SlideShare uma empresa Scribd logo
1 de 25
IBM Security Webinar
IBM Cloud Security Enforcer
JOHAN LARKSATER
SECURITY SAAS EUROPE – IBM SECURITY
JUNE 2016
2 IBM Security
2© 2016 IBM Corporation
What we will cover
• Introductions
• The cloud is here, ready or not
• Cloud Security Enforcer overview
• Cloud app visibility, Qradar integration, and mobile
• Secure connectivity and IDaaS
• Protection and policies
• Wrap up and Q & A
3 IBM Security
3© 2016 IBM Corporation
Today’s Featured Guest
Sean Brown
Offering Manager
Cloud Security
4 IBM Security
4© 2016 IBM Corporation
Cloud is here to stay, are you ready to move with the business?
EMPLOYEES IT OPERATIONS YOUR BUSINESS
 Look for better ways
to get their jobs done
 Find cloud services
quick and easy to use
 Wants to save money
and reduce complexity
 Wants to automate
and consolidate IT
 Loses visibility
and control over IT
 New risk requires
new safeguards
5 IBM Security
Security and IT leaders face new challenges
CISO / CIO:
 Uncover “Shadow IT”
 Gain visibility of all cloud app usage
 Simplify connecting to approved apps
 Remove mobile blind spots
 Stop risky user behavior
 Quickly react to cloud threats
 Address compliance
and governance concerns
How does my organization?
“My team is not equipped to manage
the increased employee usage
and demand for cloud”
6 IBM Security
IBM Cloud Security Enforcer
PROTECT
Against cloud-related threats
CONNECT
Users to approved cloud apps
DETECT
Usage of cloud apps and actions
7 IBM Security
A new SaaS solution to help securely deploy cloud services
Identity and
Access Control
Threat
Prevention
Policy
Enforcement
Discovery
and Visibility
Cloud Event
Correlation
DETECT CONNECT PROTECT
MOBILE
BYOD
ON PREM
RISKY APPS
APPROVED APPS
EMPLOYEES
8 IBM Security
8© 2016 IBM Corporation
DETECT
App usage and user activity
9 IBM Security
9© 2016 IBM Corporation
 Discover thousands of cloud apps
 View analytics and risk reports
 Chart progress over time
DETECT APPROVED / SHADOW APPS
10 IBM Security
10© 2016 IBM Corporation
 Correlate cloud activity to employees
 Identify suspicious activities and trends
 See and respond to priority alerts
DETECT DETAILED USER ACTIVITY
11 IBM Security
11© 2016 IBM Corporation
IBM Cloud Security Enforcer QRadar Connector
• IBM Cloud Security Enforcer
QRadar Connector offers SOC
operators a view of the top
offense, user, and application data
from IBM Cloud Security Enforcer
within QRadar itself, thus
providing a streamlined view of
security in one pane of glass.
• The application is configured via
an admin plugin where the user
can specify the hostname of the
Cloud Security Enforcer assigned
to them.
• From this point dashboard widgets
are provided to view current day
offense, user, and application
data.
12 IBM Security
12© 2016 IBM Corporation
 Visibility of high risk users and cloud applications
 Covers the “Mobile Blind Spot” that most SIEM tools miss
 Behavioral analysis for mobile users with alerting
Enhances QRadar with:
13 IBM Security
13© 2016 IBM Corporation
Demo
IBM Cloud Security Enforcer QRadar Connector
14 IBM Security
14© 2016 IBM Corporation
IBM Cloud Security Enforcer – Discovery
Cloud, SaaS, &
