Pool deck ideas, how to build deck, wood deck plans, norwegian dawn deck plans
Build Deck v3.07.ppt
Transcript of Build Deck v3.07.ppt
© 2014 IBM Corporation
Architectural Overview of the IBM Security Systems Portfolio
Ver 3.07 – Jun 2014
© 2014 IBM Corporation2
Agenda
The IBM Security Framework and portfolio
Capabilities in the IBM Security Systems domains:• Intelligence and Analytics
• Fraud Protection
• People
• Data
• Applications
• Infrastructure – Distributed
• Infrastructure – z
© 2014 IBM Corporation4
IBM Security Systems and the IBM Security Framework
Intelligence ● Integration ● Expertise
Only vendor in the market with end-to-end coverage of the security foundation
6K+ security engineers and consultants Award-winning X-Force® research Largest vulnerability DB and 2nd largest
IP reputation DB in the industry Partner with IBM Software Group
Services, IBM Security Services and an extensive partner community for consulting and delivery
© 2014 IBM Corporation5
IBM Security Systems Portfolio
IBM Security Systems Portfolio
People Data Applications Network Infrastructure Endpoint
Identity Management
Guardium Data Security and Compliance
AppScan Source
Network Intrusion Prevention Trusteer Apex
Access Management
Guardium DB Vulnerability Management
AppScan Dynamic
Next Generation Network Protection
Mobile Security MaaS360 by Fiberlink
Privileged Identity Manager
Guardium / Optim Data Masking
DataPower WebSecurity Gateway
SiteProtectorThreat Management
Endpoint Security and Management
Federated Access and SSO
Key Lifecycle Manager
Security Policy Manager
NetworkAnomaly Detection
MainframeSecurity
IBM X-Force Research
Advanced Fraud Protection
Trusteer Rapport
Trusteer PinpointMalware Detection
Trusteer PinpointATO Detection
Trusteer Mobile Risk Engine
Security Intelligence and Analytics
QRadar Log Manager
QRadar SIEM
QRadar Risk Manager
QRadar Vulnerability Manager
© 2014 IBM Corporation6
Showing the IBM Security Capabilities and Integration
The slide deck uses a representative environment with typical components, services and communications for customers/partners (and cloud services), the enterprise and employees…
… and then progressively overlays IBM security capabilities in the context of this representative
environment to show features and integration points
© 2014 IBM Corporation8
IBM Security Systems Portfolio
People Data Applications Network Infrastructure Endpoint
Identity Management
Guardium Data Security and Compliance
AppScan Source
Network Intrusion Prevention Trusteer Apex
Access Management
Guardium DB Vulnerability Management
AppScan Dynamic
Next Generation Network Protection
Mobile Security MaaS360 by Fiberlink
Privileged Identity Manager
Guardium / Optim Data Masking
DataPower WebSecurity Gateway
SiteProtectorThreat Management
Endpoint Security and Management
Federated Access and SSO
Key Lifecycle Manager
Security Policy Manager
NetworkAnomaly Detection
MainframeSecurity
IBM X-Force Research
Advanced Fraud Protection
Trusteer Rapport
Trusteer PinpointMalware Detection
Trusteer PinpointATO Detection
Trusteer Mobile Risk Engine
Security Intelligence and Analytics
QRadar Log Manager
QRadar SIEM
QRadar Risk Manager
QRadar Vulnerability Manager
QRadar Packet CaptureQRadar Incident Forensics
NEWSecurity Intelligence and Analytics
© 2014 IBM Corporation19
IBM Security Systems Portfolio
People Data Applications Network Infrastructure Endpoint
Identity Management
Guardium Data Security and Compliance
AppScan Source
Network Intrusion Prevention Trusteer Apex
Access Management
Guardium DB Vulnerability Management
AppScan Dynamic
Next Generation Network Protection
Mobile Security MaaS360 by Fiberlink
Privileged Identity Manager
Guardium / Optim Data Masking
DataPower WebSecurity Gateway
SiteProtectorThreat Management
Endpoint Security and Management
Federated Access and SSO
Key Lifecycle Manager
Security Policy Manager
NetworkAnomaly Detection
MainframeSecurity
IBM X-Force Research
Advanced Fraud Protection
Trusteer Rapport
Trusteer PinpointMalware Detection
Trusteer PinpointATO Detection
Trusteer Mobile Risk Engine
Security Intelligence and Analytics
QRadar Log Manager
QRadar SIEM
QRadar Risk Manager
QRadar Vulnerability Manager
Advanced Fraud Protection
© 2014 IBM Corporation29
IBM Security Systems Portfolio
People Data Applications Network Infrastructure Endpoint
Identity Management
Guardium Data Security and Compliance
AppScan Source
Network Intrusion Prevention Trusteer Apex
Access Management
Guardium DB Vulnerability Management
