SlideShare a Scribd company logo
1 of 20
IBM Security solution




                        En arkitektonisk vy av en ledande
                        och dynamisk IT-säkerhetsportfölj




          IBM Security Solutions
          Sven-Erik Vestergaard
          Nordic Security Architect
          svest@dk.ibm.com
Agenda
  •
  • IBM Trends

  • IBM Framework and Blueprint

  • Mapping architecture to real life

  • Summary
Trends impacting Identity and Access


                        IBM




                              H C R U6



                                         IBM
IBM Security Framework
                             IBM Security: Improving service,
                             managing risk and reducing cost
                             of Security without compromise


                         –15,000 researchers, developers and
                          SMEs on security initiatives

                         –3,000+ security & risk management
                          patents

                         –40+ years of proven success
                          securing the zSeries environment

                         –Already managing more than 7B
                          security events per day for clients

                         –IBM Security Framework, Security
                          Blueprint
Security acquisitions:

DASCOM

 4
IBM’s Approach


         IBM Security                                      IBM Security                               IBM Capabilities
           Framework                                          Blueprint                               & Offerings

    Business View                               Technical View                            Solution Architecture View
                                   Foundational Security        Common Security
       Security Domains                                                                   Platforms       Components          Configurations
                                   Mgmt Services                Infrastructure features


       Issues & Drivers                          Standards & principles                                Technologies and Practices



Describes security issues                Describes a product agnostic                      Catalogs of integrated products,
from a business                          view of security, based on                        services and solutions
perspective.                             client experience and common
                                         standards and principles




Client             External               Best Practices /                RedBooks /       Solution                     Product
                                          Guidance /
Briefings          White Papers,          standards /
                                                                          RedGuides        Architectures                Documentation
                                          industry frameworks
The IBM Security Blueprint “Component Level”
Foundational security controls closed loop
People and Identity
Delivering Policy Driven Identity and Access Governance


                                                                                   Applications

                                                                                             Entitlement

                                                                             Application Roles
         People
                                            IAM Governance
                                              using Policy
   Business
    Roles      Users                          Management
                                                                                         Data
                                                                                 Unstructured Data



                                                                                       Structured Data




 Monitoring
                  User activity monitoring and conformance to policy and regulations


 Visibility of user identities, their roles and entitlements to applications and data
 Control of role definition and user’s assignment to roles and entitlements – governance and
 enforcement
 Automation of user provisioning, access recertification and policy distribution
Controls have to be applied within a Business context

 • Policy driven governance
     • Context aware access control
        • Identity aware
        • content aware
        • transaction aware
     • Business driven IAM Governance

 • Empower people, enable collaboration
     • Business personas factored into lifecycle
     • Enable users, administrators, line of business owners
       and application owners


 • Security rendered as a service
     • integration with business applications


 • Interoperability through open standards




11
Improve security and compliance readiness through automated
   security policy enforcement, audit, and reporting


    30% or more of all                                                Accounts

  accounts are ‘orphans’                                          jcd0895
                         Gartner Group                               jdoe03
                                                                          Sarah_s4

                                                                                           Business
                                                                       nbody              Applications
                                                John C. Doe
                                                                                     1
   Authoritative
  Identity Source      TIM Trusted                                        Eliminate orphan
 (Human Resources,       Identity                                             accounts
Customer Master, etc.)    Store
                                         Sarah K. Smith                           ackerh05
        3
   Audit Reports                                              2                 doej           Cisco
                                                                                               Secure
                                                     Compare local             smiths17         ACS
                                                   privileges to policy
                       Tivoli Identity
                          Manager
                        Policies and
                         Approvals            Flag/Alert/Correct/Suspend
IBM has the standard components and solutions
supporting NemID - login in Denmark




                                                     Tivoli Federated
                                                     Identity Manager
Customer, Employee,
Partner etc.                            Validating                      Tivoli Access
                        Login via
                                                                        Manager
                      3.part (example   login with
                        Nem-login)         Idp             Control of               Business
                                                          access right              systems
                                                          and creation             MOSS/Portal
                                                            of user                   etc
                       Direct login     Validating          context
                      via customers     identities
                                                           CBT


