Mais conteúdo relacionado
Semelhante a Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net (20)
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
- 1. © 2016 IBM Corporation
Ahmed Sharaf – CEO - embeddedsecurity.net
Ahmed.Sharaf@xband.net
(813) 466-9540
IBM Security
May 1, 2016
Remediate vulnerabilities faster
with IBM Security and Xband
Enterprises
- 2. 2© 2016 IBM Corporation
The perimeter is no longer fixed
The perimeter is wherever endpoints are – both on and off the corporate
network
On-site
servers
Remote
servers
Roaming
laptops
Point-of-sale
systems
ATMs Desktops
- 3. 3© 2016 IBM Corporation
Cybercrime today
Greater sophistication, reach and severity
Source: “IBM X-Force Threat Intelligence Report 2016,” IBM Corp., February 2016.
600 million
records leaked
from enterprises
worldwide
in 2015
100 million records
of personally
identifiable
healthcare
information leaked
Cybercrime
projected to be
a USD1 trillion
problem by
2019
- 4. 4© 2016 IBM Corporation
• 75% of attacks use publicly-known vulnerabilities
that could be prevented by patching, but hackers
know organizations can’t patch effectively.*
• 99.9% of exploited vulnerabilities were compromised
more than a year after the CVE was published.†
• The average time to detect advanced persistent
threats is 256 days.‡
* Source: CSIS: Raising the Bar for Cybersecurity
† Source: Verizon: Data Breach Investigation Report, April 2015
‡ Source: “IBM X-Force Threat Intelligence Report 2016,” IBM Corp., February 2016.
Ineffective patch management
Major contributor to most breaches
- 5. 5© 2016 IBM Corporation
Why other approaches fail
Disparate
tools
Manual
processes
Lack of
integration
Narrow
visibility
Siloed IT
operations
and
security
teams
- 6. 6© 2016 IBM Corporation
Find it.
Discover unmanaged endpoints and get real-time visibility into all
endpoints to identify vulnerabilities and non-compliant endpoints
Fix it.
Fix vulnerabilities and apply patches across all endpoints on
and off the network in minutes regardless of endpoint type
or network connectivity
Secure it.
Continuously monitor and enforce compliance with security,
regulatory and operational policies while proactively
responding to threats
What we do
IBM BigFix
- 7. 7© 2016 IBM Corporation
IBM BigFix: Bridge the gap between Security and IT Operations
ENDPOINT
SECURITY
Discovery
and patching
Lifecycle
management
Software compliance
and usage
Continuous
monitoring
Threat
protection
Incident
response
ENDPOINT
MANAGEMENT
IBM BigFix
FIND IT. FIX IT. SECURE IT.
…FAST
Shared visibility and control
between IT Operations
and Security
IT OPERATIONS SECURITY
Reduce operational costs while improving your security posture
- 8. 8© 2016 IBM Corporation
Prioritize risks and expedite remediation of
vulnerabilities
IBM Security QRadarIBM BigFix
Real-time endpoint
intelligence
Enterprise-wide security
analytics
Provides current
endpoint status
Correlates events
and generates alerts
Prompts IT staff
to fix vulnerabilities
• Improves asset database accuracy
• Strengthens risk assessments
• Enhances compliance reporting
• Accelerates risk prioritization
of threats and vulnerabilities
• Increases reach of vulnerability
assessment to off-network endpoints
Integrated,
closed-loop
risk
management
- 9. 9© 2016 IBM Corporation
Solution:
Comprehensive security solution from IBM that helps
staff secure endpoints and better detect and respond
to threats across the organization.
“We can now quickly, easily and accurately produce
audit reports for HIPAA and meaningful use
compliance. This has helped us obtain a considerable
sum of meaningful use incentive dollars.”
—Eddy Stephens, Chief Information Officer, Infirmary Health System
Business need:
Automate and strengthen security and endpoint
management to better protect data and meet HIPAA
and meaningful use requirements.
Expedite remediation of vulnerabilities
IBM BigFix & QRadar
- 10. 10© 2016 IBM Corporation
• Achieve automatic, continuous,
closed-loop remediation
of endpoints
• Compress patch cycle times from weeks
and days to hours or minutes
• Significantly reduce operational costs
while improving security posture
• Implement and enforce continuous
compliance across all endpoints both on
and off the corporate network
Remediate
Evaluate
Report
Conclusion
Find, fix and secure endpoints fast
- 11. © 2016 IBM Corporation
Wrap-up and next steps
Learn more about IBM BigFix
Visit
bigfix.com
Watch the videos on the
IBM BigFix YouTube channel
Read new blog posts
SecurityIntelligence.com
Follow us on Twitter
@IBMBigFix @TiOTBiz
- 12. © Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any
kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor
shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use
of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or
capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product
or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries
or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside
your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks
on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access.
IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other
systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE
IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
THANK YOUwww.ibm.com/security
Ahmed Sharaf – CEO - embeddedsecurity.net
Ahmed.Sharaf@xband.net
(813) 466-9540