Top Banner
© 2014 IBM Corporation Architectural Overview of the IBM Security Systems Portfolio Ver 3.07 – Jun 2014
82

Build Deck v3.07.ppt

Jul 17, 2016

Download

Documents

bnolwalid
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Build Deck v3.07.ppt

© 2014 IBM Corporation

Architectural Overview of the IBM Security Systems Portfolio

Ver 3.07 – Jun 2014

Page 2: Build Deck v3.07.ppt

© 2014 IBM Corporation2

Agenda

The IBM Security Framework and portfolio

Capabilities in the IBM Security Systems domains:• Intelligence and Analytics

• Fraud Protection

• People

• Data

• Applications

• Infrastructure – Distributed

• Infrastructure – z

Page 3: Build Deck v3.07.ppt

© 2014 IBM Corporation33

IBM Security Framework and the IBM Security Systems portfolio

Page 4: Build Deck v3.07.ppt

© 2014 IBM Corporation4

IBM Security Systems and the IBM Security Framework

Intelligence ● Integration ● Expertise

Only vendor in the market with end-to-end coverage of the security foundation

6K+ security engineers and consultants Award-winning X-Force® research Largest vulnerability DB and 2nd largest

IP reputation DB in the industry Partner with IBM Software Group

Services, IBM Security Services and an extensive partner community for consulting and delivery

Page 5: Build Deck v3.07.ppt

© 2014 IBM Corporation5

IBM Security Systems Portfolio

IBM Security Systems Portfolio

People Data Applications Network Infrastructure Endpoint

Identity Management

Guardium Data Security and Compliance

AppScan Source

Network Intrusion Prevention Trusteer Apex

Access Management

Guardium DB Vulnerability Management

AppScan Dynamic

Next Generation Network Protection

Mobile Security MaaS360 by Fiberlink

Privileged Identity Manager

Guardium / Optim Data Masking

DataPower WebSecurity Gateway

SiteProtectorThreat Management

Endpoint Security and Management

Federated Access and SSO

Key Lifecycle Manager

Security Policy Manager

NetworkAnomaly Detection

MainframeSecurity

IBM X-Force Research

Advanced Fraud Protection

Trusteer Rapport

Trusteer PinpointMalware Detection

Trusteer PinpointATO Detection

Trusteer Mobile Risk Engine

Security Intelligence and Analytics

QRadar Log Manager

QRadar SIEM

QRadar Risk Manager

QRadar Vulnerability Manager

Page 6: Build Deck v3.07.ppt

© 2014 IBM Corporation6

Showing the IBM Security Capabilities and Integration

The slide deck uses a representative environment with typical components, services and communications for customers/partners (and cloud services), the enterprise and employees…

… and then progressively overlays IBM security capabilities in the context of this representative

environment to show features and integration points

Page 7: Build Deck v3.07.ppt

© 2014 IBM Corporation77

Security Intelligence and Analytics(and GRC; IT security + enterprise)