AppScan Dynamic
Next Generation Network Protection
Mobile Security MaaS360 by Fiberlink
Privileged Identity Manager
Guardium / Optim Data Masking
DataPower WebSecurity Gateway
SiteProtectorThreat Management
Endpoint Security and Management
Federated Access and SSO
Key Lifecycle Manager
Security Policy Manager
NetworkAnomaly Detection
MainframeSecurity
IBM X-Force Research
Advanced Fraud Protection
Trusteer Rapport
Trusteer PinpointMalware Detection
Trusteer PinpointATO Detection
Trusteer Mobile Risk Engine
Security Intelligence and Analytics
QRadar Log Manager
QRadar SIEM
QRadar Risk Manager
QRadar Vulnerability Manager
The People Domain
© 2014 IBM Corporation39
IBM Security Systems Portfolio
People Data Applications Network Infrastructure Endpoint
Identity Management
Guardium Data Security and Compliance
AppScan Source
Network Intrusion Prevention Trusteer Apex
Access Management
Guardium DB Vulnerability Management
AppScan Dynamic
Next Generation Network Protection
Mobile Security MaaS360 by Fiberlink
Privileged Identity Manager
Guardium / Optim Data Masking
DataPower WebSecurity Gateway
SiteProtectorThreat Management
Endpoint Security and Management
Federated Access and SSO
Key Lifecycle Manager
Security Policy Manager
NetworkAnomaly Detection
MainframeSecurity
IBM X-Force Research
Advanced Fraud Protection
Trusteer Rapport
Trusteer PinpointMalware Detection
Trusteer PinpointATO Detection
Trusteer Mobile Risk Engine
Security Intelligence and Analytics
QRadar Log Manager
QRadar SIEM
QRadar Risk Manager
QRadar Vulnerability Manager
The Data Domain
© 2014 IBM Corporation50
IBM Security Systems Portfolio
People Data Applications Network Infrastructure Endpoint
Identity Management
Guardium Data Security and Compliance
AppScan Source
Network Intrusion Prevention Trusteer Apex
Access Management
Guardium DB Vulnerability Management
AppScan Dynamic
Next Generation Network Protection
Mobile Security MaaS360 by Fiberlink
Privileged Identity Manager
Guardium / Optim Data Masking
DataPower WebSecurity Gateway
SiteProtectorThreat Management
Endpoint Security and Management
Federated Access and SSO
Key Lifecycle Manager
Security Policy Manager
NetworkAnomaly Detection
MainframeSecurity
IBM X-Force Research
Advanced Fraud Protection
Trusteer Rapport
Trusteer PinpointMalware Detection
Trusteer PinpointATO Detection
Trusteer Mobile Risk Engine
Security Intelligence and Analytics
QRadar Log Manager
QRadar SIEM
QRadar Risk Manager
QRadar Vulnerability Manager
The Applications Domain
© 2014 IBM Corporation63
IBM Security Systems Portfolio
People Data Applications Network Infrastructure Endpoint
Identity Management
Guardium Data Security and Compliance
AppScan Source
Network Intrusion Prevention Trusteer Apex
Access Management
Guardium DB Vulnerability Management
AppScan Dynamic
Next Generation Network Protection
Mobile Security MaaS360 by Fiberlink
Privileged Identity Manager
Guardium / Optim Data Masking
DataPower WebSecurity Gateway
SiteProtectorThreat Management
Endpoint Security and Management
Federated Access and SSO
Key Lifecycle Manager
Security Policy Manager
NetworkAnomaly Detection
MainframeSecurity
IBM X-Force Research
Advanced Fraud Protection
Trusteer Rapport
Trusteer PinpointMalware Detection
Trusteer PinpointATO Detection
Trusteer Mobile Risk Engine
Security Intelligence and Analytics
QRadar Log Manager
QRadar SIEM
QRadar Risk Manager
QRadar Vulnerability Manager
The Infrastructure (Network, Server and Endpoint) Domain
© 2014 IBM Corporation73
IBM Security Systems Portfolio
People Data Applications Network Infrastructure Endpoint
Identity Management
Guardium Data Security and Compliance
AppScan Source
Network Intrusion Prevention Trusteer Apex
Access Management
Guardium DB Vulnerability Management
AppScan Dynamic
Next Generation Network Protection
Mobile Security MaaS360 by Fiberlink
Privileged Identity Manager
Guardium / Optim Data Masking
DataPower WebSecurity Gateway
SiteProtectorThreat Management
Endpoint Security and Management
Federated Access and SSO
Key Lifecycle Manager
Security Policy Manager
NetworkAnomaly Detection
MainframeSecurity
IBM X-Force Research
Advanced Fraud Protection
Trusteer Rapport
Trusteer PinpointMalware Detection
Trusteer PinpointATO Detection
Trusteer Mobile Risk Engine
Security Intelligence and Analytics
QRadar Log Manager
QRadar SIEM
QRadar Risk Manager
QRadar Vulnerability Manager
Infrastructure for z
© 2014 IBM Corporation81
Security Intelligence, Analytics &
GRC
People
Data
Applications
Infrastructure
Questions?