SlideShare ist ein Scribd-Unternehmen logo
1 von 38
IBM Security: Threat Landscape
IBM Security: Threat Landscape
Michael Andersson
Client Technical Professional
IBM Security Systems
Please note:

•    IBM’s statements regarding its plans, directions, and intent are
     subject to change or withdrawal without notice at IBM’s sole discretion.
•    Information regarding potential future products is intended to outline
     our general product direction and it should not be relied on in making a purchasing decision.
•    The information mentioned regarding potential future products is not a commitment, promise,
     or legal obligation to deliver any material, code or functionality. Information about potential
     future products may not be incorporated into any contract. The development, release, and
     timing of any future features or functionality described for our products remains at our sole
     discretion.
•    Performance is based on measurements and projections using standard IBM benchmarks in a
     controlled environment. The actual throughput or performance that any user will experience
     will vary depending upon many factors, including considerations such as the amount of
     multiprogramming in the user's job stream, the I/O configuration, the storage configuration,
     and the workload processed. Therefore, no assurance can be given that an individual user
     will achieve results similar to those stated here.
Agenda


• X-Force overview
• Highlights from the 1H 2012 IBM X-Force Trend and Risk Report
    –   Vulnerabilities
    –   Exploits
    –   Attacks
• IBM Security Advanced Threat Protection Platform
X-Force Research
                                                                X-Force Research
             The mission of the                                 17B analyzed Web pages & images
          IBM X-Force® research and                             40M spam & phishing attacks
            development team is to:                             68K documented vulnerabilities
   Research and evaluate threat and protection issues
                                                                13B security events daily

   Deliver security protection for today’s security problems
   Develop new technology for tomorrow’s security challenges

   Educate the media and user communities                      Provides Specific Analysis of:
                                                                 •  Vulnerabilities & exploits
                                                                 •  Malicious/Unwanted websites
                                                                 •  Spam and phishing
                                                                 •  Malware
                                                                 •  Other emerging trends
Vulnerability disclosures up in 2012
• Total number of vulnerabilities grew (4,400 in 1H 2012)
   – the projection could reach all time high in 2012
Web Application Vulnerabilities Rise Again
• At mid-year 2012, 47% of security vulnerabilities affected web applications
    • Up from 41% in 2011
    • XSS reaches high of 51%
Vulnerabilities without patches
• Unpatched vulnerabilities, highest numbers in years
Public Exploit Disclosures

• Decrease in
  percentage of
  vulnerabilities

• Slightly up in actual
  numbers compared
  to 2011
Some categories stays the same

• Number of browser and multi-media exploits are about the same
Things are looking better for mobile platforms
• Better at discovering vulnerabilities
• Harder to exploit
MSS – Top 10 high volume signatures
• Not much change since last year
• SQL Injection is still the most common attack
SQL Injection Attacks against Web Servers
• Very often automated processes of finding victims
XSS reaching new highs in 1H 2011
• More than 6,000 variants of this vulnerability, with uses ranging from
  hijacking a browser session to a total system web-server-based takeover.
Web browser explotation
SQL Slammer continues to drop
2011: “The year of the targeted attack”
Who is attacking our networks?
Techniques used by attackers are bypassing traditional defenses

Advanced
  •   Using exploits for unreported vulnerabilities, aka a “zero day”
  •   Advanced, custom malware that is not detected by antivirus products

Persistent
  •   Attacks lasting for months or years
  •   Attackers are dedicated to the target – they will get in
  •   Resistant to remediation attempts

Threat
  •   Targeted at specific individuals and
      groups within an organization
  •   Not random attacks – they are actually “out to get you”

      These methods have eroded the effectiveness of traditional defenses including firewalls, intrusion
                   prevention systems and antivirus - leaving holes in the network
Closer look at the attack vectors of today’s threats
1. User Attacks (Client-side)
    •   Drive-by Downloads: User browses to a malicious website
        and/or downloads an infected file using an unpatched
        browser or application
    •   Targeted Emails: Email containing an exploit or malicious
        attachment is sent to an individual with the right level of
        access at the company                                            1           2
2. Infrastructure Attacks (Server-side)                                      Users   Infrastructure

