SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
IBM Global Technology Services
Data Sheet




                                                        Data security strategy
                                                        and assessment
                                                        services
                                                        Integrate enterprise data security into your business
                                                        strategy


                                                        As your business grows and evolves, so does the amount of sensitive
               Highlights                               data that you need to protect. Knowing where sensitive data resides
                                                        within your organization and having the right risk mitigation and data
           ●   Helps reduce risk and improve compli-    protection measures in place is crucial to the success of your business.
               ance with a data protection strategy
               aligned to your business requirements    You need to leverage the protection technologies you already have and
                                                        optimize future IT spending to mitigate both existing and projected
           ●   Facilitates optimized data security
                                                        risks. But without a proactive data protection strategy in place, you
               spending with an integrated, proactive
               data protection road map                 may be scrambling to implement tactical solutions as problems arise,
                                                        costing you money and productivity.
           ●   Helps limit data loss by identifying
               where data resides, how it is used and
               its risk of exposure                     IBM Data Security Services – data security strategy and assessment
                                                        provides a comprehensive IBM expert assessment of your current data
                                                        protection capabilities. We help you pinpoint where sensitive data
                                                        resides within your infrastructure and how your business uses it. We
                                                        also work with you to assess your unique needs and data security
                                                        requirements and develop a holistic data protection strategy aimed at
                                                        minimizing the impact to business productivity. With a business-
                                                        aligned data security road map in place, you can feel more confident
                                                        that your business is better protected from data loss.

                                                        Identifying where your sensitive data exists and
                                                        how well it is protected
                                                        Through interviews, on-site workshops and market-leading data dis-
                                                        covery tools, our expert IBM consultants help you discover where your
                                                        sensitive data resides and how it is used in the business. We also review
                                                        your existing data protection capabilities and perform a comprehensive
                                                        assessment of the data risks that your organization currently faces.

                                                        Helping you develop a business-aligned data
                                                        protection strategy
                                                        We then work with you to develop a risk-balanced, customized strategy
                                                        to protect your sensitive data. We take into consideration your specific
                                                        business and security needs, compliance requirements and existing data
security technologies. With this unique information about your busi-
ness and available data protection tools, we help you develop a tailored
data security strategy that is weighted to associated business risks. We
leverage our expertise in managing our own sensitive data across a
global business to provide you recommendations on how you can miti-
gate potential exposures and ultimately limit data loss.                     © Copyright IBM Corporation 2010

                                                                             IBM Global Services
Developing a road map to help optimize data                                  Route 100
                                                                             Somers, NY 10589 U.S.A.
security spending
                                                                             Produced in the United States of America
To help you optimize your data security spending, we work with you to        October 2010
develop a data protection road map that is designed to streamline your       All Rights Reserved
existing data security capabilities and help them work together more
                                                                             IBM, the IBM logo, ibm.com, are trademarks or registered
efficiently. To address gaps in your data protection capabilities, we help   trademarks of International Business Machines Corporation
you evaluate alternate data security solutions that meet your specific        in the United States, other countries, or both. If these and
                                                                             other IBM trademarked terms are marked on their first
needs and integrate them into your overall strategy. Our business-
                                                                             occurrence in this information with a trademark symbol
aligned approach helps ensure that you have a strategy in place to min-      (® or ™), these symbols indicate U.S. registered or common
imize the impact to productivity across your organization.                   law trademarks owned by IBM at the time this information
                                                                             was published. Such trademarks may also be registered or
                                                                             common law trademarks in other countries. A current list of
Why IBM?                                                                     IBM trademarks is available on the web at “Copyright and
IBM has extensive knowledge in securing corporate information across         trademark information” at ibm.com/legal/copytrade.shtml

multiple industries along with experience managing our own sensitive         Other company, product or service names may be trademarks
data around the globe. Your organization benefits from our market-            or service marks of others. References in this publication to
                                                                             IBM products or services do not imply that IBM intends to
leading security and cyber threat research, and deep experience in           make them available in all countries in which IBM operates.
industry-specific security requirements. With our enterprise security
                                                                             The customer is responsible for ensuring compliance with
architecture and integration expertise, we can provide holistic solutions    legal requirements. It is the customer’s sole responsibility to
while also addressing your specific data protection needs.                    obtain advice of competent legal counsel as to the
                                                                             identification and interpretation of any relevant laws and
                                                                             regulatory requirements that may affect the customer’s
For more information                                                         business and any actions the reader may have to take to
To learn more about the IBM Data Security Services – data security           comply with such laws. IBM does not provide legal advice or
strategy and assessment, please contact your IBM marketing represen-         represent or warrant that its services or products will ensure
                                                                             that the customer is in compliance with any law or
tative or IBM Business Partner, or visit the following website:              regulation.
ibm.com/services/security

                                                                                      Please Recycle




                                                                                                                     SED03113-USEN-00

Mais conteúdo relacionado

Destaque

Protecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software TechnologyProtecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software TechnologyShawn Tuma
 
Security analysis and Portfolio Management
Security analysis and Portfolio ManagementSecurity analysis and Portfolio Management
Security analysis and Portfolio ManagementAshutosh Pandey
 
Enterprise Strategy Group: The Big Data Security Analytics Era is Here
Enterprise Strategy Group: The Big Data Security Analytics Era is HereEnterprise Strategy Group: The Big Data Security Analytics Era is Here
Enterprise Strategy Group: The Big Data Security Analytics Era is HereEMC
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
Centralizing security on the mainframe
Centralizing security on the mainframeCentralizing security on the mainframe
Centralizing security on the mainframeArun Gopinath
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud securityArun Gopinath
 
Securing virtualization in real world environments
Securing virtualization in real world environmentsSecuring virtualization in real world environments
Securing virtualization in real world environmentsArun Gopinath
 
