Detect and Respond to Threats Better with IBM Security App Exchange Partners

IBM Security
IBM SecurityIBM Security
IBM Security App Exchange
Spotlight:
IMMERSE YOUR SECURITY IN THREAT INTELLIGENCE
Russ Warren
Program Manager – Security Intelligence Technology Alliance
2 IBM Security
Today’s attacks require a strategic security approach
• Build multiple perimeters
• Protect all systems
• Use signature-based methods
• Periodically scan for known threats
• Shut down systems
Tactical Approach
Compliance-driven, reactionary
Today’s Attacks
• Assume constant compromise
• Prioritize high-risk assets
• Use behavioral-based methods
• Continuously monitor activity
• Gather, preserve, retrace evidence
Strategic Approach
Intelligent, orchestrated,
automated
Indiscriminate malware,
spam and DDoS activity
Advanced, persistent, organized,
politically or financially motivated
It takes power and precision to stop adversaries and unknown threats
Yesterday’s Attacks
3 IBM Security
Continuously stop attacks
and remediate vulnerabilities
Upgrade your defenses with a coordinated platform to
outthink threats
• Disrupt malware and exploits
• Discover and patch endpoints
• Automatically fix vulnerabilities
Respond to incidents quickly, with precision
• Hunt for indicators
using deep forensics
• Orchestrate and automate
incident response
Discover unknown threats
with advanced analytics
• See attacks across the enterprise
• Sense abnormal behaviors
• Automatically prioritize threats
RESPOND
4 IBM Security
Imagine if you could…
PROTECT against tomorrow’s risks, today
5 IBM Security
How do I get started when all I see is chaos?
IP reputation
Indicators of compromiseThreat sharing
Firewalls
Incident and threat management
Virtual patching
Sandboxing
Network visibility
Endpoint patching and managementMalware protection
Antivirus
Data access control Data monitoring
Application security management
Application scanning
Access management
Entitlements and roles
Identity management
Transaction protection
Device management
Content security
Workload
protection
Cloud access
security brokerAnomaly detection
Log, flow, data analysis
Vulnerability management
Privileged identity management
Incident response
Criminal detection
Fraud protection
6 IBM Security
Integration to help prevent, detect and respond to advanced threatsIntegration to help prevent, detect and block insider threatIntegration to manage compliance and governanceIntegration for risk-based access to critical assetsIntegration to help secure mobile transformationIntegration for secure adoption of cloud apps
Integrated protection to optimize security posture
Via our IBM Technology Partners and their QRadar Extensions,
we can gain more visibility, clearer context and collaborate
on suspicious activities for the Security Operations and Incident
Response teams
Prevoty
Kunal Anand
November 8, 2016
Co-founder and CTO
8 IBM Security
Prevoty Overview
Prevoty provides Application Security Detection and Protection
at Runtime
̶ Agent Installation: no code changes required
̶ Application Integrations: C#, Java, Node.js, PHP, Python, Ruby, etc.
̶ DevOps Integrations: Ansible, Chef, Jenkins, Puppet, etc.
Detection: Application and Data Security Intelligence
̶ Visibility into attack execution in production applications
̶ Use cases: asset tagging, database monitoring/exfiltration, fraud, etc.
Protection: RASP (Runtime Application Self-Protection)
̶ Instant mitigation against attacks including the OWASP Top 10,
including content, database and command injections
Application and Data Security at Runtime
Inspect
Prevoty plug-ins use
deep instrumentation
to INSPECT
application activity at
runtime
Detect
The engine uses patented
language security
“LANGSEC” to DETECT
malicious behavior
Alert
If the payload is malicious,
ALERTSare issued to log
files and any configured
SIEMS
Protect
PROTECT mode can modify
or block malicious payloads
in real time
9 IBM Security
Prevoty Intelligence
Pre-Correlated Intelligence (Everything in One Place)
̶ Network – HTTP Request, HTTP Response, IP Addresses,
Hosts Info
̶ Application – User Session, Code Execution, Filename, Line
Number
̶ Operating System – File Reads/Writes, Process Executions
̶ Database – Query Execution, Modified Rows via Execution
The Four W’s
̶ Who – IP Address, Session, Cookie Identifier
̶ What – Contents of the payload (HTTP variables, database
queries)
̶ Where – URL, Stack Trace (includes Filename and Line
Number)
̶ When – Nanosecond Timestamp
Unparalleled Security Application and Database Security Insights
{
category : ‘SQL’,
event : ‘Data Exfiltration’,
engine : ‘query’,
severity : ‘HIGH’,
query : ‘SELECT name, pw FROM u WHERE name=‘’ OR 1=1’,
returnedRows : 10,
tautology : true,
file : ‘UserRepository.java’,
line : 30,
ip : ‘127.0.0.1’,
session_id : ‘8fOEWOQ890a’,
url : ‘http://acme.com/search?name='%20OR%201=1’,
timestamp : 1478552486344
}
10 IBM Security
Prevoty & IBM QRadar
1. Add a Prevoty Agent to your application
̶ Prevoty travels with the application through the entire SSDLC
̶ DevOps integrations with CI and CD solutions
̶ Insights are logged in many formats: CEF, LEEF, JSON
2. Download the Prevoty / QRadar Extension
̶ https://exchange.xforce.ibmcloud.com/hub/extension/Prevoty
RASP
̶ Forward Prevoty LEEF log output to your QRadar deployment
3. Analyze and Visualize Security Insights
̶ Pre-built dashboards/reports for visualizing runtime insights
̶ Correlate Prevoty with AppScan (vulnerability management),
Guardium (DAM) and Trusteer (fraud)
3 Steps to Analyze and Visualize Real-Time Application and Data Security Insights
11 IBM Security
Prevoty & IBM QRadar
Dashboards
̶ Dashboards aggregate Prevoty intelligence into a unified view
across all applications
̶ Dashboards provide a quick way to see the security posture
while allowing analysts to jump in
Pre-Built Dashboards, Saved Searches, Reports and Offenses
Saved Searches & Reports
̶ Prevoty has pre-built saved searches and reports to speed up
common tasks that analysts typically execute during their day-
to-day works and investigations.
̶ Example searches: Intelligence Grouped by Src & Dest,