                                                                            Customers solution

 DanID digital                                                              IBM standard
 signature                                                                  component

                                                                            3. part (evt. IBM)
Role Management
     • User:
        – the entity requesting access to a resource
        – Ex: John Smith, AppXYZ
     • Resource:
        – Ex: app, data base, table, etc.
     • Entitlement:                                        Mgr       Soc           Job
        – a permission to access a particular resource
        – Ex: open table, read record, write record
     • Business role:
        – a logical collection of users performing a
                                                            App1     App2         App3
           similar business function
        – Ex: Mgr, Soc, Job
     • Application role:
        – a logical collection of entitlements needed to           Entitlements

           perform a particular task



14
Example
 Classification based access control policies

      Swedish [City]
                                                      Policy Definition:
                                                      All documents classified as ‘Daily Treatment
              Lokal [Hospital]
                                    Daily treatment   Records’ are accessible to the Duty Doctors.
                                        records
                       Svensson [Patient]
                                                            Application Role              Resource
                                 EHR [EHR]
                                                            Classification

                                                            Action
   Duty Doctor
Imagine:
                                                        Tivoli Security Policy Manager:
Each admitted patient is assigned to a doctor
who has access to all his health-records and            Classification based policies help enforcing access
                                                        control policies on document stored across multiple
treatment records. Duty Doctors can treat the           folders.
patient while they are on official duty for that
day. They need access ‘Daily Treatment
Records’ to treat the patient. If only there was a
mechanism which automatically grants and
revokes access to ‘daily treatment records’
these duty doctors!
IBM SIEM methodology converts audit logs from various
sources to an easy to understand language, reducing
management and increasing insight

  Windows   zOS   AIX     Oracle   SAP        ISS   Firewall 1   Exchange    IIS     TAMe




                        Translate logs to “Common format”



                                    “W7”
                                                    7 W’s of Investigation
                                                    Who did What type of action on What?
                                                    When did they do it and Where,
                                                    From Where and Where To?
     View this data via a graphical enterprise compliance dashboard

                                         Reduce the need for skilled staff
                                         Ensure you see the complete audit trail
                                         Produce reports auditors can understand
IBM Security Pattern

             Desktop/Client                Security Policy
             Connection                    Repository
             HTTP (incl. SOAP/
             HTTP) Connection              Identity Repository
                                                                                                         Admin         User
             Web Services                  (Person & Account)
             Connection                                                                                             User Self-
                                                                                                     Admin.
                                                                                                                     service                      Identity
Tivoli Identity Manager (TIM)                                                                                                                  Synchronisation
                                                                                                     Workflow & Lifecycle

Tivoli Access Manager for e-business (TAMeb)                                                             Entitlement Policy      Identity                           HR
                                                                                                                                  Store                           System
Tivoli Federated Identity Manager (TFIM)                                        Auditor
                                                                                                         Provisioning Engine
                                                                                                                                                          Management Domain
Tivoli Security Policy Manager (TSPM)

Tivoli Access Manager for Enterprise Single Signon (TAM E-SSO)                                                                                        SSO     WS      Fed      Web
                                                                                                                                                      Policy Policy   SSO      Policy
Tivoli Compliance Insight Manager (TCIM)                                                                                                              Mgmt Mgmt       Conf.    Mgmt
                                                                                                                                                                                        Admin(s)

                                                                                     Policy
                                                                                    Enforce

                                                                                               Web
                                                                                               App


                                                                                                         Web
Consumer
                                                                                                         App


                                                                                                                 Web
                              Internet                                                                           App

                                                                                                                                 Other                                                             Employee/
                                                   FedSSO                                                                        Apps                                                                Staff
                                                     A&A             FedSSO
                                                                       A&A
                                                                     WS            ESB
 Business
                                                                   Gateway        (SOA)                                                            Windows
                                                                                                                                                   Windows
                                                                                                                                                   Windows
                                                                                                                                                    Apps
                                                                       Policy                                                                       Apps
                                                                                                                                                    Apps
                                                                                   Identity
                                                                      Enforce      Mapping                                            Enterprise
                                                                                                                                         Dir




