ibm security nie iba qradar - clusterkb.sk · ibm security nie iba qradar tomášpokorný ibm...

11
IBM Security nie iba QRadar Tomáš Pokorný IBM Security SW sales manager, Central Europe region

Upload: others

Post on 30-Apr-2020

34 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IBM Security nie iba QRadar - clusterkb.sk · IBM Security nie iba QRadar TomášPokorný IBM Security SW sales manager, Central Europe region. 2 IBM Security Look familiar? Criminal

IBM Security nie iba QRadar

Tomáš Pokorný

IBM Security SW sales manager, Central Europe region

Page 2: IBM Security nie iba QRadar - clusterkb.sk · IBM Security nie iba QRadar TomášPokorný IBM Security SW sales manager, Central Europe region. 2 IBM Security Look familiar? Criminal

2 IBM Security

Look familiar?

Criminal detection

Fraud protection

Data access control

Application security management

Applicationscanning

Data protection

Device managementTransaction protection

Content security

Malware protection

Endpoint detectionand response

Endpoint patching and management

Network forensics and threat management

Virtual patching

Firewalls

Sandboxing

Network visibility and segmentation

Access management

Identity governance and administration

Privileged user management

IDaaS

Indicators of compromise

Malware analysis

Threat sharing

Vulnerability management

Security analytics

Threat and anomaly detection

Incident response

User behavior analytics

Threat hunting and investigation

Mainframe security

Page 3: IBM Security nie iba QRadar - clusterkb.sk · IBM Security nie iba QRadar TomášPokorný IBM Security SW sales manager, Central Europe region. 2 IBM Security Look familiar? Criminal

3 IBM Security

Criminal detection

Fraud protection

Data access control

Application security management

Applicationscanning

Data protection

Device management

Transaction protection

Content security

Malware protection

Endpoint detectionand response

Endpoint patching and management

Network forensics and threat management

Virtual patching

Firewalls

Sandboxing

Network visibility and segmentation

Access management

Identity governance and administration

Privileged user management

IDaaS

Mainframe security

Indicators of compromise

Malware analysis

Threat sharing

SECURITY ECOSYSTEM

SECURITYORCHESTRATION

& ANALYTICS

DATA

APPSIDENTITY& ACCESS

MOBILEADVANCED

FRAUD

THREATINTEL

ENDPOINT NETWORK

Vulnerability management

Security analytics

Threat and anomaly detection

Incident response

User behavior analytics

Threat hunting and investigation

Page 4: IBM Security nie iba QRadar - clusterkb.sk · IBM Security nie iba QRadar TomášPokorný IBM Security SW sales manager, Central Europe region. 2 IBM Security Look familiar? Criminal

4 IBM Security

PROVECOMPLIANCE

Transform Your Security Program

STOP THREATS

Build a Cognitive SOC

GROW BUSINESS

Secure digital transformation

Get

Ahead of

Compliance

Enhance

Security

Hygiene

Govern

Users and

Identities

Detect & Stop

Advanced

Threats

Orchestrate Incident

Response

Master Threat

Hunting

Secure Hybrid Cloud

Protect Critical Assets

Prevent Advanced

Fraud

OUTCOME-DRIVEN SECURITY

Page 5: IBM Security nie iba QRadar - clusterkb.sk · IBM Security nie iba QRadar TomášPokorný IBM Security SW sales manager, Central Europe region. 2 IBM Security Look familiar? Criminal

5 IBM Security

PROVECOMPLIANCE

Transform Your Security Program

STOP THREATS

Build a Cognitive SOC

GROW BUSINESS

Secure Digital Transformation

• Guardium

• AppScan / ASoC

• BigFix

• MaaS360

• Trusteer

• Cloud Identity

• QRadar

Detect & Stop

Advanced

Threats

• QRadar + Advisor

• QRadar UBA

• Resilient

• i2

• Identity Governance

• Access Manager / Cloud Identity

• SKLM

• Identity Governance

• Access Manager / Cloud Identity

• Guardium

• Data Risk Manager

• BigFix

• QRadar

Orchestrate Incident

Response

Get

Ahead of

Compliance

Enhance

Security

Hygiene

Govern

Users and

Identities

Master Threat Hunting

Secure Hybrid Cloud

Protect Critical Assets

Prevent Advanced

Fraud

Outcome based security

Page 6: IBM Security nie iba QRadar - clusterkb.sk · IBM Security nie iba QRadar TomášPokorný IBM Security SW sales manager, Central Europe region. 2 IBM Security Look familiar? Criminal