Rewriting the rules of patch management
Rewriting the rules of patch managementRewriting the rules of patch management
Rewriting the rules of patch managementArun Gopinath
 
Cloud computing white paper who do you trust
Cloud computing white paper who do you trustCloud computing white paper who do you trust
Cloud computing white paper who do you trustArun Gopinath
 
Ibm xiv storage your ideal cloud building block
Ibm xiv storage   your ideal cloud building blockIbm xiv storage   your ideal cloud building block
Ibm xiv storage your ideal cloud building blockArun Gopinath
 

Destaque (12)

Protecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software TechnologyProtecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software Technology
 
Security analysis and Portfolio Management
Security analysis and Portfolio ManagementSecurity analysis and Portfolio Management
Security analysis and Portfolio Management
 
Enterprise Strategy Group: The Big Data Security Analytics Era is Here
Enterprise Strategy Group: The Big Data Security Analytics Era is HereEnterprise Strategy Group: The Big Data Security Analytics Era is Here
Enterprise Strategy Group: The Big Data Security Analytics Era is Here
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Centralizing security on the mainframe
Centralizing security on the mainframeCentralizing security on the mainframe
Centralizing security on the mainframe
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Securing virtualization in real world environments
Securing virtualization in real world environmentsSecuring virtualization in real world environments
Securing virtualization in real world environments
 
Rewriting the rules of patch management
Rewriting the rules of patch managementRewriting the rules of patch management
Rewriting the rules of patch management
 
Secure by design
Secure by designSecure by design
Secure by design
 
Cloud computing white paper who do you trust
Cloud computing white paper who do you trustCloud computing white paper who do you trust
Cloud computing white paper who do you trust
 
Ibm xiv storage your ideal cloud building block
Ibm xiv storage   your ideal cloud building blockIbm xiv storage   your ideal cloud building block
Ibm xiv storage your ideal cloud building block
 

Último

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Último (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 

Data security strategy-and-assessment-services

  • 1. IBM Global Technology Services Data Sheet Data security strategy and assessment services Integrate enterprise data security into your business strategy As your business grows and evolves, so does the amount of sensitive Highlights data that you need to protect. Knowing where sensitive data resides within your organization and having the right risk mitigation and data ● Helps reduce risk and improve compli- protection measures in place is crucial to the success of your business. ance with a data protection strategy aligned to your business requirements You need to leverage the protection technologies you already have and optimize future IT spending to mitigate both existing and projected ● Facilitates optimized data security risks. But without a proactive data protection strategy in place, you spending with an integrated, proactive data protection road map may be scrambling to implement tactical solutions as problems arise, costing you money and productivity. ● Helps limit data loss by identifying where data resides, how it is used and its risk of exposure IBM Data Security Services – data security strategy and assessment provides a comprehensive IBM expert assessment of your current data protection capabilities. We help you pinpoint where sensitive data resides within your infrastructure and how your business uses it. We also work with you to assess your unique needs and data security requirements and develop a holistic data protection strategy aimed at minimizing the impact to business productivity. With a business- aligned data security road map in place, you can feel more confident that your business is better protected from data loss. Identifying where your sensitive data exists and how well it is protected Through interviews, on-site workshops and market-leading data dis- covery tools, our expert IBM consultants help you discover where your sensitive data resides and how it is used in the business. We also review your existing data protection capabilities and perform a comprehensive assessment of the data risks that your organization currently faces. Helping you develop a business-aligned data protection strategy We then work with you to develop a risk-balanced, customized strategy to protect your sensitive data. We take into consideration your specific business and security needs, compliance requirements and existing data
  • 2. security technologies. With this unique information about your busi- ness and available data protection tools, we help you develop a tailored data security strategy that is weighted to associated business risks. We leverage our expertise in managing our own sensitive data across a global business to provide you recommendations on how you can miti- gate potential exposures and ultimately limit data loss. © Copyright IBM Corporation 2010 IBM Global Services Developing a road map to help optimize data Route 100 Somers, NY 10589 U.S.A. security spending Produced in the United States of America To help you optimize your data security spending, we work with you to October 2010 develop a data protection road map that is designed to streamline your All Rights Reserved existing data security capabilities and help them work together more IBM, the IBM logo, ibm.com, are trademarks or registered efficiently. To address gaps in your data protection capabilities, we help trademarks of International Business Machines Corporation you evaluate alternate data security solutions that meet your specific in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first needs and integrate them into your overall strategy. Our business- occurrence in this information with a trademark symbol aligned approach helps ensure that you have a strategy in place to min- (® or ™), these symbols indicate U.S. registered or common imize the impact to productivity across your organization. law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of Why IBM? IBM trademarks is available on the web at “Copyright and IBM has extensive knowledge in securing corporate information across trademark information” at ibm.com/legal/copytrade.shtml multiple industries along with experience managing our own sensitive Other company, product or service names may be trademarks data around the globe. Your organization benefits from our market- or service marks of others. References in this publication to IBM products or services do not imply that IBM intends to leading security and cyber threat research, and deep experience in make them available in all countries in which IBM operates. industry-specific security requirements. With our enterprise security The customer is responsible for ensuring compliance with architecture and integration expertise, we can provide holistic solutions legal requirements. It is the customer’s sole responsibility to while also addressing your specific data protection needs. obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s For more information business and any actions the reader may have to take to To learn more about the IBM Data Security Services – data security comply with such laws. IBM does not provide legal advice or strategy and assessment, please contact your IBM marketing represen- represent or warrant that its services or products will ensure that the customer is in compliance with any law or tative or IBM Business Partner, or visit the following website: regulation. ibm.com/services/security Please Recycle SED03113-USEN-00