                                                                                                               Audit Log Consolidation

                                                                                          Audit Policy                                   Compliance Reporting




                                                                 Auditor                                                                                                      Auditor
These capabilities provide you with end-to-end IAM governance


                                                                 Planning
                                                                 Modeling
                                  Business driven planning       Process integration

                                                              Role management/modeling/mining
                                                                       offering (planned)
                                         Policy driven
                                         governance;
              Identity                                                Access and Entitlements
            Management
                                         Process
  User lifecycle                         integration            Policy driven Entitlements
  Privileged Identity Mgmt                                      Data and application entitlements
  Role management
                                                                    Tivoli Access Manager
 Tivoli Identity Manager (TIM)                                      Tivoli Security Policy Manager
 Privileged Identity                                                   - for SOA,
                                  Compliance and monitoring
       Management                                                      - for Application Entitlements
                                   Compliance reports
                                   User activity monitoring

                                 Tivoli Security Information and Event Manager
Our strategy?: Be comprehensive
Professional Services
                               Security Governance, Risk and                    Security Information and Event
                         GRC
                         GRC   Compliance                                       Management (SIEM) & Log Management
Managed Services
Products                       Identity & Access
                                                                 Identity Management          Access Management
                               Management
Cloud Delivered

                                                                 Data Loss Prevention         Data Entitlement
                               Data Security                                                  Management
                                                                 Encryption & Key
                                                                 Lifecycle Management         Messaging Security
                               E-mail
                                                                 Database Monitoring
                               Security                                                       Data Masking
                                                                 & Protection


                                                                 Application                  Web Application
                               Application Security
                                                                 Vulnerability Scanning       Firewall

                                                                 Access & Entitlement
                               Web / URL Filtering                                            SOA Security
                                                                 Management


                               Infrastructure         Vulnerability       Virtual System
                                                                                              Endpoint Protection
                               Security               Assessment          Security

                               Threat                Security Event        Managed            Intrusion Prevention
                               Analysis              Management            Mobility Svcs      System

                               Firewall, IDS/IPS           Mainframe Security Audit,          Security Configuration
                               MFS Management              Admin & Compliance                 & Patch Management


                               Physical Security
IBM has a unique perspective on security



     Trusted Advisor         Security Company         Solution Provider           The Company

    Helping customers         A leading provider of    A leading provider of      400,000 employees
  to build smarter cities,   software and services    software and hardware    across 130 countries with
 smarter grids, new data     across a vast array of      solutions around       private data to protect.
centers, trusted passport     security product and          the world.
    systems and more.         services segments.

                                   IBM Security Solutions in 2011




20

More Related Content

What's hot (16)

CMS_01.03.12
CMS_01.03.12CMS_01.03.12
CMS_01.03.12
 
CGS_E_1.3.12
CGS_E_1.3.12CGS_E_1.3.12
CGS_E_1.3.12
 
IPM_E_17.3.12
IPM_E_17.3.12IPM_E_17.3.12
IPM_E_17.3.12
 
IPM_E_8.2.2012
IPM_E_8.2.2012IPM_E_8.2.2012
IPM_E_8.2.2012
 
IPM_E_8.2.2012
IPM_E_8.2.2012IPM_E_8.2.2012
IPM_E_8.2.2012
 
IPM_E_8.2.2012
IPM_E_8.2.2012IPM_E_8.2.2012
IPM_E_8.2.2012
 
Day 2 p1 - operate simply
Day 2   p1 - operate simplyDay 2   p1 - operate simply
Day 2 p1 - operate simply
 
IPM_E_17.3.12
IPM_E_17.3.12IPM_E_17.3.12
IPM_E_17.3.12
 
IRM_E_17.3.12
IRM_E_17.3.12IRM_E_17.3.12
IRM_E_17.3.12
 
IEM_E_13.2.12
IEM_E_13.2.12IEM_E_13.2.12
IEM_E_13.2.12
 
IRM_E_25.2.12
IRM_E_25.2.12IRM_E_25.2.12
IRM_E_25.2.12
 
Day 3 p3 - xs and ec
Day 3   p3 - xs and ecDay 3   p3 - xs and ec
Day 3 p3 - xs and ec
 