Private Apps
Secure
Gateway
. . .(plus many more)
Discovery
Enterprise
Employees
Microsoft
Active Directory
Event
Collection
ID
Bridge
Directory
Sync
15 IBM Security
15© 2016 IBM Corporation
IBM Cloud Security Enforcer – Mobile Protection
Home WiFi /
Cellular Data
Network
Cloud, SaaS, &
Private Apps
. . .(plus many more)
Mobile Protection
Client
Gateway
(VPN/Proxy)
Traffic
Inspection
16 IBM Security
16© 2016 IBM Corporation
CONNECT
Users to approved cloud apps
17 IBM Security
17© 2016 IBM Corporation
September 30, 2015
GitHub Connecter
GitHub Connecter for NA Dev Team
 On/Off toggles for cloud access
 Correct out of policy application usage
CONNECT THE BUSINESS TO
APPROVED APPS, DISABLE OTHERS
18 IBM Security
18© 2016 IBM Corporation
 Display approved app catalog
 Enable self-onboarding
 Find and use apps faster
CONNECT USERS TO CLOUD APPS
19 IBM Security
19© 2016 IBM Corporation
IBM Cloud Security Enforcer – Single Sign-On & Launchpad
Microsoft
Active Directory
Cloud, SaaS, &
Private Apps
Secure
Gateway
. . .(plus many more)
Event
Collection
ID
Bridge
Directory
Sync
SSO
[Service
Provider] Launchpad
& Catalog
SSO
[Identity
Provider]
Enterprise
Employees
20 IBM Security
20© 2016 IBM Corporation
Protect
Against cloud-related threats
21 IBM Security
21© 2016 IBM Corporation
 Understand cloud app reputation
 Prioritize apps based on past threats
 Limit interaction with unsafe apps
PROTECT AGAINST RISKY APPS
22 IBM Security
22© 2016 IBM Corporation
 Establish user risk ratings
 Address “rogue” cloud app usage
 User risk score calculated by aggregate usage
 Send alerts when there’s risky behavior
PROTECT AGAINST RISKY BEHAVIOR
24 IBM Security
Key takeaways
First solution to combine cloud discovery, identity & access,
and threat prevention
Focused on securely enabling the business for cloud apps
Protects against cloud threats using IBM’s network
of threat intelligence
ibm.com/security/cloud-enforcer
25 IBM Security
25© 2016 IBM Corporation
130+ countries where IBM delivers
managed security services
25 industry analyst reports rank
IBM Security as a LEADER
No. 1 enterprise security software
vendor in total revenue
12K+ clients protected
90% of the Fortune 100
companies
Visit our web page
ibm.com/security/
Watch our videos
IBM Security YouTube Channel
View upcoming webinars & blogs
securityintelligence.com
Follow us on Twitter
@ibmsecurity
Join IBM X-Force Exchange
xforce.ibmcloud.com
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express
or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of,
creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these
materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may
change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and
other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks
or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise.
Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or
product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are
designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective.
IBM DOES NOT WARRANT THAT ANYSYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT
OF ANY PARTY.
FOLLOW US ON:
THANK YOU

