Build Deck v3.07.ppt

82
© 2014 IBM Corporation Architectural Overview of the IBM Security Systems Portfolio Ver 3.07 – Jun 2014

Transcript of Build Deck v3.07.ppt

© 2014 IBM Corporation

Architectural Overview of the IBM Security Systems Portfolio

Ver 3.07 – Jun 2014

© 2014 IBM Corporation2

Agenda

The IBM Security Framework and portfolio

Capabilities in the IBM Security Systems domains:• Intelligence and Analytics

• Fraud Protection

• People

• Data

• Applications

• Infrastructure – Distributed

• Infrastructure – z

© 2014 IBM Corporation33

IBM Security Framework and the IBM Security Systems portfolio

© 2014 IBM Corporation4

IBM Security Systems and the IBM Security Framework

Intelligence ● Integration ● Expertise

Only vendor in the market with end-to-end coverage of the security foundation

6K+ security engineers and consultants Award-winning X-Force® research Largest vulnerability DB and 2nd largest

IP reputation DB in the industry Partner with IBM Software Group

Services, IBM Security Services and an extensive partner community for consulting and delivery

© 2014 IBM Corporation5

IBM Security Systems Portfolio

IBM Security Systems Portfolio

People Data Applications Network Infrastructure Endpoint

Identity Management

Guardium Data Security and Compliance

AppScan Source

Network Intrusion Prevention Trusteer Apex

Access Management

Guardium DB Vulnerability Management

AppScan Dynamic

Next Generation Network Protection

Mobile Security MaaS360 by Fiberlink

Privileged Identity Manager

Guardium / Optim Data Masking

DataPower WebSecurity Gateway

SiteProtectorThreat Management

Endpoint Security and Management

Federated Access and SSO

Key Lifecycle Manager

Security Policy Manager

NetworkAnomaly Detection

MainframeSecurity

IBM X-Force Research

Advanced Fraud Protection

Trusteer Rapport

Trusteer PinpointMalware Detection

Trusteer PinpointATO Detection

Trusteer Mobile Risk Engine

Security Intelligence and Analytics

QRadar Log Manager

QRadar SIEM

QRadar Risk Manager

QRadar Vulnerability Manager

© 2014 IBM Corporation6

Showing the IBM Security Capabilities and Integration

The slide deck uses a representative environment with typical components, services and communications for customers/partners (and cloud services), the enterprise and employees…

… and then progressively overlays IBM security capabilities in the context of this representative

environment to show features and integration points

© 2014 IBM Corporation77

Security Intelligence and Analytics(and GRC; IT security + enterprise)