IPM_E_17.3.12
IPM_E_17.3.12IPM_E_17.3.12
IPM_E_17.3.12
 
CGM_E_8.2.2012
CGM_E_8.2.2012CGM_E_8.2.2012
CGM_E_8.2.2012
 
IRM_E_19.3.12
IRM_E_19.3.12IRM_E_19.3.12
IRM_E_19.3.12
 
IRM_E_7.4.12
IRM_E_7.4.12IRM_E_7.4.12
IRM_E_7.4.12
 

Similar to En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011

Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditBob Rhubart
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationIBM Danmark
 
Security Patterns How To Make Security Arch Easy To Consume
Security Patterns   How To Make Security Arch Easy To ConsumeSecurity Patterns   How To Make Security Arch Easy To Consume
Security Patterns How To Make Security Arch Easy To ConsumeJeff Johnson
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalArrow ECS UK
 
DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFLABS SRL
 
2013 - Smarter Analytics Leadership Summit
2013 - Smarter Analytics Leadership Summit2013 - Smarter Analytics Leadership Summit
2013 - Smarter Analytics Leadership SummitCasey Lucas
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerProlifics
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityBob Rhubart
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown JewelsIBM Security
 
Sunera Business & Technology Risk Consulting
Sunera Business & Technology Risk ConsultingSunera Business & Technology Risk Consulting
Sunera Business & Technology Risk ConsultingSunera
 
Sunera business & technology risk consulting services -slide share
Sunera  business & technology risk consulting services -slide shareSunera  business & technology risk consulting services -slide share
Sunera business & technology risk consulting services -slide shareSunera
 
Id m what-why-how presentationv2.0
Id m what-why-how presentationv2.0Id m what-why-how presentationv2.0
Id m what-why-how presentationv2.0John Bernhard
 
Ajay dhir - The new CIO leader: Managing in challenging times
Ajay dhir - The new CIO leader: Managing in challenging timesAjay dhir - The new CIO leader: Managing in challenging times
Ajay dhir - The new CIO leader: Managing in challenging timesGlobal Business Events
 
Enterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to AuditEnterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to AuditBob Rhubart
 
System Center 2012 - IT GRC
System Center 2012 - IT GRCSystem Center 2012 - IT GRC
System Center 2012 - IT GRCNorman Mayes
 
Hybrid Cloud, BigData and Consumerization The 2012 Trends
Hybrid Cloud, BigData and Consumerization The 2012 TrendsHybrid Cloud, BigData and Consumerization The 2012 Trends
Hybrid Cloud, BigData and Consumerization The 2012 TrendsSoftware Park Thailand
 

Similar to En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011 (20)

Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
Security Patterns How To Make Security Arch Easy To Consume
Security Patterns   How To Make Security Arch Easy To ConsumeSecurity Patterns   How To Make Security Arch Easy To Consume
Security Patterns How To Make Security Arch Easy To Consume
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
 
DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013
 
Search2012 ibm vf
Search2012 ibm vfSearch2012 ibm vf
Search2012 ibm vf
 
2013 - Smarter Analytics Leadership Summit
2013 - Smarter Analytics Leadership Summit2013 - Smarter Analytics Leadership Summit
2013 - Smarter Analytics Leadership Summit
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels
 
Cloud Auditing
Cloud AuditingCloud Auditing
Cloud Auditing
 
Sunera Business & Technology Risk Consulting
Sunera Business & Technology Risk ConsultingSunera Business & Technology Risk Consulting
Sunera Business & Technology Risk Consulting
 
Sunera business & technology risk consulting services -slide share
Sunera  business & technology risk consulting services -slide shareSunera  business & technology risk consulting services -slide share
Sunera business & technology risk consulting services -slide share
 
Id m what-why-how presentationv2.0
Id m what-why-how presentationv2.0Id m what-why-how presentationv2.0
Id m what-why-how presentationv2.0
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Ajay dhir - The new CIO leader: Managing in challenging times
Ajay dhir - The new CIO leader: Managing in challenging timesAjay dhir - The new CIO leader: Managing in challenging times
Ajay dhir - The new CIO leader: Managing in challenging times
 
Enterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to AuditEnterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to Audit
 