    •   SQL Injection: Attacker sends a specially crafted message
        to a web application, allowing them to view, modify, or delete
        DB table entries
    •   General Exploitation: Attacker identifies and exploits a
        vulnerability in unpatched or poorly written software to gain
        privileges on the system
IBM Advanced Threat Protection
                                                                                                       3
Our strategy is to protect our customers with advanced threat
protection at the network layer - by strengthening and integrating
network security, analytics and threat Intelligence capabilities
                                                                                             1
1. Advanced Threat Protection Platform
Evolve our Intrusion Prevention System to become a Threat Protection
Platform – providing packet, content, file and session inspection to stop
threats from entering the corporate network
                                                                              Users   Infrastructure
2. QRadar Security Intelligence Platform
Build tight integration between the Network Security products,
X-Force intelligence feeds and QRadar Platform product with purpose-built
analytics and reporting for threat detection and remediation

3. X-Force Threat Intelligence
Increase investment in threat intelligence feeds and feedback loops for our
products. Leverage the existing Cobion web and email filtering data, but
                                                                                             2
expand into botnet, IP reputation and Managed Security Services data sets
IBM’s Infrastructure Threat Protection
Advanced Threat Protection Platform
IBM Security Network IPS:
 Addressing Today’s Evolving Threats with Hybrid Protection



                    >300




                                         Custom Signatures (SNORT)




24
Why Vulnerability-based Research = Preemptive
Security Approach
•   Protecting against exploits is reactive
     – Too late for many
     – Variants undo previous updates
•   Protecting against vulnerabilities and
    malicious behaviors is preemptive
     – Stops threat at source
     – Requires advanced R&D

•   Why X-Force?
     – One of the best-known commercial security research groups in the world
     – IBM X-Force maintains one of the most comprehensive vulnerability
       database in the world—dating back to the 1990s.
     – X-Force constantly updates IBM’s Protocol Analysis Module, the engine
       inside IBM’s security solutions
Ahead of the Threat

      IBM’s Preemptive Approach vs.
    Reactive Approach to address Threats
   IBM Clients have typically been provided protection
     guidance prior to or within 24 hours of a vendor
        vulnerability disclosure being announced




# of days IBM clients were provided
 protection guidance ―Ahead of the
              Threat‖



                                                         Source: IBM X-Force
2
7


    IBM IPS Zero Day (Vuln/Exploit) Web App Protection
    •   IBM IPS Injection Logic Engine has stopped every large scale SQL injection or XSS
        attack day-zero.
          •      Asprox                            –   reported       12/11/2008                   –   stopped   6/7/2007
          •      Lizamoon                          –   reported       3/29/2011                    –   stopped   6/7/2007
          •      SONY (published)                  –   reported       May/June/2011                –   stopped   6/7/2007
          •      Apple Dev Network                 –   reported       July/2011                    –   stopped   6/7/2007

                New Vulnerability or Exploit            Reported Date           Ahead of the Threat Since

              Nagios expand cross-site scripting          5/1/2011                      6/7/2007
              Easy Media Script go parameter XSS          5/26/2011                     6/7/2007
              N-13 News XSS                               5/25/2011                     6/7/2007
              I GiveTest 2.1.0 SQL Injection              6/21/2011                     6/7/2007
              RG Board SDQL Injection Published:          6/28/2011                     6/7/2007
              BlogiT PHP Injection                        6/28/2011                     6/7/2007
              IdevSpot SQL Injection (iSupport)          2011-05-23                     6/7/2007
              2Point Solutions SQL Injection             6/24/2011                      6/7/2007
              PHPFusion SQL Injection                    1/17/2011                      6/7/2007
              ToursManager PhP Script Blind SQli         2011-07-xx                     6/7/2007
              Oracle Database SQL Injection              2011-07-xx                     6/7/2007
              LuxCal Web Calendar                         7/7/2011                      6/7/2007
              Apple Web Developer Website SQL            2011-07-xx                     6/7/2007
              MySQLDriverCS Cross-Param SQLi              6/27/2011                     6/7/2007
Complete Control: Overcoming a Simple Block-Only Approach
 • Network Control by users,
   groups, systems, protocols,
   applications & application actions
 • Block evolving, high-risk sites
   such as Phishing and Malware with
   constantly updated categories
 • Comprehensive up-to-date web
   site coverage with industry-
   leading 15 Billion+ URLs
 • Rich application support with
   1000+ applications and individual
   actions