Page 8: Build Deck v3.07.ppt

© 2014 IBM Corporation8

IBM Security Systems Portfolio

People Data Applications Network Infrastructure Endpoint

Identity Management

Guardium Data Security and Compliance

AppScan Source

Network Intrusion Prevention Trusteer Apex

Access Management

Guardium DB Vulnerability Management

AppScan Dynamic

Next Generation Network Protection

Mobile Security MaaS360 by Fiberlink

Privileged Identity Manager

Guardium / Optim Data Masking

DataPower WebSecurity Gateway

SiteProtectorThreat Management

Endpoint Security and Management

Federated Access and SSO

Key Lifecycle Manager

Security Policy Manager

NetworkAnomaly Detection

MainframeSecurity

IBM X-Force Research

Advanced Fraud Protection

Trusteer Rapport

Trusteer PinpointMalware Detection

Trusteer PinpointATO Detection

Trusteer Mobile Risk Engine

Security Intelligence and Analytics

QRadar Log Manager

QRadar SIEM

QRadar Risk Manager

QRadar Vulnerability Manager

QRadar Packet CaptureQRadar Incident Forensics

NEWSecurity Intelligence and Analytics

Page 9: Build Deck v3.07.ppt

© 2014 IBM Corporation9

Generic Environment for ABC Co…

Page 10: Build Deck v3.07.ppt

© 2014 IBM Corporation10

… but lets focus on the Infrastructure

Page 11: Build Deck v3.07.ppt

© 2014 IBM Corporation11

Log Management

Page 12: Build Deck v3.07.ppt

© 2014 IBM Corporation12

Security Information and Event Management

Page 13: Build Deck v3.07.ppt

© 2014 IBM Corporation13

Application-level and Virtualised Network Monitoring

Page 14: Build Deck v3.07.ppt

© 2014 IBM Corporation14

Intelligence and Risk Management

Page 15: Build Deck v3.07.ppt

© 2014 IBM Corporation15

Incident Forensic Analysis

Page 16: Build Deck v3.07.ppt

© 2014 IBM Corporation16

Intelligence and Vulnerability Management

Page 17: Build Deck v3.07.ppt

© 2014 IBM Corporation17

Enterprise GRC – Integrating IT Controls for Business Risk View

Page 18: Build Deck v3.07.ppt

© 2014 IBM Corporation1818

Advanced Fraud Protection

Page 19: Build Deck v3.07.ppt

© 2014 IBM Corporation19

IBM Security Systems Portfolio

People Data Applications Network Infrastructure Endpoint

Identity Management

Guardium Data Security and Compliance

AppScan Source

Network Intrusion Prevention Trusteer Apex

Access Management

Guardium DB Vulnerability Management

AppScan Dynamic

Next Generation Network Protection

Mobile Security MaaS360 by Fiberlink

Privileged Identity Manager

Guardium / Optim Data Masking

DataPower WebSecurity Gateway

SiteProtectorThreat Management

Endpoint Security and Management

Federated Access and SSO

Key Lifecycle Manager

Security Policy Manager

NetworkAnomaly Detection

MainframeSecurity

IBM X-Force Research

Advanced Fraud Protection

Trusteer Rapport

Trusteer PinpointMalware Detection

Trusteer PinpointATO Detection

Trusteer Mobile Risk Engine

Security Intelligence and Analytics

QRadar Log Manager

QRadar SIEM

QRadar Risk Manager

QRadar Vulnerability Manager

Advanced Fraud Protection

Page 20: Build Deck v3.07.ppt

© 2014 IBM Corporation20

Generic Environment for ABC Co

Page 21: Build Deck v3.07.ppt

© 2014 IBM Corporation21

Providing Common Fraud Prevention Services from the Cloud

Page 22: Build Deck v3.07.ppt

© 2014 IBM Corporation22

Protecting Employee Devices from Fraud

Page 23: Build Deck v3.07.ppt

© 2014 IBM Corporation23

Protecting Customer Devices from Fraud

Page 24: Build Deck v3.07.ppt

© 2014 IBM Corporation24

Protecting Customer Devices from Fraud without Client-Side Agents

Page 25: Build Deck v3.07.ppt

© 2014 IBM Corporation25

Protecting Customer Mobile Devices from Fraud

Page 26: Build Deck v3.07.ppt

© 2014 IBM Corporation26

Leveraging Access Management for Fraud Protection

Page 27: Build Deck v3.07.ppt

© 2014 IBM Corporation27

Fraud Protection and Security Intelligence

Page 28: Build Deck v3.07.ppt

© 2014 IBM Corporation2828

People

Page 29: Build Deck v3.07.ppt

© 2014 IBM Corporation29

IBM Security Systems Portfolio

People Data Applications Network Infrastructure Endpoint

Identity Management

Guardium Data Security and Compliance

AppScan Source

Network Intrusion Prevention Trusteer Apex

Access Management

Guardium DB Vulnerability Management

AppScan Dynamic

Next Generation Network Protection

Mobile Security MaaS360 by Fiberlink

Privileged Identity Manager

Guardium / Optim Data Masking

DataPower WebSecurity Gateway

SiteProtectorThreat Management

Endpoint Security and Management

Federated Access and SSO

Key Lifecycle Manager

Security Policy Manager