© 2014 IBM Corporation8

IBM Security Systems Portfolio

People Data Applications Network Infrastructure Endpoint

Identity Management

Guardium Data Security and Compliance

AppScan Source

Network Intrusion Prevention Trusteer Apex

Access Management

Guardium DB Vulnerability Management

AppScan Dynamic

Next Generation Network Protection

Mobile Security MaaS360 by Fiberlink

Privileged Identity Manager

Guardium / Optim Data Masking

DataPower WebSecurity Gateway

SiteProtectorThreat Management

Endpoint Security and Management

Federated Access and SSO

Key Lifecycle Manager

Security Policy Manager

NetworkAnomaly Detection

MainframeSecurity

IBM X-Force Research

Advanced Fraud Protection

Trusteer Rapport

Trusteer PinpointMalware Detection

Trusteer PinpointATO Detection

Trusteer Mobile Risk Engine

Security Intelligence and Analytics

QRadar Log Manager

QRadar SIEM

QRadar Risk Manager

QRadar Vulnerability Manager

QRadar Packet CaptureQRadar Incident Forensics

NEWSecurity Intelligence and Analytics

© 2014 IBM Corporation9

Generic Environment for ABC Co…

© 2014 IBM Corporation10

… but lets focus on the Infrastructure

© 2014 IBM Corporation11

Log Management

© 2014 IBM Corporation12

Security Information and Event Management

© 2014 IBM Corporation13

Application-level and Virtualised Network Monitoring

© 2014 IBM Corporation14

Intelligence and Risk Management

© 2014 IBM Corporation15

Incident Forensic Analysis

© 2014 IBM Corporation16

Intelligence and Vulnerability Management

© 2014 IBM Corporation17

Enterprise GRC – Integrating IT Controls for Business Risk View

© 2014 IBM Corporation1818

Advanced Fraud Protection

© 2014 IBM Corporation19

IBM Security Systems Portfolio

People Data Applications Network Infrastructure Endpoint

Identity Management

Guardium Data Security and Compliance

AppScan Source

Network Intrusion Prevention Trusteer Apex

Access Management

Guardium DB Vulnerability Management

AppScan Dynamic

Next Generation Network Protection

Mobile Security MaaS360 by Fiberlink

Privileged Identity Manager

Guardium / Optim Data Masking

DataPower WebSecurity Gateway

SiteProtectorThreat Management

Endpoint Security and Management

Federated Access and SSO

Key Lifecycle Manager

Security Policy Manager

NetworkAnomaly Detection

MainframeSecurity

IBM X-Force Research

Advanced Fraud Protection

Trusteer Rapport

Trusteer PinpointMalware Detection

Trusteer PinpointATO Detection

Trusteer Mobile Risk Engine

Security Intelligence and Analytics

QRadar Log Manager

QRadar SIEM

QRadar Risk Manager

QRadar Vulnerability Manager

Advanced Fraud Protection

© 2014 IBM Corporation20

Generic Environment for ABC Co

© 2014 IBM Corporation21

Providing Common Fraud Prevention Services from the Cloud

© 2014 IBM Corporation22

Protecting Employee Devices from Fraud

© 2014 IBM Corporation23

Protecting Customer Devices from Fraud

© 2014 IBM Corporation24

Protecting Customer Devices from Fraud without Client-Side Agents

© 2014 IBM Corporation25

Protecting Customer Mobile Devices from Fraud

© 2014 IBM Corporation26

Leveraging Access Management for Fraud Protection

© 2014 IBM Corporation27

Fraud Protection and Security Intelligence

© 2014 IBM Corporation2828

People

© 2014 IBM Corporation29

IBM Security Systems Portfolio

People Data Applications Network Infrastructure Endpoint

Identity Management

Guardium Data Security and Compliance

AppScan Source

Network Intrusion Prevention Trusteer Apex

Access Management

Guardium DB Vulnerability Management

AppScan Dynamic

Next Generation Network Protection

Mobile Security MaaS360 by Fiberlink

Privileged Identity Manager

Guardium / Optim Data Masking

DataPower WebSecurity Gateway

SiteProtectorThreat Management

Endpoint Security and Management

Federated Access and SSO

Key Lifecycle Manager

Security Policy Manager

NetworkAnomaly Detection

MainframeSecurity

IBM X-Force Research

Advanced Fraud Protection

Trusteer Rapport

Trusteer PinpointMalware Detection

Trusteer PinpointATO Detection

Trusteer Mobile Risk Engine

Security Intelligence and Analytics

QRadar Log Manager

QRadar SIEM

QRadar Risk Manager

QRadar Vulnerability Manager

The People Domain

© 2014 IBM Corporation30

Generic Environment for ABC Co

© 2014 IBM Corporation31

Identity Management

© 2014 IBM Corporation32

Web Access Control

© 2014 IBM Corporation33

Federated Identity/Access Management

© 2014 IBM Corporation34

Mobile Access Management

© 2014 IBM Corporation35

Enterprise (Desktop) Single Signon

© 2014 IBM Corporation36

Privileged Identity Management

© 2014 IBM Corporation37

Identity into Security Intelligence

© 2014 IBM Corporation3838

Data

© 2014 IBM Corporation39

IBM Security Systems Portfolio

People Data Applications Network Infrastructure Endpoint

Identity Management

Guardium Data Security and Compliance

AppScan Source

Network Intrusion Prevention Trusteer Apex

Access Management

Guardium DB Vulnerability Management

AppScan Dynamic

Next Generation Network Protection

Mobile Security MaaS360 by Fiberlink

Privileged Identity Manager

Guardium / Optim Data Masking

DataPower WebSecurity Gateway

SiteProtectorThreat Management

Endpoint Security and Management

Federated Access and SSO

Key Lifecycle Manager

Security Policy Manager

NetworkAnomaly Detection

MainframeSecurity

IBM X-Force Research

Advanced Fraud Protection

Trusteer Rapport

Trusteer PinpointMalware Detection

Trusteer PinpointATO Detection

Trusteer Mobile Risk Engine

Security Intelligence and Analytics

QRadar Log Manager

QRadar SIEM

QRadar Risk Manager

QRadar Vulnerability Manager

The Data Domain