“We had a case in Europe where workers went
on strike for 3 days after Facebook was
completely blocked…so granularity is key.”
                       – IBM Business Partner
Network Security Product Line up
Product                          Description
                                 The core of any Intrusion Prevention strategy, IBM Security Network IPS appliances help
IBM Security Network Intrusion
                                 to protect the network infrastructure from a wide range of attacks, up to 23 Gbps inspected
Prevention System                throughput


                                 Focused on protecting individual assets on the network including servers and desktops
IBM Security Endpoint Defence    from both internal and external threats


IBM Security Virtual Server      Virtual Server Protection is integrated with the hypervisor and provides visibility into intra-
Protection                       VM network traffic. Supports ESX 4.1 and 5.0 and 10Gb Ethernet


IBM Security SiteProtector       Centralized management for IBM Security intrusion prevention solutions that provides a
System                           single management point to control security policy, analysis, alerting and reporting
Security Intelligence Platform
Solving Customer Challenges
 Major
                                          • Discovered 500 hosts with “Here You Have”
 Electric      Detecting threats            virus, which other solutions missed
 Utility
 Fortune 5
                                          • 2 Billion logs and events per day reduced to
 Energy        Consolidating data silos     25 high priority offenses
 Company
 Branded
                                          • Trusted insider stealing and destroying key
 Apparel       Detecting insider fraud      data
 Maker
 $100B                                    • Automating the policy monitoring and
               Predicting risks against     evaluation process for configuration change
 Diversified
               your business                in the infrastructure
 Corporation

 Industrial    Addressing regulatory      • Real-time extensive monitoring of network
 Distributor   mandates                     activity, in addition to PCI mandates
Context & Correlation Drive Deepest Insight
Solutions for the Full Compliance and Security
Intelligence Timeline
Fully Integrated Security Intelligence

                                  • Turnkey log management
  Log Management
                                  • SME to Enterprise
                                  • Upgradeable to enterprise SIEM
                     One Console Security & compliance
                             • Integrated log, threat, risk
       SIEM                            mgmt.
                                  •    Sophisticated event analytics
                                  •    Asset profiling and flow analytics
                                  •    Offense management and workflow
      Risk                        •    Predictive threat modeling & simulation
   Management                     •    Scalable configuration monitoring and audit
                                  •    Advanced threat visualization and impact
                                       analysis
  Network Activity
    & Anomaly                         • Network analytics
     Detection                        • Behavior and anomaly detection
                                      • Fully integrated with SIEM

   Network and
                                      • Layer 7 application monitoring
   Application
                                      • Content capture
    Visibility
                                      • Physical and virtual environments
IBM Security Framework
                               Enterprise Governance, Risk and Compliance Management
              IBM OpenPages                     Algorithmics (recent acquisition)               i2 Corporation (recent acquisition)




                                                 IBM Security Portfolio
                                              IT GRC Analytics & Reporting

         QRadar                QRadar Log                    QRadar                             IBM Privacy, Audit and
          SIEM                  Manager                   Risk Manager                      Compliance Assessment Services
                                                                                                                                         Security
                                                                                                                                        Consulting
                                     IT Infrastructure – Operational Security Domains