Mais conteúdo relacionado

Mais procurados

Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsIBM Security
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentIBM Security
 
Uncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerIBM Security
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseIBM Security
 
Tolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't SeeTolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't SeeIBM Security
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017IBM Security
 
Attack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack ChainAttack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack ChainIBM Security
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyIBM Security
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware IBM Security
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteIBM Security
 
See How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsIBM Security
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats IBM Security
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
Top 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS SolutionTop 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS SolutionIBM Security
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016IBM Security
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016IBM Security
 
IBM Security Software Solutions - Powerpoint
 IBM Security Software Solutions - Powerpoint IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - PowerpointThierry Matusiak
 
Malware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthMalware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthIBM Security
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarIBM Security
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
 

Mais procurados (20)

Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
 
Uncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a Hacker
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
 
Tolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't SeeTolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't See
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
 
Attack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack ChainAttack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack Chain
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach Study
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
 
See How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile Metrics
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
Top 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS SolutionTop 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS Solution
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016
 
IBM Security Software Solutions - Powerpoint
 IBM Security Software Solutions - Powerpoint IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - Powerpoint
 
Malware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthMalware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient Truth
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 

Destaque

Appinions Auto Tech Influence Study
Appinions Auto Tech Influence StudyAppinions Auto Tech Influence Study
Appinions Auto Tech Influence StudyAppinions
 
Allison Leahy - How To Grow and Scale A Global Community Team
Allison Leahy - How To Grow and Scale A Global Community TeamAllison Leahy - How To Grow and Scale A Global Community Team
Allison Leahy - How To Grow and Scale A Global Community TeamFeverBee Limited
 
Hawaii Department of Business and Economic Development testimony on NextEra deal
Hawaii Department of Business and Economic Development testimony on NextEra dealHawaii Department of Business and Economic Development testimony on NextEra deal
Hawaii Department of Business and Economic Development testimony on NextEra dealHonolulu Civil Beat
 
Democratic primary for Hawaii governor crosstabs
Democratic primary for Hawaii governor crosstabsDemocratic primary for Hawaii governor crosstabs
Democratic primary for Hawaii governor crosstabsHonolulu Civil Beat
 
Democratic primary for Hawaii governor toplines
Democratic primary for Hawaii governor toplinesDemocratic primary for Hawaii governor toplines
Democratic primary for Hawaii governor toplinesHonolulu Civil Beat
 
General election for Hawaii governor toplines
General election for Hawaii governor toplinesGeneral election for Hawaii governor toplines
General election for Hawaii governor toplinesHonolulu Civil Beat
 
Sectoral Comparison of Factors Influencing Job Satisfaction for Telecom and F...
Sectoral Comparison of Factors Influencing Job Satisfaction for Telecom and F...Sectoral Comparison of Factors Influencing Job Satisfaction for Telecom and F...
Sectoral Comparison of Factors Influencing Job Satisfaction for Telecom and F...Huseyin Kiran
 
How to torment your vendors: 7 horror stories
How to torment your vendors: 7 horror storiesHow to torment your vendors: 7 horror stories
How to torment your vendors: 7 horror storiesAnna Duin
 
Jennifer Sable Lopez - How To Make SEO An Integral Part Of Your Community Str...
Jennifer Sable Lopez - How To Make SEO An Integral Part Of Your Community Str...Jennifer Sable Lopez - How To Make SEO An Integral Part Of Your Community Str...
Jennifer Sable Lopez - How To Make SEO An Integral Part Of Your Community Str...FeverBee Limited
 
Joe Cothrel - How To Increase Engagement In An Existing Online Community
Joe Cothrel - How To Increase Engagement In An Existing Online CommunityJoe Cothrel - How To Increase Engagement In An Existing Online Community
Joe Cothrel - How To Increase Engagement In An Existing Online CommunityFeverBee Limited
 
Top 15 Findings from the 2015 Schooling in America Survey
Top 15 Findings from the 2015 Schooling in America SurveyTop 15 Findings from the 2015 Schooling in America Survey
Top 15 Findings from the 2015 Schooling in America SurveyEdChoice
 
Dont #@!% the Customer: 3 Steps to Being a Customer Driven Business
Dont #@!% the Customer: 3 Steps to Being a Customer Driven BusinessDont #@!% the Customer: 3 Steps to Being a Customer Driven Business
Dont #@!% the Customer: 3 Steps to Being a Customer Driven BusinessTotango
 
UniPro University 5 guidelines for Training
UniPro University 5 guidelines for TrainingUniPro University 5 guidelines for Training
UniPro University 5 guidelines for TrainingRick Collins
 
Justin Isaf - How To Reduce Your Moderation Costs
Justin Isaf - How To Reduce Your Moderation CostsJustin Isaf - How To Reduce Your Moderation Costs
Justin Isaf - How To Reduce Your Moderation CostsFeverBee Limited
 
Barriers to Customer-Centricity
Barriers to Customer-CentricityBarriers to Customer-Centricity
Barriers to Customer-CentricityAlain Thys
 

Destaque (17)

Appinions Auto Tech Influence Study
Appinions Auto Tech Influence StudyAppinions Auto Tech Influence Study
Appinions Auto Tech Influence Study
 
