© 2011 IBM Corporation Building a Smarter Planet Smarter Approach to Stop Threats Before They Impact Your Business Hong Kong 22 Sep 2011 Venkatesh Sadayappan.

Slides:



Advertisements
Similar presentations
Managing Risk and Enabling Business Transformation
Advertisements

© 2010 IBM Corporation Document number A New Security Blue Print- Smart Security for a Smarter Planet Vaidy Iyer (Leader, IBM Security Solutions)
Top Questions Executives and Board Members Should be Asking About IT and Cloud Risks.
SPEAKER BLITZ ERIC BROWN Senior Systems Engineer NICK JAVANOVIC DoD Regional Sales Manager.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Karolina Muszyńska Based on
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
© 2011 IBM Corporation Smarter Software for a Smarter Planet The Capabilities of IBM Software Borislav Borissov SWG Manager, IBM.
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM X-Force: The Emerging Threat Landscape Michael P. Hamelin Lead X-Force Security.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
IBM Academic Initiative Skills for a Smarter Planet Cloud Computing John Schilt Lead, IBM Academic Initiative Australia / New Zealand
Unify and Simplify: Security Management
Joseph Ferracin Director IT Security Solutions Managing Security.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Dell Connected Security Solutions Simplify & unify.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
The Changing World of Endpoint Protection
Security Business Partner Guide Value Propositions
© 2012 IBM Corporation IBM Security Services smarter security for a smarter planet.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Catherine Lian Managing Director, Dell Indonesia
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Smart Planet The IBM Smart Planet initiative concentrates on the world’s infrastructure, those systems and processes that enable goods to be developed,
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Reach us at Call: | Visit:
Complete Cloud Security Anyone, anywhere, any app, any device.
IT Security Mandatory Solutions Andris Soroka 2nd of July, RIGA.
Database Encryption Market to Global Analysis and Forecasts by Types, End User and Deployment Type No of Pages: 150 Publishing Date: Jan 2017 Single.
Identity and Access Management Market to Global Analysis and Forecasts by Industries, Services No of Pages: 150 Publishing Date: Feb 2017 Single.
Private Cloud Market to Global Analysis and Forecasts by Services, Applications No of Pages: 150 Publishing Date: Feb 2017 Single User PDF: US$
Private Cloud Market to Global Analysis and Forecasts by Services, Applications No of Pages: 150 Publishing Date: Apr 2017 Single User PDF: US$
Private Cloud Market to Global Analysis and Forecasts by Services, Applications No of Pages: 150 Publishing Date: May 2017 Single User PDF: US$
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Journey to Microsoft Secure Cloud
Real-time protection for web sites and web apps against ATTACKS
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Cloud Security Market Share
Securing Information Systems
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Dynamic Application Security.
Company Overview & Strategy
Threat Landscape for Data Security
Strong Security for Your Weak Link:
Securing the Threats of Tomorrow, Today.
Powerful Partnerships with Industry Leaders
Microsoft Data Insights Summit
In the attack index…what number is your Company?
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
STEALTHbits Technologies, Inc.
Global Cyber Security Market (By Product Segments, Service Segments, Industry Verticals, Geography, Recent Developments) - Forecast to 2025
Presentation transcript:

© 2011 IBM Corporation Building a Smarter Planet Smarter Approach to Stop Threats Before They Impact Your Business Hong Kong 22 Sep 2011 Venkatesh Sadayappan Security Solutions Consultant IBM Security Tiger Team IBM Worldwide

© 2011 IBM Corporation With security threat evolving…. ….we must also evolve our approach to anticipate change! 2

© 2011 IBM Corporation The world is becoming more digitized and interconnected, opening the door to emerging threats and leaks 3 WORLDWIDE DATA VOLUMES PROJECTED TO INCREASE 29X OVER 10 YEARS (Data Volume Zetabytes*) “There are security leaks involving mobile browsers that we don’t even know enough about yet.” - CIO, Media Company * 1 Zetabyte = bytes = 1 trillion Gigabytes 35,000 Zetabytes* 1,800 Zetabytes* CAGR 60% EXPLODING DIGITAL UNIVERSE Two billion internet users 50 billion connected objects (cars, appliances, cameras) Five billion mobile phones 30 billion RFID tags (products, passports, buildings, animals) *Source: International Telecommunications Union. “Global Number of Internet Users, total and per 100 Inhabitants, ” United Nations. D/ict/statistics/material/excel/2010/Internet_users_00-10_2.xls; Ericsson. “More than 50 billion connected devices – taking connected devices to mass market and profitability.” February 14, IDC “Digital Universe Study,” sponsored by EMC. May 2010http:// D/ict/statistics/material/excel/2010/Internet_users_00-10_2.xlshttp://

© 2011 IBM Corporation Security has moved from an IT issue to an ongoing business concern 4 STUXNET Targeted changes to process controllers refining uranium IMPACT Degraded ability to safely process and control highly volatile materials Complexity of malware and affect critical business processes HKEx DDoS attacks targeted on website and brought it down IMPACT Trading of stocks suspended for nearly 7 companies; loss of image Malicious attack on web server by outside hacking WIKILEAKS Unauthorized release of classified records IMPACT Damaged US foreign relations worldwide Internal abuse of key sensitive information

