Upload
others
View
4
Download
0
Embed Size (px)
Citation preview
Securing the threats of
tomorrow, Today!
27 September 2018
Lubomir Tilev
Security Sales Leader Bulgaria and Romania
2 IBM Security
Look familiar?
Criminal detection
Fraud protection
Data access control
Application security management
Application scanning
Data protection
Device management Transaction protection
Content security
Malware protection
Endpoint detection and response
Endpoint patching and management
Network forensics and threat management
Virtual patching
Firewalls
Sandboxing
Network visibility and segmentation
Access management
Identity governance and administration
Privileged user management
IDaaS
Indicators of compromise
Malware analysis
Threat sharing
Vulnerability management
Security analytics
Threat and anomaly detection
Incident response
User behavior analytics
Threat hunting and investigation
Mainframe security
3 IBM Security
PROVE
COMPLIANCE
Transform Your
Security Program
STOP
THREATS
Build a
Cognitive SOC
GROW
BUSINESS
Secure digital
transformation
Get
Ahead of
Compliance
Enhance
Security
Hygiene
Govern
Users and
Identities
Detect & Stop
Advanced
Threats
Orchestrate Incident
Response
Master Threat Hunting
Secure Hybrid Cloud
Protect Critical Assets
Prevent Advanced
Fraud
OUTCOME-DRIVEN SECURITY
4 © 2018 IBM Corporation
Focus on regulatory compliance
Ensure workloads in the cloud meet new security standards
Increase investments for “right side of the boom”
Adopt standard security frameworks and controls
Design integrated risk, compliance and security analytics
Challenges we hear from the Financial Services Sector
4 © 2018 IBM Corporation
5 © 2018 IBM Corporation
Lack of sufficient skills and administration
Meet the demands of digital transformation
Ensure data privacy and compliance
Mitigate insider threats
Improve real-time visibility and continuous monitoring
Challenges we hear from Government Agencies
5 © 2018 IBM Corporation
6 © 2018 IBM Corporation
Address risks for IT, OT and IoT
Harmonize the approach to IT-OT convergence
Maintain regulatory compliance
Increase security efficiency for detection to response
Enable and protect digital transformation
Challenges we hear from CISOs in the Energy and Utility Industry
6 © 2018 IBM Corporation
7 IBM Security
PROVE
COMPLIANCE
Transform Your Security Program
STOP
THREATS
Build a Cognitive SOC
GROW
BUSINESS
Secure Digital Transformation
• Guardium
• AppScan / ASoC
• BigFix
• MaaS360
• Trusteer
• Cloud Identity
• QRadar
Detect & Stop
Advanced
Threats
• QRadar + Advisor
• QRadar UBA
• Resilient
• i2
• Identity Governance
• Access Manager / Cloud Identity
• Identity Governance
• Access Manager / Cloud Identity
• Guardium
• Data Risk Manager
• BigFix
• QRadar
Orchestrate Incident
Response
Get
Ahead of
Compliance
Enhance
Security
Hygiene
Govern
Users and
Identities
Master Threat
Hunting
Secure Hybrid Cloud
Protect Critical Assets
Prevent Advanced
Fraud
Outcome based security
8 IBM Security
Criminal detection
Fraud protection
Data access control
Application security management
Application scanning
Data protection
Device management
Transaction protection
Content security
Malware protection
Endpoint detection and response
Endpoint patching and management
Network forensics and threat management
Virtual patching
Firewalls
Sandboxing
Network visibility and segmentation
Access management
Identity governance and administration
Privileged user management
IDaaS
Mainframe security
Indicators of compromise
Malware analysis
Threat sharing
SECURITY ECOSYSTEM
SECURITY ORCHESTRATION
& ANALYTICS
DATA
APPS IDENTITY & ACCESS
MOBILE ADVANCED
FRAUD
THREAT INTEL
ENDPOINT NETWORK
Vulnerability management
Security analytics
Threat and anomaly detection
Incident response
User behavior analytics
Threat hunting and investigation
9 IBM Security
APP EXCHANGE (2015)
MAAS360
(2013)
TRUSTEER
(2014)
APP SECURITY
ON CLOUD
(2015)
CLOUD IDENTITY
(2017)
X-FORCE EXCHANGE (2015)
QRADAR ON CLOUD (2016)
WATSON FOR CYBER (2017)
DATA SECURITY ON CLOUD (2018)
ENDPOINT NETWORK
DATA
IDENTITY & ACCESS
MOBILE ADVANCED FRAUD
APPLICATIONS
SECURITY ANALYTICS
& ORCHESTRATION
THREAT INTELLIGENCE
SECURITY ECOSYSTEM
We are helping clients on their next journey…
10 IBM Security
IBM Security: Leader across 12 out of 12 security market segments
DOMAIN SEGMENT MARKET SEGMENT / REPORT ANALYST
RANKINGS
Security Operations and Response
Security Intelligence Security Information and Event Management (Qradar) LEADER
Network & Endpoint Protection Endpoint: Client Management Tools (BigFix) LEADER
Information Risk
and Protection
Identity Governance
& Access Management
Identity and Access Governance LEADER
Access Management (worldwide) LEADER
Identity and Access Management as a Service (IDaaS) LEADER
Identity Provisioning Management LEADER
Data Security Database Security (Guardium) LEADER
Application Security Application Security Testing (dynamic and static) LEADER
Mobile Protection Enterprise Mobility Management (MaaS360) LEADER
Fraud Protection Web Fraud Detection (Trusteer) LEADER
Security
Transformation
Services
Consulting and
Managed Services
Managed Security Services (MSS) LEADER
Information Security Consulting Services LEADER
Note: This is a collective view of analyst reports from Gartner, Forrester, IDC, Frost & Sullivan, Ovum, and KuppingerCole.
compiled as of November 2017
11 IBM Security
Open partner ecosystem 200+ ecosystem partners, 500+ QRadar integrations
… …
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products
and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service
marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your
enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.
No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,
products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products
or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
FOLLOW US ON:
THANK YOU