Top Banner
IBM Software IBM Security: Intelligence, Integration, Expertise One of the broadest, most advanced and integrated enterprise security product and service portfolios “Enterprise security is no longer about technology alone. It has clearly become a strategic business priority for the board of directors.” —Brendan Hannigan, General Manager, IBM Security Systems Highlights Utilize Security Intelligence to help detect, predict and remediate breaches that may not be detected by point products alone “Plug the holes” of competitive point product approaches with an integrated solution from the recently formed IBM Security Systems division Enable today’s cutting-edge technology platforms, from mobility to cloud to social A Hyper-connected Business World The era of big data has arrived with an explosion of digital business information accessed from, and stored on, virtualized cloud and social platforms, and on mobile devices that are part consumer, part business. Everything is everywhere. The complexity is overwhelming; the possible points of attack near limitless. By traditional metrics, the IT security industry has recently shown significant improvement in the fight to secure this environment. But the attacks have recently grown in sophistication, severity and frequency— leading to 2011 being declared “The Year of the Security Breach” by the renowned IBM X-FORCE® research and development team. 1 Ranging from cybercrime to apparent state-sponsored and terror-inspired motiva- tions, these attacks leave no one immune. And in an environment where business is increasingly dependent upon a company’s online presence, today’s threats are directly aimed at the business, not the technology.
6

IBM Security: Intelligence, Integration, Expertisepublic.dhe.ibm.com/.../IBM_Security_Intelligence_Integration_Expertis… · IBM Security: Intelligence, Integration, Expertise .

Oct 18, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IBM Security: Intelligence, Integration, Expertisepublic.dhe.ibm.com/.../IBM_Security_Intelligence_Integration_Expertis… · IBM Security: Intelligence, Integration, Expertise .

IBM Software

IBM Security: Intelligence, Integration, Expertise One of the broadest, most advanced and integrated enterprise security product and service portfolios

“Enterprise security is no longer about technology alone. It has clearly become a strategic business priority for the board of directors.”

—Brendan Hannigan, General Manager, IBM Security Systems

Highlights●● Utilize Security Intelligence to help detect, predict and remediate

breaches that may not be detected by point products alone●● “Plug the holes” of competitive point product approaches with an

integrated solution from the recently formed IBM Security Systems division ●● Enable today’s cutting-edge technology platforms, from mobility to

cloud to social

A Hyper-connected Business WorldThe era of big data has arrived with an explosion of digital business information accessed from, and stored on, virtualized cloud and social platforms, and on mobile devices that are part consumer, part business. Everything is everywhere. The complexity is overwhelming; the possible points of attack near limitless.

By traditional metrics, the IT security industry has recently shown significant improvement in the fight to secure this environment. But the attacks have recently grown in sophistication, severity and frequency—leading to 2011 being declared “The Year of the Security Breach” by the renowned IBM X-FORCE® research and development team.1 Ranging from cybercrime to apparent state-sponsored and terror-inspired motiva-tions, these attacks leave no one immune. And in an environment where business is increasingly dependent upon a company’s online presence, today’s threats are directly aimed at the business, not the technology.

Page 2: IBM Security: Intelligence, Integration, Expertisepublic.dhe.ibm.com/.../IBM_Security_Intelligence_Integration_Expertis… · IBM Security: Intelligence, Integration, Expertise .

2

Traditional Defenses BypassedDesigned to gain continuous access to critical business information, Advanced Persistent Threats are the new reality. These attacks utilize cutting-edge methodologies, can last for long periods of time and are specifically targeted. These meth-ods have eroded the effectiveness of traditional IT defenses including firewalls and antivirus solutions—even bypassing these controls completely in some cases. A fundamentally different security approach is required to help secure today’s enterprise, not only with effective technology, but with rigorous processes and organization. Siloed point products protecting only the perimeter are no longer enough.

