4. 4
CISO Challenge: Competing priorities
83%of enterprises
have difficulty filling
security roles
increase
in Web application
vulnerabilities
from 2011 to 2012
14%
Increase in
compliance
mandates
Common
Vulnerabilities
and Exposures
5. 5
CISO Challenge: Inadequate tools
85tools from
0 out of 46
vendors detected
malware
45vendors
Source: IBM client example
6. 6
CISO Challenge: Business pressures
of CISOs are
concerned about Cloud and
mobile security
of organizations
are using at least one
cloud platform
70%
75%+
7. 7
stolen from
bank accounts
in Operation
High Roller
of C-level execs
say that negligent
insiders are their
biggest concern
increase
in critical
web browser
vulnerabilities
59%
43%
INTERNAL EXTERNAL PAYOFFS
$78M
CISO Challenge: Evolving Threats
11. 11
USERS
60,000 employees
Provisioning took up to 2 weeks
No monitoring of privileged users
Focus on users,
not devices
Implement identity
intelligence
Pay special attention
to trusted insiders
Privilege Identity Management
Monitoring and same-day
de-provisioning
for 100+ privileged users
Source: IBM client example
12. 12
ASSETS
critical databases
$21M
Saved
2,000
Secured
in compliance costs
Database Access and Monitoring
Thousands of databases containing
HR, ERP, credit card, and other PII
in a world where 98%
of breaches hit databases
Discover critical business
data
Harden and
secure repositories
Monitor and prevent
unauthorized access
Source: IBM client example
13. 13
30 Million customers in an industry where
$3.4B industry losses from online fraud
85% of breaches go undetected
TRANSACTIONS
Identify most
critical transactions
Monitor sessions,
access, and devices
Look for anomalies
and attacks
Advanced Fraud Protection
Zero instances of fraud
on over 1 million customer endpoints
reported
Source: IBM client example
15. 15
Context, clustering, baselining,
machine learning, and heuristics
Identify entire classes of Mutated threats
by analyzing 250+protocols and file typesANALYTICS
Pattern
matching
Don’t rely on
signature detection
Use baselines
and reputation
Identify
outliers
16. 16
Reduce 2 Billion logs and events per day
to 25high priority offenses
Get full coverage,
No more blind spots
Reduce and
prioritize alerts
Continuous
monitoring
VISIBILITY
Source: IBM client example
17. 17
Integrated
Platforms
Eliminate silos and
point solutions
Build upon a
common platform
Share information
between controls
Monitor threats across 8 Million subscribers
with an integrated PlatformINTEGRATION
Siloed
Point Products
Source: IBM client example
27. 27
Understand. Prioritize. Act.
Advanced threat
protection
Risk
management
Compliance Resource
optimization
Fraud
protection
Simulate “what ifs” for risk impact
Remediate zero-days and new security threats
Monitor asset profiles & behaviour continuously
Visualize traffic patterns and connections
Comply with regulatory mandates and policies
Prioritize vulnerability remediation
Protect transactions
Carry out advanced incident analysis & forensics
Optimize resources and efforts
We are moving from dousing fires to ensuring they don’t happen in the first place!
Vulnerability
scan data
Configuration
data
Event
data Activity
data
Context
Network
topology
29. 29
10+ demos
5 appliances
• Visit the Security Intelligence
area in the Solution Center
• Meet experts from the IBM
Security Singapore Lab
• Solution Center Sessions: Enhancing IBM Security solutions
with Trusteer fraud detection capabilities
• Technical Session: Dedicated Security track featuring
Identity and Access Management, Security Intelligence,
Mobile Security, and more
Don’t miss partner & client speakers including YaData and Asian Paints
Don’t miss…
All
Day
2
Day
3