NetworkAnomaly Detection

MainframeSecurity

IBM X-Force Research

Advanced Fraud Protection

Trusteer Rapport

Trusteer PinpointMalware Detection

Trusteer PinpointATO Detection

Trusteer Mobile Risk Engine

Security Intelligence and Analytics

QRadar Log Manager

QRadar SIEM

QRadar Risk Manager

QRadar Vulnerability Manager

The People Domain

Page 30: Build Deck v3.07.ppt

© 2014 IBM Corporation30

Generic Environment for ABC Co

Page 31: Build Deck v3.07.ppt

© 2014 IBM Corporation31

Identity Management

Page 32: Build Deck v3.07.ppt

© 2014 IBM Corporation32

Web Access Control

Page 33: Build Deck v3.07.ppt

© 2014 IBM Corporation33

Federated Identity/Access Management

Page 34: Build Deck v3.07.ppt

© 2014 IBM Corporation34

Mobile Access Management

Page 35: Build Deck v3.07.ppt

© 2014 IBM Corporation35

Enterprise (Desktop) Single Signon

Page 36: Build Deck v3.07.ppt

© 2014 IBM Corporation36

Privileged Identity Management

Page 37: Build Deck v3.07.ppt

© 2014 IBM Corporation37

Identity into Security Intelligence

Page 38: Build Deck v3.07.ppt

© 2014 IBM Corporation3838

Data

Page 39: Build Deck v3.07.ppt

© 2014 IBM Corporation39

IBM Security Systems Portfolio

People Data Applications Network Infrastructure Endpoint

Identity Management

Guardium Data Security and Compliance

AppScan Source

Network Intrusion Prevention Trusteer Apex

Access Management

Guardium DB Vulnerability Management

AppScan Dynamic

Next Generation Network Protection

Mobile Security MaaS360 by Fiberlink

Privileged Identity Manager

Guardium / Optim Data Masking

DataPower WebSecurity Gateway

SiteProtectorThreat Management

Endpoint Security and Management

Federated Access and SSO

Key Lifecycle Manager

Security Policy Manager

NetworkAnomaly Detection

MainframeSecurity

IBM X-Force Research

Advanced Fraud Protection

Trusteer Rapport

Trusteer PinpointMalware Detection

Trusteer PinpointATO Detection

Trusteer Mobile Risk Engine

Security Intelligence and Analytics

QRadar Log Manager

QRadar SIEM

QRadar Risk Manager

QRadar Vulnerability Manager

The Data Domain

Page 40: Build Deck v3.07.ppt

© 2014 IBM Corporation40

Generic Environment for ABC Co…

Page 41: Build Deck v3.07.ppt

© 2014 IBM Corporation41

… but lets focus on the DB-specific Components

Page 42: Build Deck v3.07.ppt

© 2014 IBM Corporation42

Protecting DB Access at the Network Layer

Page 43: Build Deck v3.07.ppt

© 2014 IBM Corporation43

Centralised Management of DB Access Control Policy

Page 44: Build Deck v3.07.ppt

© 2014 IBM Corporation44

Managing Testing Data Based on Production Data

Page 45: Build Deck v3.07.ppt

© 2014 IBM Corporation45

Managing Lifecycle of Hardware Encryption Keys

Page 46: Build Deck v3.07.ppt

© 2014 IBM Corporation46

Security Intelligence and Databases

Page 47: Build Deck v3.07.ppt

© 2014 IBM Corporation47

Identity Management for Databases

Page 48: Build Deck v3.07.ppt

© 2014 IBM Corporation48

Vulnerability Management for Databases

Page 49: Build Deck v3.07.ppt

© 2014 IBM Corporation4949

Applications

Page 50: Build Deck v3.07.ppt

© 2014 IBM Corporation50

IBM Security Systems Portfolio

People Data Applications Network Infrastructure Endpoint

Identity Management

Guardium Data Security and Compliance

AppScan Source

Network Intrusion Prevention Trusteer Apex

Access Management

Guardium DB Vulnerability Management

AppScan Dynamic

Next Generation Network Protection

Mobile Security MaaS360 by Fiberlink

Privileged Identity Manager

Guardium / Optim Data Masking

DataPower WebSecurity Gateway

SiteProtectorThreat Management

Endpoint Security and Management

Federated Access and SSO

Key Lifecycle Manager

Security Policy Manager

NetworkAnomaly Detection

MainframeSecurity

IBM X-Force Research

Advanced Fraud Protection

Trusteer Rapport

Trusteer PinpointMalware Detection

Trusteer PinpointATO Detection

Trusteer Mobile Risk Engine

Security Intelligence and Analytics

QRadar Log Manager

QRadar SIEM

QRadar Risk Manager

QRadar Vulnerability Manager

The Applications Domain

Page 51: Build Deck v3.07.ppt

© 2014 IBM Corporation51

Generic Environment for ABC Co…

Page 52: Build Deck v3.07.ppt

© 2014 IBM Corporation52

… but lets look at the Application components

Page 53: Build Deck v3.07.ppt

© 2014 IBM Corporation53

Source Code and Runtime App Scanning

Page 54: Build Deck v3.07.ppt

© 2014 IBM Corporation54

Application Policy Testing

Page 55: Build Deck v3.07.ppt

© 2014 IBM Corporation55

XML Appliances and Security

Page 56: Build Deck v3.07.ppt