2011 Sampling of Security Incidents by Attack Type, Time and Impactconjecture of relative breach impact is based on publicly disclosed information regarding leaked records and financial losses

Attack Type

SQL Injection

URL Tampering

Spear Phishing

3rd Party Software

DDos

SecureID

Trojan Software

Unknown

Size of circle estimates relative impact ofbreach in terms of cost to business

Jan Feb March April May June July Aug Sep Oct Nov Dec

GamingGaming

Gaming

Gaming

Gaming

Gaming

Gaming

Gaming

Gaming

IT Security

Consulting

Defence

FinancialMarket

Insurance

Gaming

InternetServices

MarketingServices

InternetServices

AgricultureConsumerElectronics

Tele-communications

GovernmentConsulting

OnlineServices

Online Services

ConsumerElectronicsNational

Police

NationalPolice

NationalPolice

Banking

Banking

IT Security

IT Security

Entertainment

Entertainment

Entertainment

Defense

Defense

Defense

ConsumerElectronics

StatePolice

StatePolice

CentralGovernment

CentralGovernment

CentralGovernment

CentralGovernment

CentralGovernment

CentralGovernment

CentralGovernment

CentralGovernment

CentralGovernment

CentralGovernment

HeavyIndustry

ConsumerElectronics

Consulting

CentralGovernment

Apparel

Labeled as “The Year of the Security Breach” by the IBM X-FORCE research and development team, 2011 was marked by a high volume of severe and varied security attacks.

Traditional defenses are no longer sufficient.

IBM Software

Page 3: IBM Security: Intelligence, Integration, Expertisepublic.dhe.ibm.com/.../IBM_Security_Intelligence_Integration_Expertis… · IBM Security: Intelligence, Integration, Expertise .

3

Introducing the IBM Security Systems divisionAt the beginning of 2012, IBM formed the Security Systems division to develop the integrated strategy and roadmap needed in today’s environment of ever-increasing security complexity. To help address the overwhelming need for enterprise security in today’s hyper-connected, big data, everything-is-everywhere business world, IBM based this division on three main tenets—Intelligence, Integration and Expertise.

IntelligenceLeveraging deep IBM expertise in analytics, the first tenet is Security Intelligence: millions of events are processed in real-time to help detect, predict and remediate breaches that no other system can.

IntegrationThe second tenet is the integration of the IBM portfolio of Security Intelligence, X-FORCE research and core protection assets. This helps collapse data silos for easier compliance

IBM Security Framework

Governance, Risk and Compliance

Security Intelligence

Advanced Securityand Threat Research

and Analytics

Pro

fess

iona

l Ser

vice

s

Peo

ple

Dat

a

App

licat

ions

Infr

astr

uctu

re

Clo

ud a

nd M

anag

ed S

ervi

ces

Software and Appliances

The IBM approach to security is multilayered.

The integration of Security Intelligence, X-FORCE research and core protection assets is a powerful combination.

Integrated Intelligence. Integrated Research. Integrated Protection.3rd Party

Ecosystem

Security Intelligence

Peop

le

Applications

Advanced Research

Infrast

ruct

ure

Data

Security Intelligence

Peop

le

Applications

Advanced Research

Infrast

ruct

ure

Data

Security Intelligence

Peop

le

Applications

Advanced Research

Infrast

ruct

ure

Data

IBM Software

Page 4: IBM Security: Intelligence, Integration, Expertisepublic.dhe.ibm.com/.../IBM_Security_Intelligence_Integration_Expertis… · IBM Security: Intelligence, Integration, Expertise .

4

reporting and improved Security Intelligence, reduce complex-ity and lower the cost of maintaining a strong security posture. In addition, integration:

●● Provides external and internal contextual information to help breach detection, prediction and remediation

●● Automates updates for devices and software for researched vulnerabilities

●● Can link authentication and authorization with suspicious database activity

●● Automates compliance and risk assessment activities

ExpertiseWith more than 6,000 researchers, developers and subject mat-ter experts engaged in security initiatives, IBM operates one of the world’s broadest enterprise security research, development

and delivery organizations. This powerful combination of expertise is made up of the award-winning X-FORCE research and development team—with one of the largest vulnerability databases in the industry—and includes nine security operations centers, nine IBM Research centers, 14 software security development labs and the IBM Institute for Advanced Security with chapters in the United States, Europe and the Asia Pacific region.

IBM currently monitors more than 13 billion security events per day for its clients in more than 130 countries. IBM has the consultants and expertise to help any organization move toward optimized, integrated security controls with Security Intelligence.

