© 2010 IBM Corporation Document number A New Security Blue Print- Smart Security for a Smarter...

20
© 2010 IBM Corporation Document number A New Security Blue Print- Smart Security for a Smarter Planet Vaidy Iyer (Leader, IBM Security Solutions)

Transcript of © 2010 IBM Corporation Document number A New Security Blue Print- Smart Security for a Smarter...

Page 1: © 2010 IBM Corporation Document number A New Security Blue Print- Smart Security for a Smarter Planet Vaidy Iyer (Leader, IBM Security Solutions)

© 2010 IBM Corporation

Document number

A New Security Blue Print- Smart Security for a Smarter PlanetVaidy Iyer (Leader, IBM Security Solutions)

Page 2: © 2010 IBM Corporation Document number A New Security Blue Print- Smart Security for a Smarter Planet Vaidy Iyer (Leader, IBM Security Solutions)

© 2010 IBM Corporation

Why Security?

FEAR?

Insurance?

Business Enabler

2

Page 3: © 2010 IBM Corporation Document number A New Security Blue Print- Smart Security for a Smarter Planet Vaidy Iyer (Leader, IBM Security Solutions)

© 2010 IBM Corporation

What is Security?

Anti Virus?

Fire Wall?

IPS?

Products?

Process?

3

Page 4: © 2010 IBM Corporation Document number A New Security Blue Print- Smart Security for a Smarter Planet Vaidy Iyer (Leader, IBM Security Solutions)

© 2010 IBM Corporation

Evolution of IT Security

Mainframes

PC

Client Server

Thin Clients, hand helds

Remote Management

Smarter Systems

4

Page 5: © 2010 IBM Corporation Document number A New Security Blue Print- Smart Security for a Smarter Planet Vaidy Iyer (Leader, IBM Security Solutions)

© 2010 IBM Corporation5

Agenda

Is the Smarter Planet secure?

IT security challenges

Smart Security Solutions

Client value and benefits

Introducing IBM Security Solutions

Page 6: © 2010 IBM Corporation Document number A New Security Blue Print- Smart Security for a Smarter Planet Vaidy Iyer (Leader, IBM Security Solutions)

© 2010 IBM Corporation6

Is the smarter planet secure?

Introducing IBM Security Solutions

Pervasive instrumentation creates vast amounts of data

New services built using that data, raises Privacy and Security concerns…

Critical physical and IT infrastructure

Sensitive information protection

New denial of service attacks

Increasing risks of fraud

The planet is getting more Instrumented, Interconnected and Intelligent.

New possibilities.New risks...

Page 7: © 2010 IBM Corporation Document number A New Security Blue Print- Smart Security for a Smarter Planet Vaidy Iyer (Leader, IBM Security Solutions)

© 2010 IBM Corporation7

Security challenges in a smarter planet

Introducing IBM Security Solutions

Source  http://searchcompliance.techtarget.com/news/article/0,289142,sid195_gci1375707,00.html

Increasing Complexity

Rising Costs

Ensuring Compliance

Key drivers for security projects

Spending by U.S. companies on governance, risk and compliance will grow to $29.8 billion in 2010

The cost of a data breach increased to $204 per compromised customer record

Soon, there will be 1 trillion connected devices in the world, constituting an “internet of things”

Page 8: © 2010 IBM Corporation Document number A New Security Blue Print- Smart Security for a Smarter Planet Vaidy Iyer (Leader, IBM Security Solutions)

© 2010 IBM Corporation

Cost, complexity and compliance

Data and information explosion

Rising Costs: Do more with less

Compliance fatigue

Emerging technology

Death by point products

People are becoming more

and more reliant on security

IBM believes that security is

progressively viewed as every individual’s

right

Introducing IBM Security Solutions

Page 9: © 2010 IBM Corporation Document number A New Security Blue Print- Smart Security for a Smarter Planet Vaidy Iyer (Leader, IBM Security Solutions)

© 2010 IBM Corporation9

The IBM Security Framework foundation addresses your challenges of cost, complexity and compliance