        People                   Data                   Applications                                Infrastructure
                                                                                    Network                                 Endpoint
  Identity & Access       Guardium                   AppScan                        Network                    Endpoint                 Managed
  Management Suite        Database Security          Source/Std. Edition            Intrusion Prevention       Manager (BigFix)
                                                                                                                                        Services
  Federated               Optim                      DataPower                      Server and
                                                                                                                 zSecure suite
  Identity Manager        Data Masking               Security Gateway               Virtualization Security
  Enterprise              Key Lifecycle              Security                       QRadar Anomaly             Native Server Security
  Single Sign-On          Manager                    Policy Manager                 Detection / QFlow          (RACF, IBM systems)       X-Force
                          Data Security              Application                    Managed Firewall,                                   and IBM
  Identity Assessment,    Assessment Service         Assessment Service             Unified Threat and         Penetration              Research
  Deployment and
                          Encryption and             AppScan OnDemand               Intrusion Prevention       Testing Services
  Hosting Services
                          DLP Deployment             Software as a Service          Services
Summary
•   More vulnerability disclosures and exploits in 2012 compared to 2011

•   We see more attack activity, with high profile security incidents

•   Attacks are getting more sophisticated

•   Need for proactive research driven security

•   Security Intelligence makes it possible to manage more data, with log and
    network flow correlation, configuration monitoring and risk and compliance
    management
Acknowledgements, disclaimers
and trademarks

© Copyright IBM Corporation 2012. All rights reserved.

The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information
contained in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and
strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or
any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or
licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software.

References in this publication to IBM products, programs or services do not imply that they will be made available in all countries in which IBM operates. Product release dates
and/or capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a
commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any
activities undertaken by you will result in any specific sales, revenue growth, savings or other results. All statements regarding IBM future direction and intent are subject to
change or withdrawal without notice, and represent goals and objectives only.

Information concerning non-IBM products and services was obtained from a supplier of those products and services. IBM has not tested these products or services and cannot
confirm the accuracy of performance, compatibility, or any other claims related to non-IBM products and services. Questions on the capabilities of non-IBM products and
services should be addressed to the supplier of those products and services.

All customer examples cited or described are presented as illustrations of the manner in which some customers have used IBM products and the results they may have
achieved. Actual environmental costs and performance characteristics may vary by customer and will vary depending on individual customer configurations and conditions.
Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue
growth or other results.

Prices are suggested U.S. list prices and are subject to change without notice. Starting price may not include a hard drive, operating system or other features. Contact your
IBM representative or Business Partner for the most current pricing in your geography.

IBM, the IBM logo, ibm.com, Tivoli, the Tivoli logo, Tivoli Enterprise Console, Tivoli Storage Manager FastBack, and other IBM products and services are trademarks or
registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on
their first occurrence in this information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this
information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at
"Copyright and trademark information" at ibm.com/legal/copytrade.shtml
Thank You- Q&A
Contact:
michael.andersson@se.ibm.com

Weitere ähnliche Inhalte

Was ist angesagt?

Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
Zsolt Nemeth
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
Symantec
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
tovmug
 
Pramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center ManagerPramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center Manager
Pramod Yadav
 
11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)
Jeremiah Grossman
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
Zsolt Nemeth
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
Anindya Ghosh,
 
Defense-through-Deception Network Security Model: Securing University Campus ...
Defense-through-Deception Network Security Model: Securing University Campus ...Defense-through-Deception Network Security Model: Securing University Campus ...
Defense-through-Deception Network Security Model: Securing University Campus ...
journalBEEI
 

Was ist angesagt? (20)

Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02
 
IT system security principles practices
IT system security principles practicesIT system security principles practices
IT system security principles practices
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updated
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
 
IBM Security Day, Cuenca - Ecuador
IBM Security Day, Cuenca - EcuadorIBM Security Day, Cuenca - Ecuador
IBM Security Day, Cuenca - Ecuador
 
Pramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center ManagerPramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center Manager
 
11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop
 
Keynote Session : The Non - Evolution of Security
Keynote Session : The Non - Evolution of SecurityKeynote Session : The Non - Evolution of Security
Keynote Session : The Non - Evolution of Security
 
Everything You Need To Know About Ivanti Security Controls
Everything You Need To Know About Ivanti Security ControlsEverything You Need To Know About Ivanti Security Controls
Everything You Need To Know About Ivanti Security Controls
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Security
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
 
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
 
Defense-through-Deception Network Security Model: Securing University Campus ...
Defense-through-Deception Network Security Model: Securing University Campus ...Defense-through-Deception Network Security Model: Securing University Campus ...
Defense-through-Deception Network Security Model: Securing University Campus ...
 

