IBM Security · Николай Поборцев IBM Security Sales Representative...

17
© 2014 IBM Corporation

Transcript of IBM Security · Николай Поборцев IBM Security Sales Representative...

Page 1: IBM Security · Николай Поборцев IBM Security Sales Representative Безопасное облако. Миф или реальность?

© 2014 IBM Corporation

IBM Security

1 © 2014 IBM Corporation

Page 2: IBM Security · Николай Поборцев IBM Security Sales Representative Безопасное облако. Миф или реальность?

Николай Поборцев

IBM Security Sales Representative

Безопасное облако.

Миф или реальность?

Page 3: IBM Security · Николай Поборцев IBM Security Sales Representative Безопасное облако. Миф или реальность?

© 2014 IBM Corporation

IBM Security

3

Page 4: IBM Security · Николай Поборцев IBM Security Sales Representative Безопасное облако. Миф или реальность?

© 2014 IBM Corporation

IBM Security

4

Утечка фото из iQloud

Page 5: IBM Security · Николай Поборцев IBM Security Sales Representative Безопасное облако. Миф или реальность?

© 2014 IBM Corporation

IBM Security

5

IBM Security и история

IBM Security

1977 – IBM разработала

Data Encryption Standard (DES)

Page 6: IBM Security · Николай Поборцев IBM Security Sales Representative Безопасное облако. Миф или реальность?

© 2014 IBM Corporation

IBM Security

6

Мир – это наша лаборатория ИБ

Page 7: IBM Security · Николай Поборцев IBM Security Sales Representative Безопасное облако. Миф или реальность?

© 2014 IBM Corporation

IBM Security

7

IBM X-Force – основа IBM Security. Анализ и мониторинг изменяющегося ландшафта угроз

Page 8: IBM Security · Николай Поборцев IBM Security Sales Representative Безопасное облако. Миф или реальность?

© 2014 IBM Corporation

IBM Security

8

Новая реальность ИБ уже наступила

Sources: (1) 2013 Cost of Cyber Crime Study, Ponemon Institute; (2) 2013 CISO Survey, IBM; (3) IBM client example

Sophisticated attacks

$7million+

Average U.S.

breach cost1

tools from 85

45

vendors3

Unsustainable practices

70%

of security execs are concerned about

cloud & mobile security2

Unprecedented change

Page 9: IBM Security · Николай Поборцев IBM Security Sales Representative Безопасное облако. Миф или реальность?

© 2014 IBM Corporation

IBM Security

9

Новая реальность ИБ уже наступила

Sources: (1) 2012 IBM Global Reputational Risk & IT Study; (2) 2013 Juniper Mobile Threat Report (3) 2012 ESG Research

Mobile malware growth!

61%

of organizations say Data theft and cybercrime are

the greatest threats to their reputation

Reputations being damaged

Security skill shortage

614%

from March 2012 to March

2013

83%

of enterprises have difficulty finding the security skills they need

Page 10: IBM Security · Николай Поборцев IBM Security Sales Representative Безопасное облако. Миф или реальность?

© 2014 IBM Corporation

IBM Security

10

ИБ – это повод для дискуссий в совете Директоров и на специалистах ИБ сейчас лежит больше ответственности, чем раньше.

Source: Discussions with more than 13,000 C-suite executives as part of the IBM C-suite Study Series

Page 11: IBM Security · Николай Поборцев IBM Security Sales Representative Безопасное облако. Миф или реальность?

11 © 2014 IBM Corporation

Новый подход к безопасности

Page 12: IBM Security · Николай Поборцев IBM Security Sales Representative Безопасное облако. Миф или реальность?

© 2014 IBM Corporation

IBM Security

12

IBM Security

Интегрированные возможности вместе со всей линейкой Security

QRadar

Trusteer

Identity and Access

Management

InfoSphere

Guardium

AppScan

Network and

Endpoint Protection

IBM X-Force Monitor and evaluate today’s threats

Detect, analyze, and prioritize threats

Reduce fraud and malware

Manage users and their access

Discover and harden valuable assets

Secure critical business applications

Protect infrastructure against attacks

The IBM Security Framework

Page 13: IBM Security · Николай Поборцев IBM Security Sales Representative Безопасное облако. Миф или реальность?

© 2014 IBM Corporation

IBM Security

13

IaaS PaaS SaaS

Интегрированная безопасность для частных и публичных облаков

Защита облачных дата центров и next-gen бизнес и прикладных платформ

IBM Security Solutions

• Federated Identity Manager

• Directory Integrator

• Access Manager Virtual Appliance

• Privileged Identity Manager

• InfoSphere Guardium

• AppScan

• Key Life Cycle

Manager

• Network Protection (XGS)

• Intrusion Prevention

System (GX)

• QRadar SIEM

• QRadar Log Manager

• QRadar QFlow

Manage Identities

and Protect

User Access

Monitor and Audit

Applications

and Data

Scan and Protect

the Network

from Threats

Establish

Intelligence

Across the Cloud

Page 14: IBM Security · Николай Поборцев IBM Security Sales Representative Безопасное облако. Миф или реальность?

© 2014 IBM Corporation

IBM Security

14

Enterprise Applications

and Cloud Services

Identity, Fraud,

and Data Protection

Device Security Content Security Application Security Transaction Security

Solutions to easily manage – from the cloud – a diverse set of mobile devices (corporate owned to BYOD)

Solutions to help secure file and document sharing across devices and SharePoint

Solutions to develop applications with security by design and protect enterprise data in both the applications you build and the applications you buy

Solutions to help protect mobile transactions with customers, business partners, and temporary workers that are not part of your enterprise mobile management framework

Security Intelligence

IBM QRadar Security

Intelligence Platform

IBM Security AppScan

IBM Security Access Manager

IBM Mobile Security Solutions IBM Mobile Security Services

A unified architecture for integrating mobile security information and event management

(SIEM), anomaly detection, and log, configuration, and vulnerability management

Защита мобильных технологий от IBM Security

Page 15: IBM Security · Николай Поборцев IBM Security Sales Representative Безопасное облако. Миф или реальность?

© 2014 IBM Corporation

IBM Security

15

Page 16: IBM Security · Николай Поборцев IBM Security Sales Representative Безопасное облако. Миф или реальность?

© 2014 IBM Corporation

IBM Security

16

http://securityintelligence.com/

Page 17: IBM Security · Николай Поборцев IBM Security Sales Representative Безопасное облако. Миф или реальность?

© 2014 IBM Corporation

IBM Security

17

www.ibm.com/security

© Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes

only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use

of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any

warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement

governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in

all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole

discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any

way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United

States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response

to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated

or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure

and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to

be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems,

products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE

MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

[email protected]