6 IBM Security

Infirmary Health

System helps secure

endpoints and

eliminate threats,

while meeting all

data security

requirements and

compliance for

federal incentives.90%patch compliance

Went from an average of 40% patch compliance to 90%

95%lower time and cost

Reduced endpoint licensing costs and reduced time to deploy software by 95%

Help customers prove compliance

Page 7: IBM Security nie iba QRadar - clusterkb.sk · IBM Security nie iba QRadar TomášPokorný IBM Security SW sales manager, Central Europe region. 2 IBM Security Look familiar? Criminal

7 IBM Security

IBM Security helps

protect the oldest

brand in tennis

with the latest

innovation in

security AI and

analytics.

60x fastersecurity threat investigations with Watson compared to manual analysis

5x increasein volume of security incidents analyzed over the course of the tournament

Zerobreaches impacted the 2017 Wimbledon website and brand

Help customers stop threats

Page 8: IBM Security nie iba QRadar - clusterkb.sk · IBM Security nie iba QRadar TomášPokorný IBM Security SW sales manager, Central Europe region. 2 IBM Security Look familiar? Criminal

8 IBM Security

IBM Security: Leader across 12 out of 12 security market segments

DOMAIN SEGMENT MARKET SEGMENT / REPORTANALYST

RANKINGS

Security Operations and Response

Security Intelligence Security Information and Event Management (SIEM) LEADER

Network & Endpoint Protection Endpoint: Client Management Tools LEADER

Information Risk

and Protection

Identity Governance

& Access Management

Identity and Access Governance LEADER

Access Management (worldwide) LEADER

Identity and Access Management as a Service (IDaaS) LEADER

Identity Provisioning Management LEADER

Data Security Database Security LEADER

Application Security Application Security Testing (dynamic and static) LEADER

Mobile Protection Enterprise Mobility Management (MaaS360) LEADER

Fraud Protection Web Fraud Detection (Trusteer) LEADER

Security

Transformation

Services

Consulting and

Managed Services

Managed Security Services (MSS) LEADER

Information Security Consulting Services LEADER

Note: This is a collective view of top analyst rankings, compiled as of November 2017

Page 9: IBM Security nie iba QRadar - clusterkb.sk · IBM Security nie iba QRadar TomášPokorný IBM Security SW sales manager, Central Europe region. 2 IBM Security Look familiar? Criminal

9 IBM Security

IBM SECURITY LEADS THE MAGIC QUADRANT RANKINGS

0 1 2 3 4 5 6 7 8 9 10

Tanium

FireEye

Imperva

Splunk

Palo Alto

McAfee

Symantec

Microsoft

Cisco

IBM Security

MQ Leader MQ Appear

IBM AND BUSINESS PARTNER INTERNAL USE ONLY

Page 10: IBM Security nie iba QRadar - clusterkb.sk · IBM Security nie iba QRadar TomášPokorný IBM Security SW sales manager, Central Europe region. 2 IBM Security Look familiar? Criminal

10 IBM Security

Open partner ecosystem200+ ecosystem partners, 500+ QRadar integrations

… …

Page 11: IBM Security nie iba QRadar - clusterkb.sk · IBM Security nie iba QRadar TomášPokorný IBM Security SW sales manager, Central Europe region. 2 IBM Security Look familiar? Criminal

ibm.com/security

securityintelligence.com

xforce.ibmcloud.com

@ibmsecurity

youtube/user/ibmsecuritysolutions

© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,

express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products

and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service

marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your

enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.

No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,

products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products

or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.

FOLLOW US ON:

THANK YOU