Ähnlich wie IBM Smarter Business 2012 - IBM Security: Threat landscape

30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_230 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
Gaurav Srivastav
 
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
Kaukau9
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IBM Switzerland
 

Ähnlich wie IBM Smarter Business 2012 - IBM Security: Threat landscape (20)

Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
 
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
 
Managing and Securing Web 2.0
Managing and Securing Web 2.0Managing and Securing Web 2.0
Managing and Securing Web 2.0
 
Infographic network protection security
Infographic network protection securityInfographic network protection security
Infographic network protection security
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
 
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_230 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
 
Jump Start Your Application Security Knowledge
Jump Start Your Application Security KnowledgeJump Start Your Application Security Knowledge
Jump Start Your Application Security Knowledge
 
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
 
A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?
 
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence QuarterlyIBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
7 Ways to Stay 7 Years Ahead of the Threat
7 Ways to Stay 7 Years Ahead of the Threat7 Ways to Stay 7 Years Ahead of the Threat
7 Ways to Stay 7 Years Ahead of the Threat
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
Brief Tour about Android Security
Brief Tour about Android SecurityBrief Tour about Android Security
Brief Tour about Android Security
 
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
Presentación AMIB Los Cabos
Presentación AMIB Los CabosPresentación AMIB Los Cabos
Presentación AMIB Los Cabos
 
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionReducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
 

Mehr von IBM Sverige

Mehr von IBM Sverige (20)

Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
 
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
 
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

 
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
 
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
 
Multiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska UniversitetssjukhusetMultiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska Universitetssjukhuset
 
Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'
 
Blockchain explored
Blockchain explored Blockchain explored
Blockchain explored
 
Blockchain architected
Blockchain architectedBlockchain architected
Blockchain architected
 
Blockchain explained
Blockchain explainedBlockchain explained
Blockchain explained
 
Grow smarter project kista watson summit 2018_tommy auoja-1
Grow smarter project  kista watson summit 2018_tommy auoja-1Grow smarter project  kista watson summit 2018_tommy auoja-1
Grow smarter project kista watson summit 2018_tommy auoja-1
 
Bemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston finalBemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston final
 
Power ai nordics dcm
Power ai nordics dcmPower ai nordics dcm
Power ai nordics dcm
 
Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18
 
Hwx introduction to_ibm_ai
Hwx introduction to_ibm_aiHwx introduction to_ibm_ai
Hwx introduction to_ibm_ai
 
Ac922 watson 180208 v1
Ac922 watson 180208 v1Ac922 watson 180208 v1
Ac922 watson 180208 v1
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box
 
Watson kista summit 2018 en bättre arbetsdag för de många människorna
Watson kista summit 2018   en bättre arbetsdag för de många människornaWatson kista summit 2018   en bättre arbetsdag för de många människorna
Watson kista summit 2018 en bättre arbetsdag för de många människorna
 
Iwcs and cisco watson kista summit 2018 v2
Iwcs and cisco   watson kista summit 2018 v2Iwcs and cisco   watson kista summit 2018 v2
Iwcs and cisco watson kista summit 2018 v2
 
Ibm intro (watson summit) bkacke
Ibm intro (watson summit) bkackeIbm intro (watson summit) bkacke
Ibm intro (watson summit) bkacke
 

Kürzlich hochgeladen

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
 

Kürzlich hochgeladen (20)

Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 

IBM Smarter Business 2012 - IBM Security: Threat landscape

  • 2. IBM Security: Threat Landscape Michael Andersson Client Technical Professional IBM Security Systems
  • 3. Please note: • IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion. • Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. • The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. • Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here.
  • 4. Agenda • X-Force overview • Highlights from the 1H 2012 IBM X-Force Trend and Risk Report – Vulnerabilities – Exploits – Attacks • IBM Security Advanced Threat Protection Platform
  • 5. X-Force Research X-Force Research The mission of the 17B analyzed Web pages & images IBM X-Force® research and 40M spam & phishing attacks development team is to: 68K documented vulnerabilities  Research and evaluate threat and protection issues 13B security events daily  Deliver security protection for today’s security problems  Develop new technology for tomorrow’s security challenges  Educate the media and user communities Provides Specific Analysis of: • Vulnerabilities & exploits • Malicious/Unwanted websites • Spam and phishing • Malware • Other emerging trends
  • 6. Vulnerability disclosures up in 2012 • Total number of vulnerabilities grew (4,400 in 1H 2012) – the projection could reach all time high in 2012
  • 7. Web Application Vulnerabilities Rise Again • At mid-year 2012, 47% of security vulnerabilities affected web applications • Up from 41% in 2011 • XSS reaches high of 51%
  • 8. Vulnerabilities without patches • Unpatched vulnerabilities, highest numbers in years
  • 9. Public Exploit Disclosures • Decrease in percentage of vulnerabilities • Slightly up in actual numbers compared to 2011
  • 10. Some categories stays the same • Number of browser and multi-media exploits are about the same
  • 11. Things are looking better for mobile platforms • Better at discovering vulnerabilities • Harder to exploit
  • 12. MSS – Top 10 high volume signatures • Not much change since last year • SQL Injection is still the most common attack
  • 13. SQL Injection Attacks against Web Servers • Very often automated processes of finding victims
  • 14. XSS reaching new highs in 1H 2011 • More than 6,000 variants of this vulnerability, with uses ranging from hijacking a browser session to a total system web-server-based takeover.
  • 17. 2011: “The year of the targeted attack”
  • 18. Who is attacking our networks?
  • 19. Techniques used by attackers are bypassing traditional defenses Advanced • Using exploits for unreported vulnerabilities, aka a “zero day” • Advanced, custom malware that is not detected by antivirus products Persistent • Attacks lasting for months or years • Attackers are dedicated to the target – they will get in • Resistant to remediation attempts Threat • Targeted at specific individuals and groups within an organization • Not random attacks – they are actually “out to get you” These methods have eroded the effectiveness of traditional defenses including firewalls, intrusion prevention systems and antivirus - leaving holes in the network
  • 20. Closer look at the attack vectors of today’s threats 1. User Attacks (Client-side) • Drive-by Downloads: User browses to a malicious website and/or downloads an infected file using an unpatched browser or application • Targeted Emails: Email containing an exploit or malicious attachment is sent to an individual with the right level of access at the company 1 2 2. Infrastructure Attacks (Server-side) Users Infrastructure • SQL Injection: Attacker sends a specially crafted message to a web application, allowing them to view, modify, or delete DB table entries • General Exploitation: Attacker identifies and exploits a vulnerability in unpatched or poorly written software to gain privileges on the system
  • 21. IBM Advanced Threat Protection 3 Our strategy is to protect our customers with advanced threat protection at the network layer - by strengthening and integrating network security, analytics and threat Intelligence capabilities 1 1. Advanced Threat Protection Platform Evolve our Intrusion Prevention System to become a Threat Protection Platform – providing packet, content, file and session inspection to stop threats from entering the corporate network Users Infrastructure 2. QRadar Security Intelligence Platform Build tight integration between the Network Security products, X-Force intelligence feeds and QRadar Platform product with purpose-built analytics and reporting for threat detection and remediation 3. X-Force Threat Intelligence Increase investment in threat intelligence feeds and feedback loops for our products. Leverage the existing Cobion web and email filtering data, but 2 expand into botnet, IP reputation and Managed Security Services data sets
