Top Banner
IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader
23

IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.

Jan 15, 2016

Download

Documents

Dorcas Richard
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.

IBM Security A New Era of Securityfor a New Era of Computing

Pelin Konakcı

IBM Security Software Sales Leader

Page 2: IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.

© 2015 IBM Corporation

IBM Security

2

New technologies introduce new risks…

Page 3: IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.

© 2015 IBM Corporation

IBM Security

3

Security leaders are more accountable than ever before

Page 4: IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.

© 2015 IBM Corporation

IBM Security

4

IBM Security invests in best-of-breed technologies

Page 5: IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.

© 2015 IBM Corporation

IBM Security

5

IBM Security Strategy

Page 6: IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.

© 2015 IBM Corporation

IBM Security

6

IBM helps protect against new, complex security challenges

Page 7: IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.

© 2015 IBM Corporation

IBM Security

7

Optimize your security programIntegrate security silos, reduce complexity, and lower costs

Page 8: IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.

© 2015 IBM Corporation

IBM Security

8

Stop advanced threatsUse analytics and insights for smarter integrated defense

Page 9: IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.

© 2015 IBM Corporation

IBM Security

9

Introducing the IBM Threat Protection System

Page 10: IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.

© 2015 IBM Corporation

IBM Security

10

Focus on critical points in the attack chain with preemptive defenses on both the endpoint and network

Page 11: IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.

© 2015 IBM Corporation

IBM Security

11

Continuously monitor security-relevant activity from across the entire organization

Page 12: IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.

© 2015 IBM Corporation

IBM Security

12

Intelligent, integrated and automated vulnerability management

Page 13: IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.

© 2015 IBM Corporation

IBM Security

14

Rapidly investigate breaches, retrace activity, and learn from findings to remediate weaknesses

Page 14: IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.

© 2015 IBM Corporation

IBM Security

15

Share, analyze, and act upon information gathered from an ecosystem of third-party products

Page 15: IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.

© 2015 IBM Corporation

IBM Security

16

Protect critical assetsUse context-aware, role-based controls to help prevent unauthorized access

Page 16: IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.

© 2015 IBM Corporation

IBM Security

17

End-to-end products and services to protect your critical assets

Page 17: IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.

© 2015 IBM Corporation

IBM Security

18

Page 18: IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.

© 2015 IBM Corporation

IBM Security

19

Cloud is rapidly transforming the enterprise

Page 19: IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.

© 2015 IBM Corporation

IBM Security

20

IBM Cloud Security Portfolio

Page 20: IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.

© 2015 IBM Corporation

IBM Security

21

IBM Security solutions for the mobile enterprise

Page 21: IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.

© 2015 IBM Corporation

IBM Security

22 -

Identity and Access Governance

Guardium Data Security

AppScan Source

Network Intrusion Prevention

Trusteer Apex

Identity and Access Management

Guardium Database Vulnerability Mgmt

AppScan Dynamic

Next Generation Network Protection

Mobile & Endpoint Management

Privileged Identity Management

Guardium / Optim Data Masking

DataPower SOA Security

SiteProtectorThreat Management

Virtualization and Server Security

Federated Access and SSO

Key Lifecycle Manager

Security Policy ManagerNetwork

Anomaly DetectionMainframeSecurity

IBM X-Force and Trusteer Threat Intelligence

Advanced Fraud Protection

Trusteer RapportTrusteer Pinpoint Malware Detection

Trusteer Pinpoint ATO Detection

Trusteer Mobile Risk Engine

Security Intelligence and Analytics

Strategy, Risk and Compliance

Security Maturity Benchmarking

Security Strategy andRoadmap Development

Security Risk Assessment and Program Design

Industrial Controls(NIST, SCADA)

Payment Card Advisory(PCI)

Identity Strategy and Assessment

Data Security and Assessment

Embedded Device TestingFirewall / IDPS / UTM Management

Web Protection and Managed DDoS

User Provisioning and Access Mgmt

Encryption Penetration TestingHosted Web, E-mail and Vulnerability Management

Deployment and Migration

Total Authentication Solution Data Loss

Prevention

Application Security Assessment

Staff AugmentationManaged and Cloud Identity

Mobile Application Testing

People Data Applications Network InfrastructureEndpoin

t

Emergency Response Managed SIEM Incident Planning Cyber Threat Intel Security Operations Center Design Services

QRadar SIEM QRadar Log Manager QRadar Risk Mgr QRadar Vulnerability Mgr QRadar Incident Forensics

The IBM Security PortfolioServices

Products

Cybersecurity Assessment and Response

Threat Intelligence Advisory X-Force Threat Analysis Penetration Testing Incident Preparation Emergency Response

Page 22: IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.

© 2015 IBM Corporation

IBM Security

23

Learn more about IBM Security

Page 23: IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.

© 2015 IBM Corporation

IBM Security

24