Presentation is loading. Please wait.

Presentation is loading. Please wait.

Securing the Threats of Tomorrow, Today.

Similar presentations


Presentation on theme: "Securing the Threats of Tomorrow, Today."— Presentation transcript:

1 Securing the Threats of Tomorrow, Today.
Lubomir Tilev Security Sales Leader Bulgaria and Romania

2 A global leader in enterprise security
$2.3B unit in IBM #1 in enterprise security software and services #1 fastest growing of the Top 5 security vendors2 8,000+ employees 17,500+ customers 133 countries 3,500+ security patents 20 acquisitions since 2002 A global leader in enterprise security

3 Security drivers are evolving
ADVANCED ATTACKS INSIDERS NEW INNOVATIONS COMPLIANCE From… Broad threats Individual hackers Disgruntled employees Technology and linear driven security strategy Checking the box PCI compliance To… Targeted and organized crime (i.e., ransomware) Outsiders and partners becoming insiders Agile security that moves with the business Continuous risk analysis GDPR Cybercrime will become a $2.1 trillion problem by 2019 2017 Juniper Research Press Release 2016 insider attacks were 58 percent 42% outsider attacks 2017 IBM X-Force Threat Intelligence Report By 2020, there will be billion connected “things” 2017 Gartner press release GDPR fines can cost billions for large global companies 2017 SecurityIntelligence.com article

4 Security Challenges in the Financial Services Sector
Focus on regulatory compliance Ensure workloads in the cloud meet new security standards Increase investments for “right side of the boom” Adopt standard security frameworks and controls Design integrated risk, compliance and security analytics

5 Security Challenges in Government
Deal with aging infrastructures Address insufficient IT administration Meet the demands of digital transformation Ensure data privacy and compliance Respond to talent and funding shortage

6 Security Challenges in the Energy and Utility Industry
Address risks for IT, OT and IoT Harmonize the approach to IT-OT convergence Maintain regulatory compliance Increase security efficiency for detection to response Enable and protect digital transformation

7 Security Challenges in Telecom and Media & Entertainment
Ensure client privacy Maintain regulatory compliance Meet the demands of digital transformation Address the rise in threats and attacks Adopt new technologies and IoT

8 Let’s focus on the most critical security use cases
12/2/2018 Let’s focus on the most critical security use cases Outcome-driven security Prove Compliance Stop Threats Grow Business Get Ahead of Compliance Enhance Security Hygiene Detect & Stop Advanced Threats Orchestrate Incident Response Master Threat Hunting Secure Hybrid Cloud Protect Critical Assets Prevent Advanced Fraud Govern Users and Identities 8 © 2018 IBM Corporation

9 Disconnected security capabilities are failing us
Security analytics Privileged user management Access management User behavior analytics Incident response Data protection | Endpoint patching and management Data access control Identity governance and administration Network visibility and segmentation Fraud protection Mainframe security Network forensics and threat management Application scanning Vulnerability management Malware protection IDaaS Device management Threat sharing IoCs Endpoint detection and response | Criminal detection Content security Transaction protection | Firewalls and intrusion prevention Threat and anomaly detection Application security management Threat hunting and investigation

10 Build an integrated security immune system
Data protection | Data access control SECURITY ORCHESTRATION & ANALYTICS THREAT INTEL ENDPOINT NETWORK MOBILE ADVANCED FRAUD DATA APPS IDENTITY & ACCESS Privileged user management Identity governance and administration Access management Application scanning IDaaS Application security management Security analytics Mainframe security Vulnerability management Threat and anomaly detection Transaction protection Fraud protection Device management Criminal detection Content security Threat hunting and investigation User behavior analytics Endpoint detection and response Incident response Firewalls and intrusion prevention Endpoint patching and management Network forensics and threat management Malware protection Network visibility and segmentation Threat sharing | IoCs

11 Supported by hundreds of open integrations
12/2/2018 Supported by hundreds of open integrations

12


Download ppt "Securing the Threats of Tomorrow, Today."

Similar presentations


Ads by Google