System Center 2012 - IT GRC
System Center 2012 - IT GRCSystem Center 2012 - IT GRC
System Center 2012 - IT GRC
 
Hybrid Cloud, BigData and Consumerization The 2012 Trends
Hybrid Cloud, BigData and Consumerization The 2012 TrendsHybrid Cloud, BigData and Consumerization The 2012 Trends
Hybrid Cloud, BigData and Consumerization The 2012 Trends
 

More from IBM Sverige

Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18IBM Sverige
 
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18IBM Sverige
 
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar
IBM Sverige
 
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, InterexionIBM Sverige
 
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBMIBM Sverige
 
Multiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska UniversitetssjukhusetMultiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska UniversitetssjukhusetIBM Sverige
 
Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'IBM Sverige
 
Blockchain explored
Blockchain explored Blockchain explored
Blockchain explored IBM Sverige
 
Blockchain architected
Blockchain architectedBlockchain architected
Blockchain architectedIBM Sverige
 
Blockchain explained
Blockchain explainedBlockchain explained
Blockchain explainedIBM Sverige
 
Grow smarter project kista watson summit 2018_tommy auoja-1
Grow smarter project  kista watson summit 2018_tommy auoja-1Grow smarter project  kista watson summit 2018_tommy auoja-1
Grow smarter project kista watson summit 2018_tommy auoja-1IBM Sverige
 
Bemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston finalBemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston finalIBM Sverige
 
Power ai nordics dcm
Power ai nordics dcmPower ai nordics dcm
Power ai nordics dcmIBM Sverige
 
Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18IBM Sverige
 
Hwx introduction to_ibm_ai
Hwx introduction to_ibm_aiHwx introduction to_ibm_ai
Hwx introduction to_ibm_aiIBM Sverige
 
Ac922 watson 180208 v1
Ac922 watson 180208 v1Ac922 watson 180208 v1
Ac922 watson 180208 v1IBM Sverige
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box IBM Sverige
 
Watson kista summit 2018 en bättre arbetsdag för de många människorna
Watson kista summit 2018   en bättre arbetsdag för de många människornaWatson kista summit 2018   en bättre arbetsdag för de många människorna
Watson kista summit 2018 en bättre arbetsdag för de många människornaIBM Sverige
 
Iwcs and cisco watson kista summit 2018 v2
Iwcs and cisco   watson kista summit 2018 v2Iwcs and cisco   watson kista summit 2018 v2
Iwcs and cisco watson kista summit 2018 v2IBM Sverige
 
Ibm intro (watson summit) bkacke
Ibm intro (watson summit) bkackeIbm intro (watson summit) bkacke
Ibm intro (watson summit) bkackeIBM Sverige
 

More from IBM Sverige (20)

Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
 
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
 
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

 
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
 
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
 
Multiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska UniversitetssjukhusetMultiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska Universitetssjukhuset
 
Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'
 
Blockchain explored
Blockchain explored Blockchain explored
Blockchain explored
 
Blockchain architected
Blockchain architectedBlockchain architected
Blockchain architected
 
Blockchain explained
Blockchain explainedBlockchain explained
Blockchain explained
 
Grow smarter project kista watson summit 2018_tommy auoja-1
Grow smarter project  kista watson summit 2018_tommy auoja-1Grow smarter project  kista watson summit 2018_tommy auoja-1
Grow smarter project kista watson summit 2018_tommy auoja-1
 
Bemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston finalBemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston final
 
Power ai nordics dcm
Power ai nordics dcmPower ai nordics dcm
Power ai nordics dcm
 
Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18
 
Hwx introduction to_ibm_ai
Hwx introduction to_ibm_aiHwx introduction to_ibm_ai
Hwx introduction to_ibm_ai
 
Ac922 watson 180208 v1
Ac922 watson 180208 v1Ac922 watson 180208 v1
Ac922 watson 180208 v1
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box
 
Watson kista summit 2018 en bättre arbetsdag för de många människorna
Watson kista summit 2018   en bättre arbetsdag för de många människornaWatson kista summit 2018   en bättre arbetsdag för de många människorna
Watson kista summit 2018 en bättre arbetsdag för de många människorna
 
