200 likes | 207 Views
Discover how IBM Security Solutions can help you address the challenges of security in an increasingly instrumented, interconnected, and intelligent world. Protect your data, manage risks, and ensure compliance with our comprehensive security framework.
E N D
A New Security Blue Print- Smart Security for a Smarter Planet Vaidy Iyer (Leader, IBM Security Solutions) Document number
Why Security? • FEAR? • Insurance? • Business Enabler
What is Security? • Anti Virus? • Fire Wall? • IPS? • Products? • Process?
Evolution of IT Security • Mainframes • PC • Client Server • Thin Clients, hand helds • Remote Management • Smarter Systems
Introducing IBM Security Solutions Agenda • Is the Smarter Planet secure? • IT security challenges • Smart Security Solutions • Client value and benefits
Introducing IBM Security Solutions Is the smarter planet secure? The planet is getting more Instrumented, Interconnected and Intelligent. Newpossibilities. New risks... Pervasive instrumentation creates vast amounts of data New services built using that data, raises Privacyand Security concerns… Critical physical and IT infrastructure Sensitive information protection New denial of service attacks Increasing risks of fraud
Introducing IBM Security Solutions Security challenges in a smarter planet Key drivers for security projects Increasing Complexity Rising Costs Ensuring Compliance Soon, there will be 1 trillionconnected devices in the world, constituting an “internet of things” Spending by U.S. companies on governance, risk and compliance will grow to $29.8 billionin 2010 The cost of a data breach increased to $204 per compromised customer record Sourcehttp://searchcompliance.techtarget.com/news/article/0,289142,sid195_gci1375707,00.html
People are becoming more and more reliant on security IBM believes that security is progressively viewed as every individual’s right Introducing IBM Security Solutions Cost, complexity and compliance Emerging technology Data and information explosion Death by point products Rising Costs: Do more with less Compliance fatigue
Introducing IBM Security Solutions The IBM Security Framework foundation addresses your challenges of cost, complexity and compliance Build a strong foundation for IT security Create and sustainsecurity governance Manage risk Ensure compliance Click for more information
Introducing IBM Security Solutions In addition to the foundational elements, the Framework identifies five security focus areas as starting points GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE Design, and deploy a strong foundation for security & privacy GRC PEOPLE AND IDENTITY Mitigate the risks associated with user access to corporate resources DATA AND INFORMATION Understand, deploy, and properly test controls for access to and usage of sensitive data APPLICATION AND PROCESS Keep applications secure, protected from malicious or fraudulent use, and hardened against failure NETWORK, SERVER AND END POINT Optimize service availability by mitigating risks to network components PHYSICAL INFRASTRUCTURE Provide actionable intelligence on the desired state of physical infrastructure security and make improvements Click for more information 9
Click for more information Introducing IBM Security Solutions IBM Security portfolio can help you meet challenges in each security focus area Framework Typical enterprise activities GOVERNANCE, RISK MGMT, COMPLIANCE • Security Strategy Design • Pen Testing & Vulnerability Assessment • Security Compliance Assessment • Incident Response GRC PEOPLE AND IDENTITY • Manage identities • Control access to applications • Audit, report and manage access to resources DATA AND INFORMATION • Protect Critical Databases • Messaging Security and Content Filtering • Monitor & manage data access • Prevent Data Loss • Encrypt sensitive data APPLICATION AND PROCESS • Ensure Security in App Development • Discover App Vulnerabilities • Embed App Access Controls • Provide SOA Security NETWORK, SERVERS & ENDPOINTS • Protect Servers, Endpoints, Networks, Mainframes PHYSICAL INFRASTRUCTURE • Provide Video Surveillance • Establish Command and Control • Capture video analytics • Manage security across all assets
Introducing IBM Security Solutions Security governance, risk management and compliance BUSINESS VALUE Ensure comprehensive management of security activities and compliance with all security mandates This is not intended to be a comprehensive list of all IBM products and services 12
People and identity Introducing IBM Security Solutions BUSINESS VALUE Lower costs and mitigate the risks associated with managing user access to corporate resources This is not intended to be a comprehensive list of all IBM products and services 13
Data and information Introducing IBM Security Solutions BUSINESS VALUE Understand, deploy and properly test controls for access to and usage of sensitive business data This is not intended to be a comprehensive list of all IBM products and services 14 * "Fifth Annual U.S. Cost of Data Breach Study”, Ponemon Institute, Jan 2010
Application and process Introducing IBM Security Solutions BUSINESS VALUE Keep applications secure, protected from malicious or fraudulent use, and hardened against failure * IBM X-Force Annual Report, Feb 2009 ** Applied Software Measurement, Caper Jones, 1996 This is not intended to be a comprehensive list of all IBM products and services 15
Storage Systems Virtual Network Introducing IBM Security Solutions Network, server and end point BUSINESS VALUE Optimize service availability by mitigating risks while optimizing expertise, technology and process This is not intended to be a comprehensive list of all IBM products and services * Gartner Desktop Total Cost of Ownership: 2008 Update, Jan 2008 16
Physical infrastructure Introducing IBM Security Solutions BUSINESS VALUE Provide actionable intelligence and improve effectiveness of physical infrastructure security This is not intended to be a comprehensive list of all IBM products and services 17
Introducing IBM Security Solutions The IBM Security Framework foundation addresses your challenges of cost, complexity and compliance Build a strong foundation for IT security Create and sustainsecurity governance Manage risk Ensure compliance Click for more information
Some possible scenarios…. • Attack on GPS • GPS is connected to public networks • An outsourced contractor’s kid down loading an innocuous software could bring the system down! • Attack on carrier hotels • Location where all communication points meet up • Eg: One Wilshire, LA, California! • Cyber-Hijacking, Blackmail, Ransom • Control the software on pacemaker! • Solar Cycle expected in 2012 • CME (Coronal Magnetic Emission) could cripple satellite communication • Polar Shift