Upload
ibm-security
View
1.653
Download
0
Embed Size (px)
DESCRIPTION
Enterprises are moving to the cloud as they realize the business advantages but they still have security concerns. Considering the complexity and various ways cloud is used, security leaders and IT teams feel overwhelmed by the spate of information that they have to keep track. This infographic provides a framework to help implement cloud security across all cloud types - private, public, hybrid as well as cloud utilization models like IaaS, PaaS and SaaS. This framework provides details on the specific steps that need to be taken to help achieve cloud security. http://securityintelligence.com/media/infographic-top-3-cloud-security-concerns/
Citation preview
Manage Access Protect
Data
Gain Visibility
ACT STRATEGICALLY
Adopt cloud confidently with the IBM Dynamic Cloud Security Portfolio
A comprehensive set of capabilities that provide access management,data and application protection, and deep visibility
1. 2013, IDC US Cloud Security Survey2. Sept 2013, Information Week Cloud Security and Risk Survey3. Verizon 2014 Data Breach Investigations Report
CLOUD SECURITY CONCERNS
Encrypt and monitor sensitive data
Scan for vulnerabilities
Protect virtualized infrastructure from network attacks
Monitor cloud activity
Correlate and prioritize events across traditional andcloud environments
Extend compliance reporting tocloud infrastructure
Federate and govern user access to cloud applications and infrastructure
Safeguard accessto cloud-deployed applications
Govern privileged user access
Unrestricted Access to
Cloud Services
Data and Applications Outside Your
ControlDamaging
Security Breaches
50%75%73%
of firms discovered cloud usage outside of IT or security policies.1
of firms are worried about unauthorized access or leakage of
sensitive data.2 of security breaches take
days, weeks, or even months to discover.3
Users focuson productivity
and are not aware of security implications
Unauthorized or malicious access by privileged insiders
Explosive growth in dataspread across the cloud
Lack of visibilityinto cloud infrastructure while compliance needs
are increasing
Cloud RequiresDynamic Security
Four imperatives to safeguardyour move to cloud and reduce risk
Cloud Security Technologies
Cloud and Managed Services
Comprehensive Threat Intelligence
Deliver a consolidated security view across the traditional data center and the cloud
Leverage innovations in big data, visualization and analytics to stay ahead of the threat
Utilize expert knowledge to respond to security incidents with speed and agility
Discover how you can embrace cloud with confidence today.http://www.ibm.com/security/cloudhttp://www.securityintelligence.com
New vulnerabilities introduced by new apps
built outside of IT with rapid development cycles
Unauthorized ormalicious access byprivileged insiders
Shortage of skilledsecurity personnel to
monitor, analyze, prioritize and respond to threats
© Copyright IBM Corporation 2014. All rights reserved.
Optimize Security OperationsUSE EXPERTISE TO EXTEND INTEGRATED NEXT-GEN SECURITY
OPERATIONS TO THE CLOUD
help protect people, data, applications and infrastructure
in the cloud, with integrated solutions and open standards
for flexibility
is embedded into IBM Security
solutions by IBM X-Force® Research and Development, one of the oldest and most
respected commercial security research teams
help secure some of the most complex cloud networks in the world — monitoring 15 billion security events every day for
over 4,000 clients
SAFEGUARD PEOPLE, APPLICATIONS,AND DEVICES
connecting to the cloudwith easy-to-use identityand access management
built for the cloud.
IDENTIFY VULNERABILITIES AND
PREVENT ATTACKS targeting sensitive data by hardening the underlying
cloud infrastructure and the applications running on them.
MONITOR THE CLOUD FOR SECURITY
BREACHESand compliance violations using advanced security
analytics and threat intelligence in the cloud.
12
3
4