Introducing IBM Security Solutions

Create and sustain

security governance

Manage risk

Ensure compliance

Build a strong foundation for IT

security

Click for more information

Page 10: © 2010 IBM Corporation Document number A New Security Blue Print- Smart Security for a Smarter Planet Vaidy Iyer (Leader, IBM Security Solutions)

© 2010 IBM Corporation

DATA AND INFORMATIONUnderstand, deploy, and properly test controls for access to and usage of sensitive data

PEOPLE AND IDENTITYMitigate the risks associated with user access to corporate resources

APPLICATION AND PROCESSKeep applications secure, protected from malicious or fraudulent use, and hardened against failure

NETWORK, SERVER AND END POINTOptimize service availability by mitigating risks to network components

PHYSICAL INFRASTRUCTUREProvide actionable intelligence on the desired state of physical infrastructure security and make improvements

In addition to the foundational elements, the Framework identifies five security focus areas as starting points

Click for more information

GOVERNANCE, RISK MANAGEMENT AND COMPLIANCEDesign, and deploy a strong foundation for security & privacy

Introducing IBM Security Solutions

9

GRCGRCGRCGRC

Page 11: © 2010 IBM Corporation Document number A New Security Blue Print- Smart Security for a Smarter Planet Vaidy Iyer (Leader, IBM Security Solutions)

© 2010 IBM Corporation11

IBM Security portfolio can help you meet challenges in each security focus area

Introducing IBM Security Solutions

Framework

Click for more information

Typical enterprise activities

Provide Video Surveillance Establish Command and Control

PHYSICALINFRASTRUCTURE

Capture video analytics Manage security across all assets

Audit, report and manage access to resources

PEOPLE AND IDENTITY

Manage identities Control access to applications

Monitor & manage data access Prevent Data Loss Encrypt sensitive data

DATA AND INFORMATION

Protect Critical Databases Messaging Security and

Content Filtering

Embed App Access Controls Provide SOA Security

Ensure Security in App Development

Discover App Vulnerabilities

APPLICATION AND PROCESS

Protect Servers, Endpoints,

Networks, Mainframes

NETWORK, SERVERS

& ENDPOINTS

Security Compliance Assessment Incident Response

GOVERNANCE, RISK MGMT, COMPLIANCE

Security Strategy Design Pen Testing & Vulnerability

AssessmentGRCGRCGRCGRC

Page 12: © 2010 IBM Corporation Document number A New Security Blue Print- Smart Security for a Smarter Planet Vaidy Iyer (Leader, IBM Security Solutions)

© 2010 IBM Corporation12

Security governance, risk management and compliance

This is not intended to be a comprehensive list of all IBM products and services

Introducing IBM Security Solutions

Ensure comprehensive management of security activities and compliance with all security mandates

SecurityStrategy Design

Pen Testing & Vuln. Assessment

Sec. Compliance Assessment

IncidentResponse

Business Challenge

Design and implement secure deployment strategies for advanced technologies such as Cloud, virtualization, etc.

Identify and eliminate security threats that enable attacks against systems, applications and devices

Perform security compliance assessments against PCI, ISO and other standards and regulations

Design and implement policy and processes for security governance, incident response; perform timely response and computer forensics

Software

Rational® AppScan®; Guardium Database Monitoring & Protection

Tivoli Security Information and Event Manager; Guardium Database Monitoring & Protection;Tivoli zSecure suite

Tivoli® Security Information and Event Manager; Tivoli zSecure suite

Professional ServicesConsulting Services; Security Design

Ethical hacking and AppSec assessment

Qualified Security Assessors

Policy definition services; CERT team

Managed ServicesApp Vulnerability and Source Code Scanning OnDemand

Managed Protection Services

BUSINESS VALUE

Page 13: © 2010 IBM Corporation Document number A New Security Blue Print- Smart Security for a Smarter Planet Vaidy Iyer (Leader, IBM Security Solutions)