  • 24. IBM Security Network IPS: Addressing Today’s Evolving Threats with Hybrid Protection >300 Custom Signatures (SNORT) 24
  • 25. Why Vulnerability-based Research = Preemptive Security Approach • Protecting against exploits is reactive – Too late for many – Variants undo previous updates • Protecting against vulnerabilities and malicious behaviors is preemptive – Stops threat at source – Requires advanced R&D • Why X-Force? – One of the best-known commercial security research groups in the world – IBM X-Force maintains one of the most comprehensive vulnerability database in the world—dating back to the 1990s. – X-Force constantly updates IBM’s Protocol Analysis Module, the engine inside IBM’s security solutions
  • 26. Ahead of the Threat IBM’s Preemptive Approach vs. Reactive Approach to address Threats IBM Clients have typically been provided protection guidance prior to or within 24 hours of a vendor vulnerability disclosure being announced # of days IBM clients were provided protection guidance ―Ahead of the Threat‖ Source: IBM X-Force
  • 27. 2 7 IBM IPS Zero Day (Vuln/Exploit) Web App Protection • IBM IPS Injection Logic Engine has stopped every large scale SQL injection or XSS attack day-zero. • Asprox – reported 12/11/2008 – stopped 6/7/2007 • Lizamoon – reported 3/29/2011 – stopped 6/7/2007 • SONY (published) – reported May/June/2011 – stopped 6/7/2007 • Apple Dev Network – reported July/2011 – stopped 6/7/2007 New Vulnerability or Exploit Reported Date Ahead of the Threat Since Nagios expand cross-site scripting 5/1/2011 6/7/2007 Easy Media Script go parameter XSS 5/26/2011 6/7/2007 N-13 News XSS 5/25/2011 6/7/2007 I GiveTest 2.1.0 SQL Injection 6/21/2011 6/7/2007 RG Board SDQL Injection Published: 6/28/2011 6/7/2007 BlogiT PHP Injection 6/28/2011 6/7/2007 IdevSpot SQL Injection (iSupport) 2011-05-23 6/7/2007 2Point Solutions SQL Injection 6/24/2011 6/7/2007 PHPFusion SQL Injection 1/17/2011 6/7/2007 ToursManager PhP Script Blind SQli 2011-07-xx 6/7/2007 Oracle Database SQL Injection 2011-07-xx 6/7/2007 LuxCal Web Calendar 7/7/2011 6/7/2007 Apple Web Developer Website SQL 2011-07-xx 6/7/2007 MySQLDriverCS Cross-Param SQLi 6/27/2011 6/7/2007
  • 28. Complete Control: Overcoming a Simple Block-Only Approach • Network Control by users, groups, systems, protocols, applications & application actions • Block evolving, high-risk sites such as Phishing and Malware with constantly updated categories • Comprehensive up-to-date web site coverage with industry- leading 15 Billion+ URLs • Rich application support with 1000+ applications and individual actions “We had a case in Europe where workers went on strike for 3 days after Facebook was completely blocked…so granularity is key.” – IBM Business Partner
  • 29. Network Security Product Line up Product Description The core of any Intrusion Prevention strategy, IBM Security Network IPS appliances help IBM Security Network Intrusion to protect the network infrastructure from a wide range of attacks, up to 23 Gbps inspected Prevention System throughput Focused on protecting individual assets on the network including servers and desktops IBM Security Endpoint Defence from both internal and external threats IBM Security Virtual Server Virtual Server Protection is integrated with the hypervisor and provides visibility into intra- Protection VM network traffic. Supports ESX 4.1 and 5.0 and 10Gb Ethernet IBM Security SiteProtector Centralized management for IBM Security intrusion prevention solutions that provides a System single management point to control security policy, analysis, alerting and reporting
  • 31. Solving Customer Challenges Major • Discovered 500 hosts with “Here You Have” Electric Detecting threats virus, which other solutions missed Utility Fortune 5 • 2 Billion logs and events per day reduced to Energy Consolidating data silos 25 high priority offenses Company Branded • Trusted insider stealing and destroying key Apparel Detecting insider fraud data Maker $100B • Automating the policy monitoring and Predicting risks against evaluation process for configuration change Diversified your business in the infrastructure Corporation Industrial Addressing regulatory • Real-time extensive monitoring of network Distributor mandates activity, in addition to PCI mandates
  • 32. Context & Correlation Drive Deepest Insight
  • 33. Solutions for the Full Compliance and Security Intelligence Timeline