Allison Leahy - How To Grow and Scale A Global Community Team
Allison Leahy - How To Grow and Scale A Global Community TeamAllison Leahy - How To Grow and Scale A Global Community Team
Allison Leahy - How To Grow and Scale A Global Community Team
 
Decoupling doc
Decoupling docDecoupling doc
Decoupling doc
 
Hawaii Department of Business and Economic Development testimony on NextEra deal
Hawaii Department of Business and Economic Development testimony on NextEra dealHawaii Department of Business and Economic Development testimony on NextEra deal
Hawaii Department of Business and Economic Development testimony on NextEra deal
 
Democratic primary for Hawaii governor crosstabs
Democratic primary for Hawaii governor crosstabsDemocratic primary for Hawaii governor crosstabs
Democratic primary for Hawaii governor crosstabs
 
Democratic primary for Hawaii governor toplines
Democratic primary for Hawaii governor toplinesDemocratic primary for Hawaii governor toplines
Democratic primary for Hawaii governor toplines
 
General election for Hawaii governor toplines
General election for Hawaii governor toplinesGeneral election for Hawaii governor toplines
General election for Hawaii governor toplines
 
Sectoral Comparison of Factors Influencing Job Satisfaction for Telecom and F...
Sectoral Comparison of Factors Influencing Job Satisfaction for Telecom and F...Sectoral Comparison of Factors Influencing Job Satisfaction for Telecom and F...
Sectoral Comparison of Factors Influencing Job Satisfaction for Telecom and F...
 
How to torment your vendors: 7 horror stories
How to torment your vendors: 7 horror storiesHow to torment your vendors: 7 horror stories
How to torment your vendors: 7 horror stories
 
Jennifer Sable Lopez - How To Make SEO An Integral Part Of Your Community Str...
Jennifer Sable Lopez - How To Make SEO An Integral Part Of Your Community Str...Jennifer Sable Lopez - How To Make SEO An Integral Part Of Your Community Str...
Jennifer Sable Lopez - How To Make SEO An Integral Part Of Your Community Str...
 
Joe Cothrel - How To Increase Engagement In An Existing Online Community
Joe Cothrel - How To Increase Engagement In An Existing Online CommunityJoe Cothrel - How To Increase Engagement In An Existing Online Community
Joe Cothrel - How To Increase Engagement In An Existing Online Community
 
Top 15 Findings from the 2015 Schooling in America Survey
Top 15 Findings from the 2015 Schooling in America SurveyTop 15 Findings from the 2015 Schooling in America Survey
Top 15 Findings from the 2015 Schooling in America Survey
 
Dont #@!% the Customer: 3 Steps to Being a Customer Driven Business
Dont #@!% the Customer: 3 Steps to Being a Customer Driven BusinessDont #@!% the Customer: 3 Steps to Being a Customer Driven Business
Dont #@!% the Customer: 3 Steps to Being a Customer Driven Business
 
UniPro University 5 guidelines for Training
UniPro University 5 guidelines for TrainingUniPro University 5 guidelines for Training
UniPro University 5 guidelines for Training
 
US Solar Market Insight Report Q1 2012
US Solar Market Insight Report Q1 2012US Solar Market Insight Report Q1 2012
US Solar Market Insight Report Q1 2012
 
Justin Isaf - How To Reduce Your Moderation Costs
Justin Isaf - How To Reduce Your Moderation CostsJustin Isaf - How To Reduce Your Moderation Costs
Justin Isaf - How To Reduce Your Moderation Costs
 
Barriers to Customer-Centricity
Barriers to Customer-CentricityBarriers to Customer-Centricity
Barriers to Customer-Centricity
 

Semelhante a Cloud security enforcer - Quick steps to avoid the blind spots of shadow it

Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...IBM Security
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...AGILLY
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIBM Security
 
Enabling Secure Use of Cloud Applications
Enabling Secure Use of Cloud ApplicationsEnabling Secure Use of Cloud Applications
Enabling Secure Use of Cloud ApplicationsSonia Baratas Alves
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud accessAGILLY
 