Intelligence Grouped by Application, Offenses, etc.
12 IBM Security
Prevoty & IBM QRadar
• Visibility into
applications and
databases
• Application and
database monitoring
and protection
• Authentication,
authorization and
transactional fraud
• Insights into what’s
happening in the
app and beyond
• Performance within
applications
Addressing Top Security Use Cases & Questions Together
13 IBM Security
Prevoty & IBM AppScan
Pre-Production SSDLC is Resource Intensive
̶ Developers are not security experts
̶ Push to Agile Development and CI/CD represents the
desire to deploy new applications and features to
production faster
Production Risk Management
̶ Acceptable risk management allows for vulnerable
applications to be deployed to production while
organizations know their application is protected by
Prevoty
Correlate Real-World Attacks with Vulnerabilities
̶ Prioritize vulnerability remediation efforts based on actual
attacks
̶ Improves the cost and resource efficiency of remediation
Unparalleled Security Application and Database Security Insights
14 IBM Security
Prevoty & IBM QRadar Ecosystem
Runtime Visibility Improves Security Decision-Making Across the Ecosystem
ProductionPre-Prod
Applications
On-PremCloud
Databases
SSDLC
Vulnerability Management
Authentication, Authorization &
Transactional Fraud
Static&DynamicTesting
Intelligence
(LEEF)
Data
Monitoring&
Protection
Database
Activity Monitoring
Niara UBA Application for
QRadar
MACHINE LEARNING-DRIVEN ATTACK DETECTION AND ACCELERATED INVESTIGATION
Karthik Krishnan
November 8, 2016
VP Product Line Management
16 IBM Security
Two major value propositions
DETECTION OF ATTACKS AND
RISKY BEHAVIORS
on the inside
ACCELERATED INCIDENT
RESPONSE
via integrated forensic data
17 IBM Security
Machine learning combined with big data forensics
Behavioral
Analytics
18 IBM Security
SOLUTION AT A GLANCE
Console / Workflow
QRadar
PACKET
BROKER
NETWORK TRAFFIC
PACKETS
FLOWS
IDENTITY
INFASTRUCTURE
Logs
SaaS
laaS
ALERTS
AD, DHCP
DNS, Firewall, Proxy,
VPN, Email, DLP
Endpoint, Network, STIX
ANALYZER
ENTITY360
ANALYTICS FORENSICS
DATA
FUSION BIG DATA
Spark/Hadoop
Box, Office360
AWS, Azure
19 IBM Security
“DEMO”
20 IBM Security
Entity360™ Security Dossier
21 IBM Security
Behavioral analytics across multiple dimensions
22 IBM Security
Model Confidence and Business Impact
Business
Impact
Model
Confidence
23 IBM Security
Niara Alert Details
24 IBM Security
Choice of Niara Entry Points
25 IBM Security
Entity 360 security dossier
26 IBM Security
Network Conversations Drill Down
27 IBM Security
Log Details
28 IBM Security
UBA Incident response ROI
29 IBM Security
Certified to Integrate with QRadar
30 IBM Security
Basics of Behavioral Analytics
ABNORMAL INTERNAL
RESOURCE ACCESS
Behavioral
Analytics
UNSUPERVISED
+
SEMI-SUPERVISED
HISTORICAL
+
PEER GROUP
MACHINE LEARNING BASELINES
31 IBM Security
Finding the Malicious in the Anomalous
Behavioral
Analytics
SUSPICIOUS
FILE DOWNLOAD
ANOMALOUS
DNS REQUEST
UNUSUAL PRIVILEGE
ESCALATION
ABNORMAL INTERNAL
RESOURCE ACCESS
IRREGULAR EXTERNAL
DATA UPLOAD
SUPERVISED
MACHINE LEARNING
DLP
Sandbox
Firewalls
STIX
Rules
Etc.
THIRD PARTY ALERTS
32 IBM Security
Niara Alert Dashboards on QRadar Console
Check Point SmartView
FOR QRADAR
Bill Sheeran – Check Point
IBM Global Account Manager
[RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
34 IBM Security
THE CYBERTHREAT
LANDSCAPE IS RAPIDLY
EVOLVING
more sophisticated
and more advanced
[RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
35 IBM Security
IT environments have EVOLVED with new EMERGING technologies
EVOLVING AND COMPLEX IT ENVIRONMENTS
[RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
36 IBM Security
HOW TO PROTECT
TODAY’S BOUNDLESS ENVIRONMENTS?
[RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
37 IBM Security [RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
SOFTWARE-DEFINED PROTECTION (SDP) ARCHITECTURE
CONVERTING INTELLIGENCE INTO PROTECTION
ENFORCEMENT LAYER
THREAT PREVENTION
ENDPOINT
SECURITY
NETWORK SECURITY
GATEWAY
MOBILE
SECURITY
VIRTUAL
SYSTEMS
CLOUD
SECURITY
CONTROL LAYER
MANAGEMENT LAYER SINGLE MANAGEMENT
38 IBM Security
A Single View into Security Risk
[RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
39 IBM Security
Fully Integrated Threat Management
Logging
Event
Correlation
Reporting
Monitoring
For Full Visibility Across Your Network
SECURITY MANAGEMENT
[RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
40 IBM Security
Forensics: Converting Intelligence into Protection
[RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
41 IBM Security
Investigate the Threat
[RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
42 IBM Security [RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
43 IBM Security [RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
44 IBM Security [RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
45 IBM Security
Easily Customize Your Reports
Management Helpdesk Auditor
Accessible from
any device
[RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
46 IBM Security [RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
47 IBM Security [RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
48 IBM Security
Consolidate all your security
Deploy security without impeding innovation
Gain full visibility to prevent the next attack
Keep pace with dynamic environments
[RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
49 IBM Security
THINK ABOUT IT…
We blocked 1,700,000 attacks
We detected 140,000 bots communicating
with command and control
We created 1,500 new protections
minutes since we started?
The value to our customers…
5
[RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products
and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service
marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your
enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.
No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,
products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products
or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
FOLLOW US ON:
THANK YOU
1 de 50