  • 34. Fully Integrated Security Intelligence • Turnkey log management Log Management • SME to Enterprise • Upgradeable to enterprise SIEM One Console Security & compliance • Integrated log, threat, risk SIEM mgmt. • Sophisticated event analytics • Asset profiling and flow analytics • Offense management and workflow Risk • Predictive threat modeling & simulation Management • Scalable configuration monitoring and audit • Advanced threat visualization and impact analysis Network Activity & Anomaly • Network analytics Detection • Behavior and anomaly detection • Fully integrated with SIEM Network and • Layer 7 application monitoring Application • Content capture Visibility • Physical and virtual environments
  • 35. IBM Security Framework Enterprise Governance, Risk and Compliance Management IBM OpenPages Algorithmics (recent acquisition) i2 Corporation (recent acquisition) IBM Security Portfolio IT GRC Analytics & Reporting QRadar QRadar Log QRadar IBM Privacy, Audit and SIEM Manager Risk Manager Compliance Assessment Services Security Consulting IT Infrastructure – Operational Security Domains People Data Applications Infrastructure Network Endpoint Identity & Access Guardium AppScan Network Endpoint Managed Management Suite Database Security Source/Std. Edition Intrusion Prevention Manager (BigFix) Services Federated Optim DataPower Server and zSecure suite Identity Manager Data Masking Security Gateway Virtualization Security Enterprise Key Lifecycle Security QRadar Anomaly Native Server Security Single Sign-On Manager Policy Manager Detection / QFlow (RACF, IBM systems) X-Force Data Security Application Managed Firewall, and IBM Identity Assessment, Assessment Service Assessment Service Unified Threat and Penetration Research Deployment and Encryption and AppScan OnDemand Intrusion Prevention Testing Services Hosting Services DLP Deployment Software as a Service Services
  • 36. Summary • More vulnerability disclosures and exploits in 2012 compared to 2011 • We see more attack activity, with high profile security incidents • Attacks are getting more sophisticated • Need for proactive research driven security • Security Intelligence makes it possible to manage more data, with log and network flow correlation, configuration monitoring and risk and compliance management
  • 37. Acknowledgements, disclaimers and trademarks © Copyright IBM Corporation 2012. All rights reserved. The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in this publication to IBM products, programs or services do not imply that they will be made available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth, savings or other results. All statements regarding IBM future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. Information concerning non-IBM products and services was obtained from a supplier of those products and services. IBM has not tested these products or services and cannot confirm the accuracy of performance, compatibility, or any other claims related to non-IBM products and services. Questions on the capabilities of non-IBM products and services should be addressed to the supplier of those products and services. All customer examples cited or described are presented as illustrations of the manner in which some customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer and will vary depending on individual customer configurations and conditions. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results. Prices are suggested U.S. list prices and are subject to change without notice. Starting price may not include a hard drive, operating system or other features. Contact your IBM representative or Business Partner for the most current pricing in your geography. IBM, the IBM logo, ibm.com, Tivoli, the Tivoli logo, Tivoli Enterprise Console, Tivoli Storage Manager FastBack, and other IBM products and services are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at ibm.com/legal/copytrade.shtml

Hinweis der Redaktion

  1. Over 51% of all web application vulnerabilities reported so far in 2012 are now categorized as cross-site scripting.
  2. – in 2012 the trend continues
  3. make it clear that this our strategy for Infrastructure..we also cover apps/People/Data..in case they don't grock the Framework.."Today, we are talking about our vision for infrastructure/network..complementing our comprehensive..."ing our comprehensive...
  4. Once you are aware – then you are ready to controlUsers can create network access control policies in addition to application control policies Suitable customer: where organizations are looking for application and policy Control network access controlVLAN, IP, application, portApplications and individual application actionsRich support300+ network protocols300+ web & non-web applications700+ individual website “actions”3M+ web sites15B+ URLs