Upload
others
View
31
Download
0
Embed Size (px)
Citation preview
IBM Security nie iba QRadar
Tomáš Pokorný
IBM Security SW sales manager, Central Europe region
2 IBM Security
Look familiar?
Criminal detection
Fraud protection
Data access control
Application security management
Applicationscanning
Data protection
Device managementTransaction protection
Content security
Malware protection
Endpoint detectionand response
Endpoint patching and management
Network forensics and threat management
Virtual patching
Firewalls
Sandboxing
Network visibility and segmentation
Access management
Identity governance and administration
Privileged user management
IDaaS
Indicators of compromise
Malware analysis
Threat sharing
Vulnerability management
Security analytics
Threat and anomaly detection
Incident response
User behavior analytics
Threat hunting and investigation
Mainframe security
3 IBM Security
Criminal detection
Fraud protection
Data access control
Application security management
Applicationscanning
Data protection
Device management
Transaction protection
Content security
Malware protection
Endpoint detectionand response
Endpoint patching and management
Network forensics and threat management
Virtual patching
Firewalls
Sandboxing
Network visibility and segmentation
Access management
Identity governance and administration
Privileged user management
IDaaS
Mainframe security
Indicators of compromise
Malware analysis
Threat sharing
SECURITY ECOSYSTEM
SECURITYORCHESTRATION
& ANALYTICS
DATA
APPSIDENTITY& ACCESS
MOBILEADVANCED
FRAUD
THREATINTEL
ENDPOINT NETWORK
Vulnerability management
Security analytics
Threat and anomaly detection
Incident response
User behavior analytics
Threat hunting and investigation
4 IBM Security
PROVECOMPLIANCE
Transform Your Security Program
STOP THREATS
Build a Cognitive SOC
GROW BUSINESS
Secure digital transformation
Get
Ahead of
Compliance
Enhance
Security
Hygiene
Govern
Users and
Identities
Detect & Stop
Advanced
Threats
Orchestrate Incident
Response
Master Threat
Hunting
Secure Hybrid Cloud
Protect Critical Assets
Prevent Advanced
Fraud
OUTCOME-DRIVEN SECURITY
5 IBM Security
PROVECOMPLIANCE
Transform Your Security Program
STOP THREATS
Build a Cognitive SOC
GROW BUSINESS
Secure Digital Transformation
• Guardium
• AppScan / ASoC
• BigFix
• MaaS360
• Trusteer
• Cloud Identity
• QRadar
Detect & Stop
Advanced
Threats
• QRadar + Advisor
• QRadar UBA
• Resilient
• i2
• Identity Governance
• Access Manager / Cloud Identity
• SKLM
• Identity Governance
• Access Manager / Cloud Identity
• Guardium
• Data Risk Manager
• BigFix
• QRadar
Orchestrate Incident
Response
Get
Ahead of
Compliance
Enhance
Security
Hygiene
Govern
Users and
Identities
Master Threat Hunting
Secure Hybrid Cloud
Protect Critical Assets
Prevent Advanced
Fraud
Outcome based security
6 IBM Security
Infirmary Health
System helps secure
endpoints and
eliminate threats,
while meeting all
data security
requirements and
compliance for
federal incentives.90%patch compliance
Went from an average of 40% patch compliance to 90%
95%lower time and cost
Reduced endpoint licensing costs and reduced time to deploy software by 95%
Help customers prove compliance
7 IBM Security
IBM Security helps
protect the oldest
brand in tennis
with the latest
innovation in
security AI and
analytics.
60x fastersecurity threat investigations with Watson compared to manual analysis
5x increasein volume of security incidents analyzed over the course of the tournament
Zerobreaches impacted the 2017 Wimbledon website and brand
Help customers stop threats
8 IBM Security
IBM Security: Leader across 12 out of 12 security market segments
DOMAIN SEGMENT MARKET SEGMENT / REPORTANALYST
RANKINGS
Security Operations and Response
Security Intelligence Security Information and Event Management (SIEM) LEADER
Network & Endpoint Protection Endpoint: Client Management Tools LEADER
Information Risk
and Protection
Identity Governance
& Access Management
Identity and Access Governance LEADER
Access Management (worldwide) LEADER
Identity and Access Management as a Service (IDaaS) LEADER
Identity Provisioning Management LEADER
Data Security Database Security LEADER
Application Security Application Security Testing (dynamic and static) LEADER
Mobile Protection Enterprise Mobility Management (MaaS360) LEADER
Fraud Protection Web Fraud Detection (Trusteer) LEADER
Security
Transformation
Services
Consulting and
Managed Services
Managed Security Services (MSS) LEADER
Information Security Consulting Services LEADER
Note: This is a collective view of top analyst rankings, compiled as of November 2017
9 IBM Security
IBM SECURITY LEADS THE MAGIC QUADRANT RANKINGS
0 1 2 3 4 5 6 7 8 9 10
Tanium
FireEye
Imperva
Splunk
Palo Alto
McAfee
Symantec
Microsoft
Cisco
IBM Security
MQ Leader MQ Appear
IBM AND BUSINESS PARTNER INTERNAL USE ONLY
10 IBM Security
Open partner ecosystem200+ ecosystem partners, 500+ QRadar integrations
… …
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products
and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service
marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your
enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.
No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,
products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products
or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
FOLLOW US ON:
THANK YOU