Iwcs and cisco watson kista summit 2018 v2
Iwcs and cisco   watson kista summit 2018 v2Iwcs and cisco   watson kista summit 2018 v2
Iwcs and cisco watson kista summit 2018 v2
 
Ibm intro (watson summit) bkacke
Ibm intro (watson summit) bkackeIbm intro (watson summit) bkacke
Ibm intro (watson summit) bkacke
 

Recently uploaded

Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...ssuserf63bd7
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryWhittensFineJewelry1
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Associazione Digital Days
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsGOKUL JS
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 

Recently uploaded (20)

The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptxThe Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebs
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 

En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011

  • 1. IBM Security solution En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj IBM Security Solutions Sven-Erik Vestergaard Nordic Security Architect svest@dk.ibm.com
  • 2. Agenda • • IBM Trends • IBM Framework and Blueprint • Mapping architecture to real life • Summary
  • 3. Trends impacting Identity and Access IBM H C R U6 IBM
  • 4. IBM Security Framework IBM Security: Improving service, managing risk and reducing cost of Security without compromise –15,000 researchers, developers and SMEs on security initiatives –3,000+ security & risk management patents –40+ years of proven success securing the zSeries environment –Already managing more than 7B security events per day for clients –IBM Security Framework, Security Blueprint Security acquisitions: DASCOM 4
  • 5. IBM’s Approach IBM Security IBM Security IBM Capabilities Framework Blueprint & Offerings Business View Technical View Solution Architecture View Foundational Security Common Security Security Domains Platforms Components Configurations Mgmt Services Infrastructure features Issues & Drivers Standards & principles Technologies and Practices Describes security issues Describes a product agnostic Catalogs of integrated products, from a business view of security, based on services and solutions perspective. client experience and common standards and principles Client External Best Practices / RedBooks / Solution Product Guidance / Briefings White Papers, standards / RedGuides Architectures Documentation industry frameworks
  • 6. The IBM Security Blueprint “Component Level”
  • 9.
  • 10. Delivering Policy Driven Identity and Access Governance Applications Entitlement Application Roles People IAM Governance using Policy Business Roles Users Management Data Unstructured Data Structured Data Monitoring User activity monitoring and conformance to policy and regulations Visibility of user identities, their roles and entitlements to applications and data Control of role definition and user’s assignment to roles and entitlements – governance and enforcement Automation of user provisioning, access recertification and policy distribution
  • 11. Controls have to be applied within a Business context • Policy driven governance • Context aware access control • Identity aware • content aware • transaction aware • Business driven IAM Governance • Empower people, enable collaboration • Business personas factored into lifecycle • Enable users, administrators, line of business owners and application owners • Security rendered as a service • integration with business applications • Interoperability through open standards 11
  • 12. Improve security and compliance readiness through automated security policy enforcement, audit, and reporting 30% or more of all Accounts accounts are ‘orphans’ jcd0895 Gartner Group jdoe03 Sarah_s4 Business nbody Applications John C. Doe 1 Authoritative Identity Source TIM Trusted Eliminate orphan (Human Resources, Identity accounts Customer Master, etc.) Store Sarah K. Smith ackerh05 3 Audit Reports 2 doej Cisco Secure Compare local smiths17 ACS privileges to policy Tivoli Identity Manager Policies and Approvals Flag/Alert/Correct/Suspend
  • 13. IBM has the standard components and solutions supporting NemID - login in Denmark Tivoli Federated Identity Manager Customer, Employee, Partner etc. Validating Tivoli Access Login via Manager 3.part (example login with Nem-login) Idp Control of Business access right systems and creation MOSS/Portal of user etc Direct login Validating context via customers identities CBT Customers solution DanID digital IBM standard signature component 3. part (evt. IBM)