Recomendados

Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud... por
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...IBM Security
672 visualizações32 slides
What’s the State of Your Endpoint Security? por
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?IBM Security
2.4K visualizações21 slides
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it por
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itIBM Security
745 visualizações25 slides
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints por
Malware in a JAR: How Rogue Java Applications Compromise your EndpointsMalware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your EndpointsIBM Security
1.1K visualizações17 slides
Top 5 Things to Look for in an IPS Solution por
Top 5 Things to Look for in an IPS SolutionTop 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS SolutionIBM Security
1.4K visualizações29 slides
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights por
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsIBM Security
2.7K visualizações36 slides

Mais conteúdo relacionado

Mais procurados

IBM Security Software Solutions - Powerpoint por
 IBM Security Software Solutions - Powerpoint IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - PowerpointThierry Matusiak
1.4K visualizações33 slides
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence por
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
3.2K visualizações30 slides
Protecting Mission-Critical Source Code from Application Security Vulnerabili... por
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...IBM Security
1.8K visualizações23 slides
7 Ways to Stay 7 Years Ahead of the Threat por
7 Ways to Stay 7 Years Ahead of the Threat7 Ways to Stay 7 Years Ahead of the Threat
7 Ways to Stay 7 Years Ahead of the ThreatIBM Security
1.3K visualizações22 slides
Malware evolution and Endpoint Detection and Response por
Malware evolution and Endpoint Detection and Response Malware evolution and Endpoint Detection and Response
Malware evolution and Endpoint Detection and Response Adrian Guthrie
266 visualizações47 slides
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016 por
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016IBM Security
9.3K visualizações40 slides

Mais procurados(19)

IBM Security Software Solutions - Powerpoint por Thierry Matusiak
 IBM Security Software Solutions - Powerpoint IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - Powerpoint
Thierry Matusiak1.4K visualizações
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence por IBM Security
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
IBM Security3.2K visualizações
Protecting Mission-Critical Source Code from Application Security Vulnerabili... por IBM Security
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
IBM Security1.8K visualizações
7 Ways to Stay 7 Years Ahead of the Threat por IBM Security
7 Ways to Stay 7 Years Ahead of the Threat7 Ways to Stay 7 Years Ahead of the Threat
7 Ways to Stay 7 Years Ahead of the Threat
IBM Security1.3K visualizações
Malware evolution and Endpoint Detection and Response por Adrian Guthrie
Malware evolution and Endpoint Detection and Response Malware evolution and Endpoint Detection and Response
Malware evolution and Endpoint Detection and Response
Adrian Guthrie266 visualizações
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016 por IBM Security
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
IBM Security9.3K visualizações
IBM Security Intelligence por Anna Landolfi
IBM Security IntelligenceIBM Security Intelligence
IBM Security Intelligence
Anna Landolfi4.8K visualizações
Extend Your Market Reach with IBM Security QRadar for MSPs por IBM Security
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPs
IBM Security3.5K visualizações
IBM MaaS360 with watson por Prime Infoserv
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
Prime Infoserv756 visualizações
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso... por IBM Security
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security1.9K visualizações
QRadar & XGS: Stopping Attacks with a Click of the Mouse por IBM Security
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
IBM Security1.5K visualizações
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba... por IBM Security
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
IBM Security1.1K visualizações
IBM QRadar Security Intelligence Overview por Camilo Fandiño Gómez
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
Camilo Fandiño Gómez5.1K visualizações
IBM Q-radar security intelligence roadmap por DATA SECURITY SOLUTIONS
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmap
DATA SECURITY SOLUTIONS1.1K visualizações
IBM Security Immune System por Juan Pablo Coelho
IBM Security Immune SystemIBM Security Immune System
IBM Security Immune System
Juan Pablo Coelho1.7K visualizações
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar por IBM Security
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
IBM Security4K visualizações
IBM Security Software Solutions por Thierry Matusiak
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions
Thierry Matusiak2.1K visualizações
IBM QRadar UBA por IBM Security
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
IBM Security5.7K visualizações
Security Solution - IBM Business Connect Qatar Defend your company against cy... por Dalia Reda
Security Solution - IBM Business Connect Qatar Defend your company against cy...Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...
Dalia Reda1K visualizações