Security Operations Centers

Costa Mesa, US

Atlanta, US

Atlanta, USRaleigh, US

Haifa, IL Pune, IN

Bangalore, IN

Bangalore, IN

New Delhi, IN

Perth, AU

Brisbane, AU

Singapore, SG

Taipei, TW

Tokyo, JP

Tokyo, JP

Gold Coast, AU

IAS, Asia Pacific

Brussels, BE

Atlanta, US

Hortolândia, BR

Austin, US

Alamden, USBoulder, US

Ottawa, CA

Waltham, US Fredericton, CA Belfast, N IR

Zurich, CH

Delft, NL

Herzliya, IL

IAS, EuropeToronto, CA

TJ Watson, US

Detroit, US

IAS, Americas

Security Research Centers

Security Solution Development Centers

Institute for Advanced Security Branches

IBM operates one of the world’s broadest security research and development and delivery organizations.

IBM Software

Page 5: IBM Security: Intelligence, Integration, Expertisepublic.dhe.ibm.com/.../IBM_Security_Intelligence_Integration_Expertis… · IBM Security: Intelligence, Integration, Expertise .

5

From Mobility to Cloud to Social: a framework of capabilities for any environmentToday’s cutting-edge environments can bring tremendous opportunity as well as risk. The IBM integrated and compre-hensive approach to security—reaching across People, Data, Applications and Infrastructure—provides the core structure for an adaptive approach when implementing new technologies, now or with unknown futures.

For more informationTo learn more about IBM Security, please contact your IBM representative or IBM Business Partner, or visit: ibm.com/security

To join the Institute for Advanced Security, please visit: www.instituteforadvancedsecurity.com

IBM. Security Intelligence. Think Integrated.

SecurityIntelligence

Optimized

Proficient

Basic

People Data InfrastructureApplications

Security Intelligence:Information and event management

Advanced correlation and deep analyticsExternal threat research

Role based analytics

Identity governance

Privileged usedcontrols

Data flow analytics

Data governance

User provisioning

Access management

Strong authentication

Centralized directory Application scanningPerimeter security

Anti-virus

Encryption

Access control

Database vulnerabilitymonitoring

Access monitoring

Data loss prevention

Application firewall

Source codescanning

Virtualization security

Asset management

Endpoint / networksecurity management

Secure appengineeringprocesses

Fraud detection

Advanced networkmonitoring

Forensics / datamining

Security rich systems

IBM Security products have many leading capabilities in every segment.

IBM Software

Page 6: IBM Security: Intelligence, Integration, Expertisepublic.dhe.ibm.com/.../IBM_Security_Intelligence_Integration_Expertis… · IBM Security: Intelligence, Integration, Expertise .

About IBM SecurityThe IBM security portfolio provides security intelligence to help organizations holistically protect their people, infrastruc-ture, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. IBM Security products, services and expertise enable organizations to more effectively manage risk and implement integrated security solutions for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research and development and delivery organizations. This comprises nine security operations centers, nine IBM Research centers, 11 software security development labs and an Institute for Advanced Security with chapters in the United States, Europe and Asia Pacific. IBM monitors 13 billion security events per day in more than 130 countries and holds more than 3,000 security patents.

Additionally, IBM Global Financing can help you acquire the software capabilities that your business needs in the most cost-effective and strategic way possible. We’ll partner with credit-qualified clients to customize a financing solution to suit your business and development goals, enable effective cash management, and improve your total cost of ownership. Fund your critical IT investment and propel your business forward with IBM Global Financing. For more information, visit: ibm.com/financing

© Copyright IBM Corporation 2012

IBM Corporation Software Group Route 100 Somers, NY 10589

Produced in the United States of America June 2012

IBM, the IBM logo, ibm.com, and X-FORCE are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml

This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates.

THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided.

IT system security involves protecting systems and information through prevention, detection, and response to improper access from within and outside your enterprise. Improper access can result in information being altered destroyed or misappropriated or can result in misuse of your systems to attack others. Without a comprehensive approach to security, no IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products, or services to be most effective. IBM does not warrant that systems and products are immune from the malicious or illegal conduct of any party.

1 ”IBM X-FORCE 2011 Trend & Risk Report,” page 12, IBM, March 2012, http://public.dhe.ibm.com/common/ssi/ecm/en/ wgl03012usen/WGL03012USEN.PDF

Please Recycle

WGE03018-USEN-00