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.netBig Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.netxband
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?IBM Security
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseIBM Security
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public versionIBM Sverige
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMMAGILLY
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services OverviewCasey Lucas
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watsonPrime Infoserv
 
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...IBM Security
 
Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the CrimeIBM Security
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilientPrime Infoserv
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?IBM Security
 

Semelhante a Cloud security enforcer - Quick steps to avoid the blind spots of shadow it (20)

IBM Cloud Security Enforcer
IBM Cloud Security EnforcerIBM Cloud Security Enforcer
IBM Cloud Security Enforcer
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
 
Enabling Secure Use of Cloud Applications
Enabling Secure Use of Cloud ApplicationsEnabling Secure Use of Cloud Applications
Enabling Secure Use of Cloud Applications
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud access
 
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.netBig Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?
 
IBM Cloud Security Enforcer
IBM Cloud Security EnforcerIBM Cloud Security Enforcer
IBM Cloud Security Enforcer
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile Enterprise
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public version
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
 
IBM Maas360 with Watson
IBM Maas360 with WatsonIBM Maas360 with Watson
IBM Maas360 with Watson
 
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
 
Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the Crime
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 

Mais de IBM Security

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackIBM Security
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationIBM Security
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?IBM Security
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...IBM Security
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowIBM Security
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...IBM Security
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsIBM Security
 

Mais de IBM Security (20)

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
 

Último

MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 

Último (20)

MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 

Cloud security enforcer - Quick steps to avoid the blind spots of shadow it

  • 1. IBM Security Webinar IBM Cloud Security Enforcer JOHAN LARKSATER SECURITY SAAS EUROPE – IBM SECURITY JUNE 2016
  • 2. 2 IBM Security 2© 2016 IBM Corporation What we will cover • Introductions • The cloud is here, ready or not • Cloud Security Enforcer overview • Cloud app visibility, Qradar integration, and mobile • Secure connectivity and IDaaS • Protection and policies • Wrap up and Q & A
  • 3. 3 IBM Security 3© 2016 IBM Corporation Today’s Featured Guest Sean Brown Offering Manager Cloud Security
  • 4. 4 IBM Security 4© 2016 IBM Corporation Cloud is here to stay, are you ready to move with the business? EMPLOYEES IT OPERATIONS YOUR BUSINESS  Look for better ways to get their jobs done  Find cloud services quick and easy to use  Wants to save money and reduce complexity  Wants to automate and consolidate IT  Loses visibility and control over IT  New risk requires new safeguards
  • 5. 5 IBM Security Security and IT leaders face new challenges CISO / CIO:  Uncover “Shadow IT”  Gain visibility of all cloud app usage  Simplify connecting to approved apps  Remove mobile blind spots  Stop risky user behavior  Quickly react to cloud threats  Address compliance and governance concerns How does my organization? “My team is not equipped to manage the increased employee usage and demand for cloud”
  • 6. 6 IBM Security IBM Cloud Security Enforcer PROTECT Against cloud-related threats CONNECT Users to approved cloud apps DETECT Usage of cloud apps and actions
  • 7. 7 IBM Security A new SaaS solution to help securely deploy cloud services Identity and Access Control Threat Prevention Policy Enforcement Discovery and Visibility Cloud Event Correlation DETECT CONNECT PROTECT MOBILE BYOD ON PREM RISKY APPS APPROVED APPS EMPLOYEES
  • 8. 8 IBM Security 8© 2016 IBM Corporation DETECT App usage and user activity
  • 9. 9 IBM Security 9© 2016 IBM Corporation  Discover thousands of cloud apps  View analytics and risk reports  Chart progress over time DETECT APPROVED / SHADOW APPS
  • 10. 10 IBM Security 10© 2016 IBM Corporation  Correlate cloud activity to employees  Identify suspicious activities and trends  See and respond to priority alerts DETECT DETAILED USER ACTIVITY
  • 11. 11 IBM Security 11© 2016 IBM Corporation IBM Cloud Security Enforcer QRadar Connector • IBM Cloud Security Enforcer QRadar Connector offers SOC operators a view of the top offense, user, and application data from IBM Cloud Security Enforcer within QRadar itself, thus providing a streamlined view of security in one pane of glass. • The application is configured via an admin plugin where the user can specify the hostname of the Cloud Security Enforcer assigned to them. • From this point dashboard widgets are provided to view current day offense, user, and application data.
  • 12. 12 IBM Security 12© 2016 IBM Corporation  Visibility of high risk users and cloud applications  Covers the “Mobile Blind Spot” that most SIEM tools miss  Behavioral analysis for mobile users with alerting Enhances QRadar with:
  • 13. 13 IBM Security 13© 2016 IBM Corporation Demo IBM Cloud Security Enforcer QRadar Connector
  • 14. 14 IBM Security 14© 2016 IBM Corporation IBM Cloud Security Enforcer – Discovery Cloud, SaaS, & Private Apps Secure Gateway . . .(plus many more) Discovery Enterprise Employees Microsoft Active Directory Event Collection ID Bridge Directory Sync
  • 15. 15 IBM Security 15© 2016 IBM Corporation IBM Cloud Security Enforcer – Mobile Protection Home WiFi / Cellular Data Network Cloud, SaaS, & Private Apps . . .(plus many more) Mobile Protection Client Gateway (VPN/Proxy) Traffic Inspection
  • 16. 16 IBM Security 16© 2016 IBM Corporation CONNECT Users to approved cloud apps
  • 17. 17 IBM Security 17© 2016 IBM Corporation September 30, 2015 GitHub Connecter GitHub Connecter for NA Dev Team  On/Off toggles for cloud access  Correct out of policy application usage CONNECT THE BUSINESS TO APPROVED APPS, DISABLE OTHERS
  • 18. 18 IBM Security 18© 2016 IBM Corporation  Display approved app catalog  Enable self-onboarding  Find and use apps faster CONNECT USERS TO CLOUD APPS
  • 19. 19 IBM Security 19© 2016 IBM Corporation IBM Cloud Security Enforcer – Single Sign-On & Launchpad Microsoft Active Directory Cloud, SaaS, & Private Apps Secure Gateway . . .(plus many more) Event Collection ID Bridge Directory Sync SSO [Service Provider] Launchpad & Catalog SSO [Identity Provider] Enterprise Employees
  • 20. 20 IBM Security 20© 2016 IBM Corporation Protect Against cloud-related threats
  • 21. 21 IBM Security 21© 2016 IBM Corporation  Understand cloud app reputation  Prioritize apps based on past threats  Limit interaction with unsafe apps PROTECT AGAINST RISKY APPS
  • 22. 22 IBM Security 22© 2016 IBM Corporation  Establish user risk ratings  Address “rogue” cloud app usage  User risk score calculated by aggregate usage  Send alerts when there’s risky behavior PROTECT AGAINST RISKY BEHAVIOR
  • 23. 24 IBM Security Key takeaways First solution to combine cloud discovery, identity & access, and threat prevention Focused on securely enabling the business for cloud apps Protects against cloud threats using IBM’s network of threat intelligence ibm.com/security/cloud-enforcer
  • 24. 25 IBM Security 25© 2016 IBM Corporation 130+ countries where IBM delivers managed security services 25 industry analyst reports rank IBM Security as a LEADER No. 1 enterprise security software vendor in total revenue 12K+ clients protected 90% of the Fortune 100 companies Visit our web page ibm.com/security/ Watch our videos IBM Security YouTube Channel View upcoming webinars & blogs securityintelligence.com Follow us on Twitter @ibmsecurity Join IBM X-Force Exchange xforce.ibmcloud.com
  • 25. ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions © Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANYSYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. FOLLOW US ON: THANK YOU