Destaque

Top 12 Cybersecurity Predictions for 2017 por
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017IBM Security
1.3K visualizações15 slides
Failed Ransom: How IBM XGS Defeated Ransomware por
Failed Ransom: How IBM XGS Defeated RansomwareFailed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated RansomwareIBM Security
1.7K visualizações31 slides
Orchestrate Your Security Defenses; Protect Against Insider Threats por
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats IBM Security
1.2K visualizações7 slides
Close the Loop on Incident Response por
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
2.6K visualizações1 slide
Safeguard Healthcare Identities and Data with Identity Governance and Intelli... por
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...IBM Security
1.3K visualizações20 slides
QRadar, ArcSight and Splunk por
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk M sharifi
21.4K visualizações26 slides

Destaque(19)

Top 12 Cybersecurity Predictions for 2017 por IBM Security
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
IBM Security1.3K visualizações
Failed Ransom: How IBM XGS Defeated Ransomware por IBM Security
Failed Ransom: How IBM XGS Defeated RansomwareFailed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated Ransomware
IBM Security1.7K visualizações
Orchestrate Your Security Defenses; Protect Against Insider Threats por IBM Security
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
IBM Security1.2K visualizações
Close the Loop on Incident Response por IBM Security
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
IBM Security2.6K visualizações
Safeguard Healthcare Identities and Data with Identity Governance and Intelli... por IBM Security
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
IBM Security1.3K visualizações
QRadar, ArcSight and Splunk por M sharifi
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
M sharifi21.4K visualizações
Leverage machine learning using splunk user behavioral analytics por Splunk
Leverage machine learning using splunk user behavioral analyticsLeverage machine learning using splunk user behavioral analytics
Leverage machine learning using splunk user behavioral analytics
Splunk1.2K visualizações
Cheops Technology sécurise ses datacenters avec IBM QRadar SIEM por Solutions IT et Business
Cheops Technology sécurise ses datacenters avec IBM QRadar SIEMCheops Technology sécurise ses datacenters avec IBM QRadar SIEM
Cheops Technology sécurise ses datacenters avec IBM QRadar SIEM
Solutions IT et Business520 visualizações
MDM is not Enough - Parmelee por Prolifics
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
Prolifics1.5K visualizações
SplunkSummit 2015 - Splunk User Behavioral Analytics por Splunk
SplunkSummit 2015 - Splunk User Behavioral AnalyticsSplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral Analytics
Splunk2.2K visualizações
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security por IBM Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM Security6.6K visualizações
IBM Security Intelligence Juin-2016 por Serge Richard
IBM Security Intelligence Juin-2016IBM Security Intelligence Juin-2016
IBM Security Intelligence Juin-2016
Serge Richard881 visualizações
Gov Day Sacramento 2015 - User Behavior Analytics por Splunk
Gov Day Sacramento 2015 - User Behavior AnalyticsGov Day Sacramento 2015 - User Behavior Analytics
Gov Day Sacramento 2015 - User Behavior Analytics
Splunk726 visualizações
The 2016 Ponemon Cost of a Data Breach Study por IBM Security
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach Study
IBM Security5.1K visualizações
IBM WebSphere Portal 6.1 Preview - What's New por Dvir Reznik
IBM WebSphere Portal 6.1 Preview - What's NewIBM WebSphere Portal 6.1 Preview - What's New
IBM WebSphere Portal 6.1 Preview - What's New
Dvir Reznik2.4K visualizações
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli... por IBM Security
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
IBM Security1.4K visualizações
Leverage Big Data for Security Intelligence por Stefaan Van daele
Leverage Big Data for Security Intelligence Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence
Stefaan Van daele1.4K visualizações

Similar a Detect and Respond to Threats Better with IBM Security App Exchange Partners

Automating Event Driven Security in the AWS Cloud por
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAmazon Web Services
608 visualizações34 slides
TIG / Infocyte: Proactive Cybersecurity for State and Local Government por
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentInfocyte
162 visualizações40 slides
IBM QRadar Security Intelligence Overview por
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
2.8K visualizações29 slides
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks. por
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
2.4K visualizações44 slides
How to Solve Your Top IT Security Reporting Challenges with AlienVault por
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultAlienVault
1.6K visualizações18 slides
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum... por
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
374 visualizações23 slides