© 2010 IBM Corporation13

People and identity

This is not intended to be a comprehensive list of all IBM products and services

Introducing IBM Security Solutions

Lower costs and mitigate the risks associated with managing user access to corporate resources

Cost and Complexity of Managing Identities

Providing Access to Applications

Auditing, reporting and managing access to resources

Business Challenge

On average, enterprises spend 2 weeks to setup new users on all systems and about 40% of accounts are invalid

30% of help desk calls are for password resets, at $20 per call

“We would need to spend $60k on each of our 400 applications to implement security access rules”

– Global financial services firm

Privileged users cause 87% of internal security incidents, while firms cannot effectively monitor thousands of security events generated each day

Role management, recertification, etc.

SoftwareTivoli® Identity and Access Assurance, Tivoli zSecure suite

Tivoli Access Manager, Tivoli Federated Identity Manager

Tivoli Identity and Access Assurance, Tivoli Security Information and Event Manager

Professional ServicesIdentity and Access Management Professional Services

Identity and Access Management Professional Services

Compliance Assessment Services, Privileged Identity Management

Managed ServicesManaged Identity and Access Management

Managed Identity and Access Management

Managed User Monitoring and Log Management

BUSINESS VALUE

Page 14: © 2010 IBM Corporation Document number A New Security Blue Print- Smart Security for a Smarter Planet Vaidy Iyer (Leader, IBM Security Solutions)

© 2010 IBM Corporation14

Data and information

This is not intended to be a comprehensive list of all IBM products and services

Introducing IBM Security Solutions

Understand, deploy and properly test controls for access to and usage of sensitive business dataBUSINESS VALUE

Protecting Critical

Databases

Messaging Security and

Content Filtering

Managing Data Access and Encryption

Monitoring Data Access and Preventing Data

Loss

Business Challenge

Mitigate threats against databases from external attacks and internal privileged users

Spam and inappropriate Web sites pose major productivity drains, resource capacity strains, and leading attack vector for malware

Over 82% of firms have had more than one data breach in the past year involving loss or theft of 1,000+ records with personal information; cost of a data breach increased to $204 per compromised customer record*

42% of all cases involved third-party mistakes and flubs… magnitude of breach events ranged from about 5,000 to 101,000 lost or stolen customer records*

SoftwareGuardium Database Monitoring & Protection

Multi-Function Security appliance,Lotus Protector

Tivoli® Key Lifecycle Manager, Tivoli Security Policy Manager, Tivoli Federated Identity Manager

Data Loss Prevention; Tivoli Security Information and Event Manager

Professional Services

Data Security Assessment Services

Data Security Assessment Services

Data Security, Compliance Assessment Services

Data Security, Compliance Assessment Services

* "Fifth Annual U.S. Cost of Data Breach Study”, Ponemon Institute, Jan 2010

Page 15: © 2010 IBM Corporation Document number A New Security Blue Print- Smart Security for a Smarter Planet Vaidy Iyer (Leader, IBM Security Solutions)

© 2010 IBM Corporation15

Application and process

This is not intended to be a comprehensive list of all IBM products and services

Introducing IBM Security Solutions

Keep applications secure, protected from malicious or fraudulent use, and hardened against failureBUSINESS VALUE

Security in App Development

Discovering App Vulnerabilities

Embedding App Access Controls

Providing SOA Security

Business Challenge

Vulnerabilities caught early in the development process are orders of magnitude cheaper to fix versus after the application is released

74% of vulnerabilities in applications have no patch available today*80% of development costs are spent identifying and correcting defects, costing $25 during coding phase vs. $16,000 in post-production**

According to customers, up to 20% of their application development costs can be for coding custom access controls and their corresponding infrastructure

Establishing trust and high performance for services that span corporate boundaries is a top priority for SOA-based deployments

