IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security

IBM Security
IBM SecurityIBM Security
© 2015 IBM Corporation
Bridging the Endpoint Gap Between IT Ops and Security
Murtuza Choilawala | Product Management & Strategy, IBM Security
Rohan Ramesh | Product Marketing, IBM Security
IBM BigFix
2© 2015 IBM Corporation
IBM Security Strategy
Buyers
CISO, CIO, and Line-of-Business
Deliver a broad portfolio of solutions differentiated
through their integration and innovation to address the latest trends
Key Security Trends
IBM Security Portfolio
Strategy, Risk and Compliance Cybersecurity Assessment and Response
Security Intelligence and Operations
Advanced
Fraud
Protection
Identity
and Access
Management
Data
Security
Application
Security
Network, Mobile
and Endpoint
Protection
Advanced Threat and Security Research
Support the
CISO agenda1
Innovate around
megatrends2
Lead in selected
segments3
Advanced
Threats
Skills
Shortage
Cloud Mobile and
Internet of Things
Compliance
Mandates
3© 2015 IBM Corporation
You can’t fix what you can’t see
Incident response is the No. 1 factor to reduce the cost of a data breach
Despite existing tools, breaches continue to rise Lack
of visibility and control contributes to security breaches and financial loss
*Source: 2015 Cost of a Data Breach Study: Global Analysis, Ponemon Institute, May 2015
“Major global bank compromised and
millions of depositor records stolen
due to missed server upgrade cycle”
?
global average cost
of a data breach*
$3.8M

4© 2015 IBM Corporation
Siloed IT Operations and Security Teams
IT OPERATIONS
• Apply patches and fixes
• Implement security and operational policy
• Manual process takes weeks / months
IT SECURITY
• Scan for compliance status
• Create security policies
• Identify vulnerabilities
Disparate tools, manual processes, lack of integration and narrow visibility
5© 2015 IBM Corporation
Architecture Complexity Resources
 Heavy, resource-intensive
agent(s)
 Multiple products,
multiple agents
 Not Internet-friendly
Why other approaches fail
 Too much admin
and infrastructure
 Little pre-built content
 Each task detracts from
higher value projects
 Slow, scan-based
architectures
 Limited coverage
 Not cost-effective at scale
6© 2015 IBM Corporation
IBM BigFix: Bridge the gap between Security and IT Ops
ENDPOINT
SECURITY
Discovery
and Patching
Lifecycle
Management
Software Compliance
and Usage
Continuous
Monitoring
Threat
Protection
Incident
Response
ENDPOINT
MANAGEMENT
IBM BigFix®
FIND IT. FIX IT. SECURE IT.
…FAST
Shared visibility and control
between IT Operations
and Security
IT OPERATIONS SECURITY
Reduce operational costs while improving your security posture
7© 2015 IBM Corporation
Single Intelligent Agent
• Performs multiple functions
• Continuous self-assessment & policy
enforcement
• Minimal system impact (< 2% CPU)
IBM BigFix
Single intelligent
agent
Lightweight, robust infrastructure
• Use existing systems as relays
• Built-in redundancy
•Support/secure roaming endpoints
Cloud-based content delivery
• Highly extensible
• Automatic, on-demand functionality
Single server and console
•Highly secure and scalable
•Aggregates data, analyzes & reports
•Pushes out pre-defined/custom policies
Real-Time Visibility
Scalability Ease of Use
BigFix
Platform
Flexible policy language (Fixlets)
• Thousands of out-of-the-box policies
• Best practices for operations and security
• Simple custom policy authoring
• Highly extensible/applicable across all platforms
8© 2015 IBM Corporation
Endpoint management
Find and fix problems in minutes, across endpoints on and off the network
IBM BigFix®
FIND IT. FIX IT. SECURE IT…FAST
Discovery
and Patching
A single console
to identify, patch
and report
on endpoints
Lifecycle
Management
Asset discovery,
software distribution
and advanced patching
across 90+ platforms
Software Compliance
and Usage
Software license
control to improve
compliance and reduce
costs and risk
ENDPOINT MANAGEMENT
Reduce admin and infrastructure costs
9© 2015 IBM Corporation
Discovery
and Patching
Lifecycle
Management
Software
Compliance
and Usage
Discovery and patching
A single-console management system to identify, patch, and report
on multiple devices and attributes
 Discover and report on every endpoint
– Desktops
– Laptops
– Servers
– Purpose-specific endpoints
e.g., ATMs and point-of-sale (POS) devices
 Gain accurate, up-to-the minute visibility
and continuous enforcement of patches
 Manage patches to hundreds of thousands
of endpoints, multiple operating systems
and applications – automatically
 Clients report >98% first pass patch success
Protecting 50,000 PCs, servers and ATMs in 1,800 locations with one console
SunTrust Banks
10© 2015 IBM Corporation
Managing 27,000 servers across 3,000+ locations with two IT staff
Major US Retailer
Lifecycle management
Reduce cost, risk, and complexity of managing endpoints
 Streamline asset discovery
and software distribution
 Prebuilt automation scripts
 Automated advanced patching for
physical, virtual and clustered servers
 Role based software deployment
and user self-provisioning
 Bare-metal provisioning, OS imaging
and driver management
 PC and Mac power management
Manage the endpoint lifecycle
from a single pane of glass
Discovery
and Patching
Lifecycle
Management
Software
Compliance
and Usage
11© 2015 IBM Corporation
Software compliance and usage
Identify what software is installed and how it’s used
 Discover all licensed and unlicensed software
with in-depth granularity across operating systems
and devices
 Reduce license compliance exposure and associated fines