Similar a Detect and Respond to Threats Better with IBM Security App Exchange Partners(20)

Automating Event Driven Security in the AWS Cloud por Amazon Web Services
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS Cloud
Amazon Web Services608 visualizações
TIG / Infocyte: Proactive Cybersecurity for State and Local Government por Infocyte
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
Infocyte162 visualizações
IBM QRadar Security Intelligence Overview por Camilo Fandiño Gómez
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
Camilo Fandiño Gómez2.8K visualizações
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks. por Scalar Decisions
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions2.4K visualizações
How to Solve Your Top IT Security Reporting Challenges with AlienVault por AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVault
AlienVault1.6K visualizações
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum... por Amazon Web Services Korea
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
Amazon Web Services Korea374 visualizações
Tech Throwdown: Secure Containerization vs Whitelisting por Invincea, Inc.
Tech Throwdown: Secure Containerization vs WhitelistingTech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs Whitelisting
Invincea, Inc.1.6K visualizações
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre... por Manoj Purandare ☁
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare ☁217 visualizações
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre... por Manoj Purandare ☁
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare ☁325 visualizações
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre... por Manoj Purandare ☁
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare ☁132 visualizações
Operational Security Intelligence por Splunk
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
Splunk1.2K visualizações
David Patterson IT Security Resumes 2016 por David Patterson
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
David Patterson750 visualizações
Security Operations and Response por xband
Security Operations and ResponseSecurity Operations and Response
Security Operations and Response
xband1K visualizações
Managed security services por manoharparakh
Managed security servicesManaged security services
Managed security services
manoharparakh69 visualizações
Marlabs cyber threat management por Rajendra Menon
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
Rajendra Menon306 visualizações
Splunk for Security Breakout Session por Splunk
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
Splunk1.8K visualizações
Cisco Security Presentation por Simplex
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
Simplex3.9K visualizações
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR) por Iftikhar Ali Iqbal
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
Iftikhar Ali Iqbal563 visualizações
Post Wannacry Update por Thomas Springer
Post Wannacry UpdatePost Wannacry Update
Post Wannacry Update
Thomas Springer170 visualizações
Slide Griffin - Practical Attacks and Mitigations por EnergySec
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
EnergySec550 visualizações

Mais de IBM Security

Automation: Embracing the Future of SecOps por
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
2K visualizações22 slides
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on... por
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
914 visualizações39 slides
Bridging the Gap between Privacy and Security: Using Technology to Manage Com... por
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
941 visualizações24 slides
Integrated Response with v32 of IBM Resilient por
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
1K visualizações21 slides
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P... por
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
775 visualizações12 slides
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated... por
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
742 visualizações18 slides

Mais de IBM Security(20)

Automation: Embracing the Future of SecOps por IBM Security
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
IBM Security2K visualizações
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on... por IBM Security
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
IBM Security914 visualizações
Bridging the Gap between Privacy and Security: Using Technology to Manage Com... por IBM Security
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
IBM Security941 visualizações
Integrated Response with v32 of IBM Resilient por IBM Security
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
IBM Security1K visualizações
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P... por IBM Security
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
IBM Security775 visualizações
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated... por IBM Security
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
IBM Security742 visualizações
Accelerating SOC Transformation with IBM Resilient and Carbon Black por IBM Security
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
IBM Security966 visualizações
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration por IBM Security
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
IBM Security1.3K visualizações
Are You Ready to Move Your IAM to the Cloud? por IBM Security
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
IBM Security2K visualizações
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec... por IBM Security
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
IBM Security1.1K visualizações
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ... por IBM Security
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
IBM Security4.2K visualizações
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ... por IBM Security
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
IBM Security3.6K visualizações
WannaCry Ransomware Attack: What to Do Now por IBM Security
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
IBM Security6.9K visualizações
How to Improve Threat Detection & Simplify Security Operations por IBM Security
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
IBM Security1.9K visualizações
Mobile Vision 2020 por IBM Security
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
IBM Security1.5K visualizações
Retail Mobility, Productivity and Security por IBM Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
IBM Security1.4K visualizações
See How You Measure Up With MaaS360 Mobile Metrics por IBM Security
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile Metrics
IBM Security1.2K visualizações
Valuing Data in the Age of Ransomware por IBM Security
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
IBM Security703 visualizações
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System por IBM Security
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
IBM Security675 visualizações
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System por IBM Security
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
IBM Security1.1K visualizações

Último

ChatGPT and AI for Web Developers por
ChatGPT and AI for Web DevelopersChatGPT and AI for Web Developers
ChatGPT and AI for Web DevelopersMaximiliano Firtman
181 visualizações82 slides
PharoJS - Zürich Smalltalk Group Meetup November 2023 por
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023Noury Bouraqadi
120 visualizações17 slides
Five Things You SHOULD Know About Postman por
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About PostmanPostman
27 visualizações43 slides
The Importance of Cybersecurity for Digital Transformation por
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationNUS-ISS
27 visualizações26 slides
Java Platform Approach 1.0 - Picnic Meetup por
Java Platform Approach 1.0 - Picnic MeetupJava Platform Approach 1.0 - Picnic Meetup
Java Platform Approach 1.0 - Picnic MeetupRick Ossendrijver
25 visualizações39 slides
Empathic Computing: Delivering the Potential of the Metaverse por
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the MetaverseMark Billinghurst
470 visualizações80 slides