© 2011 IBM Corporation Evolving Threats - expanding e-Crime

© 2011 IBM Corporation6 3,000+ security and risk management patents 15,000 researchers, developers and SMEs on security initiatives s e c u r i t y c u s t o m e r r e f e r e n c e s a n d p u b l i s h e d c a s e s t u d i e s y e a r s o f p r o v e n s u c c e s s s e c u r i n g t h e z S e r i e s e n v i r o n m e n t 9 Security Operations Centers 9 Security Research Centers 133 Monitored Countries 20,000+ Devices under Contract 3,700+ MSS Clients Worldwide 20 Billion+ Events Per Day IBM Global Security Reach and Expertise

© 2011 IBM Corporation IBM X-Force: Vendors Reporting the Largest Number of Vulnerability Disclosures in History More than 8000 Vulnerability disclosures in 2010 and up 27%.

© 2011 IBM Corporation IBM X-Force: Web App Vulnerabilities Continue to Dominate Nearly half ( 49% ) of all vulnerabilities are Web application vulnerabilities. Cross-Site Scripting & SQL injection vulnerabilities continue to dominate.

© 2011 IBM Corporation IBM X-Force: Proliferation of Mobile Devices Raises Security Concerns Significant increases in the number of vulnerabilities disclosed for mobile devices as well as number of public exploits released for those vulnerabilities. Cabir – 2004 FakePlayer – 2010 DroidDream

© 2011 IBM Corporation The IBM Security Approach

© 2011 IBM Corporation IBM Security Framework

© 2011 IBM Corporation IBM Security Framework r

© 2011 IBM Corporation Out of five technologies evaluated, social networking, mobile platforms and cloud computing present the highest risk concern Sources:Q17 (How big a risk are the following technologies and tools to your company?) 64% 21% 15% Social networking tools Mobile platforms. 54% 27% 19% Cloud computing 42% 35% 24% Virtualization 26% 31% 43% Service-oriented architecture 25% 42% 34% Extremely risky/riskySomewhat riskyModerately/not at all risky “We are concerned about being able to safely control the flow of data to/from employee mobile devices and safely storing it.” Manufacturing, North America “We are already looking at cloud computing and haven't yet perfected security on our own local networks.” Healthcare, North America IBM Global Risk Study 2010, conducted by the Economist Intelligence Unit, bring multiple perspectives to their focus on IT

© 2011 IBM Corporation Cloud computing is recognized as an emerging solution for risk management, but significant concerns exist 14 Sources:Q17a (In your opinion, what are the biggest risks with regard to cloud computing? Select up to two.) Risks associated with cloud computing Handing over sensitive data to a third party 61% Threat of data breach or loss 50% Weakening of corporate network security 23% Uptime/business continuity 16% Financial strength of the cloud computing provider 11% Inability to customize applications 10% say business continuity discussions include cloud computing 57 % 77 % believe cloud makes protecting privacy more difficult 44 % feel private clouds are riskier than traditional IT services “We are interested in cloud computing as a way to cut costs, but the perception is that the risk is very high.” Manufacturing, Asia Pacific

© 2011 IBM Corporation15 IBM's Strategy for Cloud Security IBM Security Framework: Risk management-based approach to security Provider of Cloud-based Security Services Provider of Secure Cloud Platform Provider of Secure Clouds

© 2011 IBM Corporation IBM Cloud Security

© 2011 IBM Corporation IBM's Strategy for Cloud Security

© 2011 IBM Corporation IBM's Strategy for Cloud Security

© 2011 IBM Corporation IBM Security Portfolio: be comprehensive, leverage partners Professional Services Products Managed Services Cloud Delivered Security Governance, Risk and Compliance Security Information and Event Management (SIEM) & Log Management Identity & Access Management Identity Management Access Management GRCGRC Data Security Database Monitoring & Protection Encryption & Key Lifecycle Management Data Loss Prevention Data Entitlement Management Data Masking Messaging Security Security Application Security Web / URL Filtering Application Vulnerability Scanning Access & Entitlement Management Web Application Firewall SOA Security Infrastructure Security Threat Analysis Firewall, IDS/IPS MFS Management Physical Security Mainframe Security Audit, Admin & Compliance Security Event Management Security Configuration & Patch Management Intrusion Prevention System Endpoint Protection Virtual System Security Vulnerability Assessment Managed Mobility Svcs

© 2011 IBM Corporation The planet is getting more … IBM helps you manage the security risks that are introduced by Smarter Planet technology and net centric business models. Instrumented Interconnected Intelligent Smart water management Smart energy grids Smart healthcare Smart food systems Intelligent oil field technologies Smart regions Smart weather Smart cities Smart traffic systems Smart retail Smart countries Smart supply chains In Summary: IBM Security can enable a Smarter Planet

© 2011 IBM Corporation Next Steps Learn more about IBM Security Solutions For any Security discussions, contact your nearest IBM Security Sales Specialist Sign-up for IBM X-Force Security Alerts and Advisories Download IBM Global IT Risk Study

22 Venkatesh Sadayappan Thank You!