Software Rational® AppScan®; Ounce

Rational AppScan; Ounce Tivoli® Identity and Access Assurance

WebSphere® DataPower®; Tivoli Security Policy Manager

Professional Services

Secure App Dev Process Enablement, App Vulnerability and Source Code Scanning

App Vulnerability and Source Code Scanning

Application Access Services

Managed Services Managed Vulnerability Scanning

Managed Access Control

* IBM X-Force Annual Report, Feb 2009 ** Applied Software Measurement, Caper Jones, 1996

Page 16: © 2010 IBM Corporation Document number A New Security Blue Print- Smart Security for a Smarter Planet Vaidy Iyer (Leader, IBM Security Solutions)

© 2010 IBM Corporation16

Network, server and end point

This is not intended to be a comprehensive list of all IBM products and services

Introducing IBM Security Solutions

Optimize service availability by mitigating risks while optimizing expertise, technology and processBUSINESS VALUE

* Gartner Desktop Total Cost of Ownership: 2008 Update, Jan 2008

SystemsStorage

Virtual Network

Protecting Servers Protecting EndpointsProtecting Networks

Protecting Mainframes

Business Challenge

Mitigate threats against servers; prevent data loss

Effective management can cut total cost of ownership for secured desktops by 42%*

Mitigate network based threats and prevent data loss

Mitigate threats against mainframes; protect against vulnerabilities from configuration; contain the privileged users

Software Server Protection, Server Protection for VMWare

Desktop security platform; encryption

Network Intrusion Prevention System (IPS)

Tivoli® zSecure suite

Professional Services

Server security, data security assessment services

Desktop security, data security assessment services

Network security assessment services

Managed ServicesManaged IDS, Privileged User Mgmt

Managed Desktop security platform

Managed Network IPS

Page 17: © 2010 IBM Corporation Document number A New Security Blue Print- Smart Security for a Smarter Planet Vaidy Iyer (Leader, IBM Security Solutions)

© 2010 IBM Corporation17

Physical infrastructure

This is not intended to be a comprehensive list of all IBM products and services

Introducing IBM Security Solutions

Provide actionable intelligence and improve effectiveness of physical infrastructure securityBUSINESS VALUE

Video Surveillance Video Analytics Command and Control

Business challenge

Legacy analog video systems with proprietary interfaces are hard to integrate with IT infrastructure

Video information from many cameras present an information overload to human security personnel, detection is often after the fact and response management is problematic

IT and physical security operate in silos and do not integrate. It is increasingly difficult and expensive to consolidate security information across locations for effectiveness and compliance

SoftwareIT infrastructure, Logical Security products, and DVS partner products

Smart Vision Suite Command Control Center Solution

Professional ServicesBase Digital Video Surveillance Infrastructure services

Design, Implementation, Optimization services

Command Control Center Solution Services

Page 18: © 2010 IBM Corporation Document number A New Security Blue Print- Smart Security for a Smarter Planet Vaidy Iyer (Leader, IBM Security Solutions)

© 2010 IBM Corporation18

The IBM Security Framework foundation addresses your challenges of cost, complexity and compliance

Introducing IBM Security Solutions

Create and sustain

security governance

Manage risk

Ensure compliance

Build a strong foundation for IT

security

Click for more information

Page 19: © 2010 IBM Corporation Document number A New Security Blue Print- Smart Security for a Smarter Planet Vaidy Iyer (Leader, IBM Security Solutions)

© 2010 IBM Corporation

Some possible scenarios….

Attack on GPS– GPS is connected to public networks– An outsourced contractor’s kid down loading an innocuous software could

bring the system down!

Attack on carrier hotels– Location where all communication points meet up– Eg: One Wilshire, LA, California!

Cyber-Hijacking, Blackmail, Ransom– Control the software on pacemaker!

Solar Cycle expected in 2012– CME (Coronal Magnetic Emission) could cripple satellite communication

Polar Shift

19

Page 20: © 2010 IBM Corporation Document number A New Security Blue Print- Smart Security for a Smarter Planet Vaidy Iyer (Leader, IBM Security Solutions)

© 2010 IBM Corporation20

Introducing IBM Security Solutions