Último(20)

ChatGPT and AI for Web Developers por Maximiliano Firtman
ChatGPT and AI for Web DevelopersChatGPT and AI for Web Developers
ChatGPT and AI for Web Developers
Maximiliano Firtman181 visualizações
PharoJS - Zürich Smalltalk Group Meetup November 2023 por Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi120 visualizações
Five Things You SHOULD Know About Postman por Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman27 visualizações
The Importance of Cybersecurity for Digital Transformation por NUS-ISS
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
NUS-ISS27 visualizações
Java Platform Approach 1.0 - Picnic Meetup por Rick Ossendrijver
Java Platform Approach 1.0 - Picnic MeetupJava Platform Approach 1.0 - Picnic Meetup
Java Platform Approach 1.0 - Picnic Meetup
Rick Ossendrijver25 visualizações
Empathic Computing: Delivering the Potential of the Metaverse por Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst470 visualizações
How the World's Leading Independent Automotive Distributor is Reinventing Its... por NUS-ISS
How the World's Leading Independent Automotive Distributor is Reinventing Its...How the World's Leading Independent Automotive Distributor is Reinventing Its...
How the World's Leading Independent Automotive Distributor is Reinventing Its...
NUS-ISS15 visualizações
Perth MeetUp November 2023 por Michael Price
Perth MeetUp November 2023 Perth MeetUp November 2023
Perth MeetUp November 2023
Michael Price15 visualizações
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica... por NUS-ISS
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
NUS-ISS16 visualizações
Igniting Next Level Productivity with AI-Infused Data Integration Workflows por Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software225 visualizações
AMAZON PRODUCT RESEARCH.pdf por JerikkLaureta
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdf
JerikkLaureta15 visualizações
Top 10 Strategic Technologies in 2024: AI and Automation por AutomationEdge Technologies
Top 10 Strategic Technologies in 2024: AI and AutomationTop 10 Strategic Technologies in 2024: AI and Automation
Top 10 Strategic Technologies in 2024: AI and Automation
AutomationEdge Technologies14 visualizações
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor... por Vadym Kazulkin
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
Vadym Kazulkin75 visualizações
Report 2030 Digital Decade por Massimo Talia
Report 2030 Digital DecadeReport 2030 Digital Decade
Report 2030 Digital Decade
Massimo Talia14 visualizações
Attacking IoT Devices from a Web Perspective - Linux Day por Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri15 visualizações
DALI Basics Course 2023 por Ivory Egg
DALI Basics Course  2023DALI Basics Course  2023
DALI Basics Course 2023
Ivory Egg14 visualizações
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen... por NUS-ISS
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
NUS-ISS28 visualizações
Melek BEN MAHMOUD.pdf por MelekBenMahmoud
Melek BEN MAHMOUD.pdfMelek BEN MAHMOUD.pdf
Melek BEN MAHMOUD.pdf
MelekBenMahmoud14 visualizações
Spesifikasi Lengkap ASUS Vivobook Go 14 por Dot Semarang
Spesifikasi Lengkap ASUS Vivobook Go 14Spesifikasi Lengkap ASUS Vivobook Go 14
Spesifikasi Lengkap ASUS Vivobook Go 14
Dot Semarang35 visualizações

