1 / 20

Document number

Discover how IBM Security Solutions can help you address the challenges of security in an increasingly instrumented, interconnected, and intelligent world. Protect your data, manage risks, and ensure compliance with our comprehensive security framework.

brendaa
Download Presentation

Document number

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A New Security Blue Print- Smart Security for a Smarter Planet Vaidy Iyer (Leader, IBM Security Solutions) Document number

  2. Why Security? • FEAR? • Insurance? • Business Enabler

  3. What is Security? • Anti Virus? • Fire Wall? • IPS? • Products? • Process?

  4. Evolution of IT Security • Mainframes • PC • Client Server • Thin Clients, hand helds • Remote Management • Smarter Systems

  5. Introducing IBM Security Solutions Agenda • Is the Smarter Planet secure? • IT security challenges • Smart Security Solutions • Client value and benefits

  6. Introducing IBM Security Solutions Is the smarter planet secure? The planet is getting more Instrumented, Interconnected and Intelligent. Newpossibilities. New risks... Pervasive instrumentation creates vast amounts of data New services built using that data, raises Privacyand Security concerns… Critical physical and IT infrastructure Sensitive information protection New denial of service attacks Increasing risks of fraud

  7. Introducing IBM Security Solutions Security challenges in a smarter planet Key drivers for security projects Increasing Complexity Rising Costs Ensuring Compliance Soon, there will be 1 trillionconnected devices in the world, constituting an “internet of things” Spending by U.S. companies on governance, risk and compliance will grow to $29.8 billionin 2010 The cost of a data breach increased to $204 per compromised customer record Sourcehttp://searchcompliance.techtarget.com/news/article/0,289142,sid195_gci1375707,00.html

  8. People are becoming more and more reliant on security IBM believes that security is progressively viewed as every individual’s right Introducing IBM Security Solutions Cost, complexity and compliance Emerging technology Data and information explosion Death by point products Rising Costs: Do more with less Compliance fatigue

  9. Introducing IBM Security Solutions The IBM Security Framework foundation addresses your challenges of cost, complexity and compliance Build a strong foundation for IT security Create and sustainsecurity governance Manage risk Ensure compliance Click for more information

  10. Introducing IBM Security Solutions In addition to the foundational elements, the Framework identifies five security focus areas as starting points GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE Design, and deploy a strong foundation for security & privacy GRC PEOPLE AND IDENTITY Mitigate the risks associated with user access to corporate resources DATA AND INFORMATION Understand, deploy, and properly test controls for access to and usage of sensitive data APPLICATION AND PROCESS Keep applications secure, protected from malicious or fraudulent use, and hardened against failure NETWORK, SERVER AND END POINT Optimize service availability by mitigating risks to network components PHYSICAL INFRASTRUCTURE Provide actionable intelligence on the desired state of physical infrastructure security and make improvements Click for more information 9

  11. Click for more information Introducing IBM Security Solutions IBM Security portfolio can help you meet challenges in each security focus area Framework Typical enterprise activities GOVERNANCE, RISK MGMT, COMPLIANCE • Security Strategy Design • Pen Testing & Vulnerability Assessment • Security Compliance Assessment • Incident Response GRC PEOPLE AND IDENTITY • Manage identities • Control access to applications • Audit, report and manage access to resources DATA AND INFORMATION • Protect Critical Databases • Messaging Security and Content Filtering • Monitor & manage data access • Prevent Data Loss • Encrypt sensitive data APPLICATION AND PROCESS • Ensure Security in App Development • Discover App Vulnerabilities • Embed App Access Controls • Provide SOA Security NETWORK, SERVERS & ENDPOINTS • Protect Servers, Endpoints, Networks, Mainframes PHYSICAL INFRASTRUCTURE • Provide Video Surveillance • Establish Command and Control • Capture video analytics • Manage security across all assets

  12. Introducing IBM Security Solutions Security governance, risk management and compliance BUSINESS VALUE Ensure comprehensive management of security activities and compliance with all security mandates This is not intended to be a comprehensive list of all IBM products and services 12

  13. People and identity Introducing IBM Security Solutions BUSINESS VALUE Lower costs and mitigate the risks associated with managing user access to corporate resources This is not intended to be a comprehensive list of all IBM products and services 13

  14. Data and information Introducing IBM Security Solutions BUSINESS VALUE Understand, deploy and properly test controls for access to and usage of sensitive business data This is not intended to be a comprehensive list of all IBM products and services 14 * "Fifth Annual U.S. Cost of Data Breach Study”, Ponemon Institute, Jan 2010

  15. Application and process Introducing IBM Security Solutions BUSINESS VALUE Keep applications secure, protected from malicious or fraudulent use, and hardened against failure * IBM X-Force Annual Report, Feb 2009 ** Applied Software Measurement, Caper Jones, 1996 This is not intended to be a comprehensive list of all IBM products and services 15

  16. Storage Systems Virtual Network Introducing IBM Security Solutions Network, server and end point BUSINESS VALUE Optimize service availability by mitigating risks while optimizing expertise, technology and process This is not intended to be a comprehensive list of all IBM products and services * Gartner Desktop Total Cost of Ownership: 2008 Update, Jan 2008 16

  17. Physical infrastructure Introducing IBM Security Solutions BUSINESS VALUE Provide actionable intelligence and improve effectiveness of physical infrastructure security This is not intended to be a comprehensive list of all IBM products and services 17

  18. Introducing IBM Security Solutions The IBM Security Framework foundation addresses your challenges of cost, complexity and compliance Build a strong foundation for IT security Create and sustainsecurity governance Manage risk Ensure compliance Click for more information

  19. Some possible scenarios…. • Attack on GPS • GPS is connected to public networks • An outsourced contractor’s kid down loading an innocuous software could bring the system down! • Attack on carrier hotels • Location where all communication points meet up • Eg: One Wilshire, LA, California! • Cyber-Hijacking, Blackmail, Ransom • Control the software on pacemaker! • Solar Cycle expected in 2012 • CME (Coronal Magnetic Emission) could cripple satellite communication • Polar Shift

  20. Introducing IBM Security Solutions

More Related