© 2014 IBM Corporation56

Identity Mapping and Security Token Services

Page 57: Build Deck v3.07.ppt

© 2014 IBM Corporation57

Common Security Policy Mgmt, Provisioning and Enforcement

Page 58: Build Deck v3.07.ppt

© 2014 IBM Corporation58

Security Intelligence and Applications

Page 59: Build Deck v3.07.ppt

© 2014 IBM Corporation59

Identity Management for Applications

Page 60: Build Deck v3.07.ppt

© 2014 IBM Corporation60

Web Application Protection for Applications

Page 61: Build Deck v3.07.ppt

© 2014 IBM Corporation61

Test Data Masking/Cleansing

Page 62: Build Deck v3.07.ppt

© 2014 IBM Corporation6262

Infrastructure (Network, Server and Endpoint) Distributed

Page 63: Build Deck v3.07.ppt

© 2014 IBM Corporation63

IBM Security Systems Portfolio

People Data Applications Network Infrastructure Endpoint

Identity Management

Guardium Data Security and Compliance

AppScan Source

Network Intrusion Prevention Trusteer Apex

Access Management

Guardium DB Vulnerability Management

AppScan Dynamic

Next Generation Network Protection

Mobile Security MaaS360 by Fiberlink

Privileged Identity Manager

Guardium / Optim Data Masking

DataPower WebSecurity Gateway

SiteProtectorThreat Management

Endpoint Security and Management

Federated Access and SSO

Key Lifecycle Manager

Security Policy Manager

NetworkAnomaly Detection

MainframeSecurity

IBM X-Force Research

Advanced Fraud Protection

Trusteer Rapport

Trusteer PinpointMalware Detection

Trusteer PinpointATO Detection

Trusteer Mobile Risk Engine

Security Intelligence and Analytics

QRadar Log Manager

QRadar SIEM

QRadar Risk Manager

QRadar Vulnerability Manager

The Infrastructure (Network, Server and Endpoint) Domain

Page 64: Build Deck v3.07.ppt

© 2014 IBM Corporation64

Generic Environment for Infrastructure

Page 65: Build Deck v3.07.ppt

© 2014 IBM Corporation65

Network-level Security and Protection

Page 66: Build Deck v3.07.ppt

© 2014 IBM Corporation66

NextGen Network-level Security and Protection

Page 67: Build Deck v3.07.ppt

© 2014 IBM Corporation67

Centralised Security Event Management

Page 68: Build Deck v3.07.ppt

© 2014 IBM Corporation68

Endpoint Management and Security

Page 69: Build Deck v3.07.ppt

© 2014 IBM Corporation69

Endpoint Management for Mobile

Page 70: Build Deck v3.07.ppt

© 2014 IBM Corporation70

Network Anomaly Detection … Complementing NIPS

Page 71: Build Deck v3.07.ppt

© 2014 IBM Corporation71

Centralised Security Information Management

Page 72: Build Deck v3.07.ppt

© 2014 IBM Corporation7272

Infrastructure for z

Page 73: Build Deck v3.07.ppt

© 2014 IBM Corporation73

IBM Security Systems Portfolio

People Data Applications Network Infrastructure Endpoint

Identity Management

Guardium Data Security and Compliance

AppScan Source

Network Intrusion Prevention Trusteer Apex

Access Management

Guardium DB Vulnerability Management

AppScan Dynamic

Next Generation Network Protection

Mobile Security MaaS360 by Fiberlink

Privileged Identity Manager

Guardium / Optim Data Masking

DataPower WebSecurity Gateway

SiteProtectorThreat Management

Endpoint Security and Management

Federated Access and SSO

Key Lifecycle Manager

Security Policy Manager

NetworkAnomaly Detection

MainframeSecurity

IBM X-Force Research

Advanced Fraud Protection

Trusteer Rapport

Trusteer PinpointMalware Detection

Trusteer PinpointATO Detection

Trusteer Mobile Risk Engine

Security Intelligence and Analytics

QRadar Log Manager

QRadar SIEM

QRadar Risk Manager

QRadar Vulnerability Manager

Infrastructure for z

Page 74: Build Deck v3.07.ppt

© 2014 IBM Corporation74

Generic Network, Server and Endpoint Environment

Page 75: Build Deck v3.07.ppt

© 2014 IBM Corporation75

Drilling into the Mainframe-specific Components

Page 76: Build Deck v3.07.ppt

© 2014 IBM Corporation76

Better Administration of External Security Manager Objects

Page 77: Build Deck v3.07.ppt

© 2014 IBM Corporation77

Mainframe System Audit, Reporting and Alerting

Page 78: Build Deck v3.07.ppt

© 2014 IBM Corporation78

Administering, Auditing and Reporting for z/VM

Page 79: Build Deck v3.07.ppt

© 2014 IBM Corporation79

Enterprise-wide Auditing and Alerting

Page 80: Build Deck v3.07.ppt

© 2014 IBM Corporation80

Mainframe Security and the Enterprise-wide Security Ecosystem

Page 81: Build Deck v3.07.ppt

© 2014 IBM Corporation81

Security Intelligence, Analytics &

GRC

People

Data

Applications

Infrastructure

Questions?

Page 82: Build Deck v3.07.ppt

© 2014 IBM Corporation82