Detect and Respond to Threats Better with IBM Security App Exchange Partners

  • 1. IBM Security App Exchange Spotlight: IMMERSE YOUR SECURITY IN THREAT INTELLIGENCE Russ Warren Program Manager – Security Intelligence Technology Alliance
  • 2. 2 IBM Security Today’s attacks require a strategic security approach • Build multiple perimeters • Protect all systems • Use signature-based methods • Periodically scan for known threats • Shut down systems Tactical Approach Compliance-driven, reactionary Today’s Attacks • Assume constant compromise • Prioritize high-risk assets • Use behavioral-based methods • Continuously monitor activity • Gather, preserve, retrace evidence Strategic Approach Intelligent, orchestrated, automated Indiscriminate malware, spam and DDoS activity Advanced, persistent, organized, politically or financially motivated It takes power and precision to stop adversaries and unknown threats Yesterday’s Attacks
  • 3. 3 IBM Security Continuously stop attacks and remediate vulnerabilities Upgrade your defenses with a coordinated platform to outthink threats • Disrupt malware and exploits • Discover and patch endpoints • Automatically fix vulnerabilities Respond to incidents quickly, with precision • Hunt for indicators using deep forensics • Orchestrate and automate incident response Discover unknown threats with advanced analytics • See attacks across the enterprise • Sense abnormal behaviors • Automatically prioritize threats RESPOND
  • 4. 4 IBM Security Imagine if you could… PROTECT against tomorrow’s risks, today
  • 5. 5 IBM Security How do I get started when all I see is chaos? IP reputation Indicators of compromiseThreat sharing Firewalls Incident and threat management Virtual patching Sandboxing Network visibility Endpoint patching and managementMalware protection Antivirus Data access control Data monitoring Application security management Application scanning Access management Entitlements and roles Identity management Transaction protection Device management Content security Workload protection Cloud access security brokerAnomaly detection Log, flow, data analysis Vulnerability management Privileged identity management Incident response Criminal detection Fraud protection
  • 6. 6 IBM Security Integration to help prevent, detect and respond to advanced threatsIntegration to help prevent, detect and block insider threatIntegration to manage compliance and governanceIntegration for risk-based access to critical assetsIntegration to help secure mobile transformationIntegration for secure adoption of cloud apps Integrated protection to optimize security posture Via our IBM Technology Partners and their QRadar Extensions, we can gain more visibility, clearer context and collaborate on suspicious activities for the Security Operations and Incident Response teams
  • 7. Prevoty Kunal Anand November 8, 2016 Co-founder and CTO
  • 8. 8 IBM Security Prevoty Overview Prevoty provides Application Security Detection and Protection at Runtime ̶ Agent Installation: no code changes required ̶ Application Integrations: C#, Java, Node.js, PHP, Python, Ruby, etc. ̶ DevOps Integrations: Ansible, Chef, Jenkins, Puppet, etc. Detection: Application and Data Security Intelligence ̶ Visibility into attack execution in production applications ̶ Use cases: asset tagging, database monitoring/exfiltration, fraud, etc. Protection: RASP (Runtime Application Self-Protection) ̶ Instant mitigation against attacks including the OWASP Top 10, including content, database and command injections Application and Data Security at Runtime Inspect Prevoty plug-ins use deep instrumentation to INSPECT application activity at runtime Detect The engine uses patented language security “LANGSEC” to DETECT malicious behavior Alert If the payload is malicious, ALERTSare issued to log files and any configured SIEMS Protect PROTECT mode can modify or block malicious payloads in real time
  • 9. 9 IBM Security Prevoty Intelligence Pre-Correlated Intelligence (Everything in One Place) ̶ Network – HTTP Request, HTTP Response, IP Addresses, Hosts Info ̶ Application – User Session, Code Execution, Filename, Line Number ̶ Operating System – File Reads/Writes, Process Executions ̶ Database – Query Execution, Modified Rows via Execution The Four W’s ̶ Who – IP Address, Session, Cookie Identifier ̶ What – Contents of the payload (HTTP variables, database queries) ̶ Where – URL, Stack Trace (includes Filename and Line Number) ̶ When – Nanosecond Timestamp Unparalleled Security Application and Database Security Insights { category : ‘SQL’, event : ‘Data Exfiltration’, engine : ‘query’, severity : ‘HIGH’, query : ‘SELECT name, pw FROM u WHERE name=‘’ OR 1=1’, returnedRows : 10, tautology : true, file : ‘UserRepository.java’, line : 30, ip : ‘127.0.0.1’, session_id : ‘8fOEWOQ890a’, url : ‘http://acme.com/search?name='%20OR%201=1’, timestamp : 1478552486344 }
  • 10. 10 IBM Security Prevoty & IBM QRadar 1. Add a Prevoty Agent to your application ̶ Prevoty travels with the application through the entire SSDLC ̶ DevOps integrations with CI and CD solutions ̶ Insights are logged in many formats: CEF, LEEF, JSON 2. Download the Prevoty / QRadar Extension ̶ https://exchange.xforce.ibmcloud.com/hub/extension/Prevoty RASP ̶ Forward Prevoty LEEF log output to your QRadar deployment 3. Analyze and Visualize Security Insights ̶ Pre-built dashboards/reports for visualizing runtime insights ̶ Correlate Prevoty with AppScan (vulnerability management), Guardium (DAM) and Trusteer (fraud) 3 Steps to Analyze and Visualize Real-Time Application and Data Security Insights
  • 11. 11 IBM Security Prevoty & IBM QRadar Dashboards ̶ Dashboards aggregate Prevoty intelligence into a unified view across all applications ̶ Dashboards provide a quick way to see the security posture while allowing analysts to jump in Pre-Built Dashboards, Saved Searches, Reports and Offenses Saved Searches & Reports ̶ Prevoty has pre-built saved searches and reports to speed up common tasks that analysts typically execute during their day- to-day works and investigations. ̶ Example searches: Intelligence Grouped by Src & Dest, Intelligence Grouped by Application, Offenses, etc.