© 2014 IBM Corporation40

Generic Environment for ABC Co…

© 2014 IBM Corporation41

… but lets focus on the DB-specific Components

© 2014 IBM Corporation42

Protecting DB Access at the Network Layer

© 2014 IBM Corporation43

Centralised Management of DB Access Control Policy

© 2014 IBM Corporation44

Managing Testing Data Based on Production Data

© 2014 IBM Corporation45

Managing Lifecycle of Hardware Encryption Keys

© 2014 IBM Corporation46

Security Intelligence and Databases

© 2014 IBM Corporation47

Identity Management for Databases

© 2014 IBM Corporation48

Vulnerability Management for Databases

© 2014 IBM Corporation4949

Applications

© 2014 IBM Corporation50

IBM Security Systems Portfolio

People Data Applications Network Infrastructure Endpoint

Identity Management

Guardium Data Security and Compliance

AppScan Source

Network Intrusion Prevention Trusteer Apex

Access Management

Guardium DB Vulnerability Management

AppScan Dynamic

Next Generation Network Protection

Mobile Security MaaS360 by Fiberlink

Privileged Identity Manager

Guardium / Optim Data Masking

DataPower WebSecurity Gateway

SiteProtectorThreat Management

Endpoint Security and Management

Federated Access and SSO

Key Lifecycle Manager

Security Policy Manager

NetworkAnomaly Detection

MainframeSecurity

IBM X-Force Research

Advanced Fraud Protection

Trusteer Rapport

Trusteer PinpointMalware Detection

Trusteer PinpointATO Detection

Trusteer Mobile Risk Engine

Security Intelligence and Analytics

QRadar Log Manager

QRadar SIEM

QRadar Risk Manager

QRadar Vulnerability Manager

The Applications Domain

© 2014 IBM Corporation51

Generic Environment for ABC Co…

© 2014 IBM Corporation52

… but lets look at the Application components

© 2014 IBM Corporation53

Source Code and Runtime App Scanning

© 2014 IBM Corporation54

Application Policy Testing

© 2014 IBM Corporation55

XML Appliances and Security

© 2014 IBM Corporation56

Identity Mapping and Security Token Services

© 2014 IBM Corporation57

Common Security Policy Mgmt, Provisioning and Enforcement

© 2014 IBM Corporation58

Security Intelligence and Applications

© 2014 IBM Corporation59

Identity Management for Applications

© 2014 IBM Corporation60

Web Application Protection for Applications

© 2014 IBM Corporation61

Test Data Masking/Cleansing

© 2014 IBM Corporation6262

Infrastructure (Network, Server and Endpoint) Distributed

© 2014 IBM Corporation63

IBM Security Systems Portfolio

People Data Applications Network Infrastructure Endpoint

Identity Management

Guardium Data Security and Compliance

AppScan Source

Network Intrusion Prevention Trusteer Apex

Access Management

Guardium DB Vulnerability Management

AppScan Dynamic

Next Generation Network Protection

Mobile Security MaaS360 by Fiberlink

Privileged Identity Manager

Guardium / Optim Data Masking

DataPower WebSecurity Gateway

SiteProtectorThreat Management

Endpoint Security and Management

Federated Access and SSO

Key Lifecycle Manager

Security Policy Manager

NetworkAnomaly Detection

MainframeSecurity

IBM X-Force Research

Advanced Fraud Protection

Trusteer Rapport

Trusteer PinpointMalware Detection

Trusteer PinpointATO Detection

Trusteer Mobile Risk Engine

Security Intelligence and Analytics

QRadar Log Manager

QRadar SIEM

QRadar Risk Manager

QRadar Vulnerability Manager

The Infrastructure (Network, Server and Endpoint) Domain

© 2014 IBM Corporation64

Generic Environment for Infrastructure

© 2014 IBM Corporation65

Network-level Security and Protection

© 2014 IBM Corporation66

NextGen Network-level Security and Protection

© 2014 IBM Corporation67

Centralised Security Event Management

© 2014 IBM Corporation68

Endpoint Management and Security

© 2014 IBM Corporation69

Endpoint Management for Mobile

© 2014 IBM Corporation70

Network Anomaly Detection … Complementing NIPS

© 2014 IBM Corporation71

Centralised Security Information Management

© 2014 IBM Corporation7272

Infrastructure for z

© 2014 IBM Corporation73

IBM Security Systems Portfolio

People Data Applications Network Infrastructure Endpoint

Identity Management

Guardium Data Security and Compliance

AppScan Source

Network Intrusion Prevention Trusteer Apex

Access Management

Guardium DB Vulnerability Management

AppScan Dynamic

Next Generation Network Protection

Mobile Security MaaS360 by Fiberlink

Privileged Identity Manager

Guardium / Optim Data Masking

DataPower WebSecurity Gateway

SiteProtectorThreat Management

Endpoint Security and Management

Federated Access and SSO

Key Lifecycle Manager

Security Policy Manager

NetworkAnomaly Detection

MainframeSecurity

IBM X-Force Research

Advanced Fraud Protection

Trusteer Rapport

Trusteer PinpointMalware Detection

Trusteer PinpointATO Detection

Trusteer Mobile Risk Engine

Security Intelligence and Analytics

QRadar Log Manager

QRadar SIEM

QRadar Risk Manager

QRadar Vulnerability Manager

Infrastructure for z

© 2014 IBM Corporation74

Generic Network, Server and Endpoint Environment

© 2014 IBM Corporation75

Drilling into the Mainframe-specific Components

© 2014 IBM Corporation76

Better Administration of External Security Manager Objects

© 2014 IBM Corporation77

Mainframe System Audit, Reporting and Alerting

© 2014 IBM Corporation78

Administering, Auditing and Reporting for z/VM

© 2014 IBM Corporation79

Enterprise-wide Auditing and Alerting

© 2014 IBM Corporation80

Mainframe Security and the Enterprise-wide Security Ecosystem

© 2014 IBM Corporation81

Security Intelligence, Analytics &

GRC

People

Data

Applications

Infrastructure

Questions?

© 2014 IBM Corporation82