated Access and SSO

Key Lifecycle Manager

Security Policy ManagerNetwork

Anomaly DetectionMainframeSecurity

IBM X-Force and Trusteer Threat Intelligence

Advanced Fraud Protection

Trusteer RapportTrusteer Pinpoint Malware Detection

Trusteer Pinpoint ATO Detection

Trusteer Mobile Risk Engine

Security Intelligence and Analytics

Strategy, Risk and Compliance

Security Maturity Benchmarking

Security Strategy andRoadmap Development

Security Risk Assessment and Program Design

Industrial Controls(NIST, SCADA)

Payment Card Advisory(PCI)

Identity Strategy and Assessment

Data Security and Assessment

Embedded Device TestingFirewall / IDPS / UTM Management

Web Protection and Managed DDoS

User Provisioning and Access Mgmt

Encryption Penetration TestingHosted Web, E-mail and Vulnerability Management

Deployment and Migration

Total Authentication Solution Data Loss

Prevention

Application Security Assessment

Staff AugmentationManaged and Cloud Identity

Mobile Application Testing

People Data Applications Network InfrastructureEndpoin

t

Emergency Response Managed SIEM Incident Planning Cyber Threat Intel Security Operations Center Design Services

QRadar SIEM QRadar Log Manager QRadar Risk Mgr QRadar Vulnerability Mgr QRadar Incident Forensics

The IBM Security PortfolioServices

Products

Cybersecurity Assessment and Response

Threat Intelligence Advisory X-Force Threat Analysis Penetration Testing Incident Preparation Emergency Response

© 2015 IBM Corporation

IBM Security

23

Learn more about IBM Security

© 2015 IBM Corporation

IBM Security

24

Recommended