  • 12. 12 IBM Security Prevoty & IBM QRadar • Visibility into applications and databases • Application and database monitoring and protection • Authentication, authorization and transactional fraud • Insights into what’s happening in the app and beyond • Performance within applications Addressing Top Security Use Cases & Questions Together
  • 13. 13 IBM Security Prevoty & IBM AppScan Pre-Production SSDLC is Resource Intensive ̶ Developers are not security experts ̶ Push to Agile Development and CI/CD represents the desire to deploy new applications and features to production faster Production Risk Management ̶ Acceptable risk management allows for vulnerable applications to be deployed to production while organizations know their application is protected by Prevoty Correlate Real-World Attacks with Vulnerabilities ̶ Prioritize vulnerability remediation efforts based on actual attacks ̶ Improves the cost and resource efficiency of remediation Unparalleled Security Application and Database Security Insights
  • 14. 14 IBM Security Prevoty & IBM QRadar Ecosystem Runtime Visibility Improves Security Decision-Making Across the Ecosystem ProductionPre-Prod Applications On-PremCloud Databases SSDLC Vulnerability Management Authentication, Authorization & Transactional Fraud Static&DynamicTesting Intelligence (LEEF) Data Monitoring& Protection Database Activity Monitoring
  • 15. Niara UBA Application for QRadar MACHINE LEARNING-DRIVEN ATTACK DETECTION AND ACCELERATED INVESTIGATION Karthik Krishnan November 8, 2016 VP Product Line Management
  • 16. 16 IBM Security Two major value propositions DETECTION OF ATTACKS AND RISKY BEHAVIORS on the inside ACCELERATED INCIDENT RESPONSE via integrated forensic data
  • 17. 17 IBM Security Machine learning combined with big data forensics Behavioral Analytics
  • 18. 18 IBM Security SOLUTION AT A GLANCE Console / Workflow QRadar PACKET BROKER NETWORK TRAFFIC PACKETS FLOWS IDENTITY INFASTRUCTURE Logs SaaS laaS ALERTS AD, DHCP DNS, Firewall, Proxy, VPN, Email, DLP Endpoint, Network, STIX ANALYZER ENTITY360 ANALYTICS FORENSICS DATA FUSION BIG DATA Spark/Hadoop Box, Office360 AWS, Azure
  • 20. 20 IBM Security Entity360™ Security Dossier
  • 21. 21 IBM Security Behavioral analytics across multiple dimensions
  • 22. 22 IBM Security Model Confidence and Business Impact Business Impact Model Confidence
  • 23. 23 IBM Security Niara Alert Details
  • 24. 24 IBM Security Choice of Niara Entry Points
  • 25. 25 IBM Security Entity 360 security dossier
  • 26. 26 IBM Security Network Conversations Drill Down
  • 28. 28 IBM Security UBA Incident response ROI
  • 29. 29 IBM Security Certified to Integrate with QRadar
  • 30. 30 IBM Security Basics of Behavioral Analytics ABNORMAL INTERNAL RESOURCE ACCESS Behavioral Analytics UNSUPERVISED + SEMI-SUPERVISED HISTORICAL + PEER GROUP MACHINE LEARNING BASELINES
  • 31. 31 IBM Security Finding the Malicious in the Anomalous Behavioral Analytics SUSPICIOUS FILE DOWNLOAD ANOMALOUS DNS REQUEST UNUSUAL PRIVILEGE ESCALATION ABNORMAL INTERNAL RESOURCE ACCESS IRREGULAR EXTERNAL DATA UPLOAD SUPERVISED MACHINE LEARNING DLP Sandbox Firewalls STIX Rules Etc. THIRD PARTY ALERTS
  • 32. 32 IBM Security Niara Alert Dashboards on QRadar Console
  • 33. Check Point SmartView FOR QRADAR Bill Sheeran – Check Point IBM Global Account Manager [RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
  • 34. 34 IBM Security THE CYBERTHREAT LANDSCAPE IS RAPIDLY EVOLVING more sophisticated and more advanced [RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
  • 35. 35 IBM Security IT environments have EVOLVED with new EMERGING technologies EVOLVING AND COMPLEX IT ENVIRONMENTS [RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
  • 36. 36 IBM Security HOW TO PROTECT TODAY’S BOUNDLESS ENVIRONMENTS? [RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
  • 37. 37 IBM Security [RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​ SOFTWARE-DEFINED PROTECTION (SDP) ARCHITECTURE CONVERTING INTELLIGENCE INTO PROTECTION ENFORCEMENT LAYER THREAT PREVENTION ENDPOINT SECURITY NETWORK SECURITY GATEWAY MOBILE SECURITY VIRTUAL SYSTEMS CLOUD SECURITY CONTROL LAYER MANAGEMENT LAYER SINGLE MANAGEMENT
  • 38. 38 IBM Security A Single View into Security Risk [RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
  • 39. 39 IBM Security Fully Integrated Threat Management Logging Event Correlation Reporting Monitoring For Full Visibility Across Your Network SECURITY MANAGEMENT [RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
  • 40. 40 IBM Security Forensics: Converting Intelligence into Protection [RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
  • 41. 41 IBM Security Investigate the Threat [RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
  • 42. 42 IBM Security [RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
  • 43. 43 IBM Security [RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
  • 44. 44 IBM Security [RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
  • 45. 45 IBM Security Easily Customize Your Reports Management Helpdesk Auditor Accessible from any device [RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
  • 46. 46 IBM Security [RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
  • 47. 47 IBM Security [RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
  • 48. 48 IBM Security Consolidate all your security Deploy security without impeding innovation Gain full visibility to prevent the next attack Keep pace with dynamic environments [RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
  • 49. 49 IBM Security THINK ABOUT IT… We blocked 1,700,000 attacks We detected 140,000 bots communicating with command and control We created 1,500 new protections minutes since we started? The value to our customers… 5 [RESTRICTED] ONLY FOR DESIGNATED GROUPS AND INDIVIDUALS​
  • 50. ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions © Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. FOLLOW US ON: THANK YOU