  • 14. Role Management • User: – the entity requesting access to a resource – Ex: John Smith, AppXYZ • Resource: – Ex: app, data base, table, etc. • Entitlement: Mgr Soc Job – a permission to access a particular resource – Ex: open table, read record, write record • Business role: – a logical collection of users performing a App1 App2 App3 similar business function – Ex: Mgr, Soc, Job • Application role: – a logical collection of entitlements needed to Entitlements perform a particular task 14
  • 15. Example Classification based access control policies Swedish [City] Policy Definition: All documents classified as ‘Daily Treatment Lokal [Hospital] Daily treatment Records’ are accessible to the Duty Doctors. records Svensson [Patient] Application Role Resource EHR [EHR] Classification Action Duty Doctor Imagine: Tivoli Security Policy Manager: Each admitted patient is assigned to a doctor who has access to all his health-records and Classification based policies help enforcing access control policies on document stored across multiple treatment records. Duty Doctors can treat the folders. patient while they are on official duty for that day. They need access ‘Daily Treatment Records’ to treat the patient. If only there was a mechanism which automatically grants and revokes access to ‘daily treatment records’ these duty doctors!
  • 16. IBM SIEM methodology converts audit logs from various sources to an easy to understand language, reducing management and increasing insight Windows zOS AIX Oracle SAP ISS Firewall 1 Exchange IIS TAMe Translate logs to “Common format” “W7” 7 W’s of Investigation Who did What type of action on What? When did they do it and Where, From Where and Where To? View this data via a graphical enterprise compliance dashboard Reduce the need for skilled staff Ensure you see the complete audit trail Produce reports auditors can understand
  • 17. IBM Security Pattern Desktop/Client Security Policy Connection Repository HTTP (incl. SOAP/ HTTP) Connection Identity Repository Admin User Web Services (Person & Account) Connection User Self- Admin. service Identity Tivoli Identity Manager (TIM) Synchronisation Workflow & Lifecycle Tivoli Access Manager for e-business (TAMeb) Entitlement Policy Identity HR Store System Tivoli Federated Identity Manager (TFIM) Auditor Provisioning Engine Management Domain Tivoli Security Policy Manager (TSPM) Tivoli Access Manager for Enterprise Single Signon (TAM E-SSO) SSO WS Fed Web Policy Policy SSO Policy Tivoli Compliance Insight Manager (TCIM) Mgmt Mgmt Conf. Mgmt Admin(s) Policy Enforce Web App Web Consumer App Web Internet App Other Employee/ FedSSO Apps Staff A&A FedSSO A&A WS ESB Business Gateway (SOA) Windows Windows Windows Apps Policy Apps Apps Identity Enforce Mapping Enterprise Dir Audit Log Consolidation Audit Policy Compliance Reporting Auditor Auditor
  • 18. These capabilities provide you with end-to-end IAM governance Planning Modeling Business driven planning Process integration Role management/modeling/mining offering (planned) Policy driven governance; Identity Access and Entitlements Management Process User lifecycle integration Policy driven Entitlements Privileged Identity Mgmt Data and application entitlements Role management Tivoli Access Manager Tivoli Identity Manager (TIM) Tivoli Security Policy Manager Privileged Identity - for SOA, Compliance and monitoring Management - for Application Entitlements Compliance reports User activity monitoring Tivoli Security Information and Event Manager
  • 19. Our strategy?: Be comprehensive Professional Services Security Governance, Risk and Security Information and Event GRC GRC Compliance Management (SIEM) & Log Management Managed Services Products Identity & Access Identity Management Access Management Management Cloud Delivered Data Loss Prevention Data Entitlement Data Security Management Encryption & Key Lifecycle Management Messaging Security E-mail Database Monitoring Security Data Masking & Protection Application Web Application Application Security Vulnerability Scanning Firewall Access & Entitlement Web / URL Filtering SOA Security Management Infrastructure Vulnerability Virtual System Endpoint Protection Security Assessment Security Threat Security Event Managed Intrusion Prevention Analysis Management Mobility Svcs System Firewall, IDS/IPS Mainframe Security Audit, Security Configuration MFS Management Admin & Compliance & Patch Management Physical Security
  • 20. IBM has a unique perspective on security Trusted Advisor Security Company Solution Provider The Company Helping customers A leading provider of A leading provider of 400,000 employees to build smarter cities, software and services software and hardware across 130 countries with smarter grids, new data across a vast array of solutions around private data to protect. centers, trusted passport security product and the world. systems and more. services segments. IBM Security Solutions in 2011 20