 Decrease software license costs by eliminating unused
or redundant software
 8,000+ software publishers, 40,000+ software products, 50+
cross OS virtualizations
 Mitigate risk from unauthorized and malicious software
$
Discovery
and Patching
Lifecycle
Management
Software
Compliance
and Usage
Saved $500K in unused software licenses while avoiding
$1M in non-compliance fines across 15,000+ endpoints
US Foods
SW Catalogue, ISO 19770 enabled
12© 2015 IBM Corporation
Disrupt the attack chain
Real-time situational awareness and incident response
IBM BigFix®
FIND IT. FIX IT. SECURE IT…FAST
Continuous
Monitoring
Discover vulnerabilities
and enforce
continuous compliance
BEFORE an attack
Threat
Protection
Detect and defend
against endpoint threats
in real time
DURING an attack
Incident
Response
Quarantine and remediate
non-compliant or
infected endpoints
AFTER an attack
ENDPOINT SECURITY
Actionable Intelligence
Real-time incident response
13© 2015 IBM Corporation
98% patch and update compliance rate on 4,000+ workstations
with 50% reduced labor costs
Infirmary Health System
Continuous security configuration compliance
Accurate, real-time visibility and continuous security configuration enforcement
Continuous compliance “set and forget”
• No high-risk periods
• Lower total cost
• Continued improvement
• Identify and report on any configuration drift
• Library of 9,000+ compliance checks
(e.g., CIS, PCI, USGCB, DISA STIG)
Traditional compliance “out of synch”
• High-risk and cost periods
• Manual approach causes endpoints
to fall out of compliance again
Continuous
Monitoring
Threat
Protection
Incident
Response
Traditional versus Continuous
Time
Compliance
ContinuousTraditional
RISK
14© 2015 IBM Corporation
Advanced endpoint protection
Stop exploits before application vendors provide updates
Third-party AV ProtectionProtection IBMTrusteer Apex
• Anti-virus protection and Data
Loss Prevention
• Deploy and enforce security
configuration policies
IBM BigFix®
• Third-party anti-virus
management
• Manage compliance,
quarantine and remediate
Continuous protection from advanced persistent threats
• Multi-layered protection
designed to break the
threat lifecycle in real-time
Continuous
Monitoring
Threat
Protection
Incident
Response
15© 2015 IBM Corporation
A look ahead
Integrated real-time endpoint intelligence for closed-loop risk management
IBM QRadarIBM BigFix
Real-time endpoint
intelligence
Network anomaly
detection
Provides current
endpoint status
Correlates events
and generates alerts
Prompts IT staff
to fix vulnerabilities
• Improves asset database accuracy
• Strengthens risk assessments
• Enhances compliance reporting
• Accelerates risk prioritization
of threats and vulnerabilities
• Increases reach of vulnerability
assessment to off-network endpoints
Integrated,
closed-loop
risk
management
Continuous
Monitoring
Threat
Protection
Incident
Response
16© 2015 IBM Corporation
Respond to threats with blazing speed
Incident response
Fix problems in minutes
 Respond to threats
and vulnerabilities with
remediation in minutes
 Automatic, continuous,
closed-loop remediation
of endpoints
 Implement policies across
the organization for on-
and off-network endpoints
Remediate
Evaluate
Report
Continuous
Monitoring
Threat
Protection
Incident
Response
17© 2015 IBM Corporation
PREPARE (less than 3 hours)
How a retail giant responded to the Shellshock / Bash bug
Resolving a critical issue on ~600 servers in under four hours with IBM BigFix
• Issue discovered and teams mobilized
• Teams created necessary patch scripts
within a fixlet and tested manually
• Fixlets were pushed to the BigFix
server for distribution
The security team used IBM BigFix to remediate ~600 servers
while they could previously only address 35 servers
Major US Retailer
Total Time
~ 4 Hours
PREPARE (less than 3 hours)
SCAN (less than 30 minutes)DEPLOY (less than 30 minutes)
• Endpoint management team executed
analysis of systems to determine which
systems were vulnerable
• Corrective actions were implemented
using IBM BigFix
SCAN (less than 30 minutes)
• Scanned and deployed to ~600 servers
in less than 30 minutes
• New systems reporting online were
automatically addressed within minutes
based upon their group membership
SCAN (less than 30 minutes)
18© 2015 IBM Corporation
IBM BigFix – Unified Management and Security
Lifecycle Inventory Patch Compliance Protection
 Patch Mgmt
 Asset Discovery
 SW Distribution
 Advance Patching
 Remote Control
 OS Deployment
 Power Mgmt
 Sequenced Task
Automation
 SW/HW Inventory
 SW Usage
Reporting
 Software Catalogue
Correlation
 SW Tagging
 OS Patching
 3rd party App
Patching
 Offline Patching
 Patch Mgmt
 Sec Config Mgmt
 Vuln Assessment
 Comp Analytics
 3rd Party AV Mgmt
 Self Quarantine
Add-on:
 PCI DSS
 Anti-Malware
 Firewall
Add-on:
 Data Loss
Prevention &
Device Control
IT OPERATIONS SECURITY
IBM BigFix®
FIND IT. FIX IT. SECURE IT… FAST
19© 2015 IBM Corporation
Gartner has recognized IBM as a leader
Magic Quadrant for Client Management Tools
Note: This Magic Quadrant graphic was published by Gartner, Inc. as part
of a larger research note and should be evaluated in the context of the entire report.
The Gartner report is available upon request from IBM. G00264801.
Disclaimer: Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest
ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed
or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Gartner Magic Quadrant Report
June 2015
LEADER - Four Years in a ROW!!
Analyst(s): Kevin Knox, Terrence Cosgrove
Link to Gartner MQ report
20© 2015 IBM Corporation
Client results
Lifecycle Inventory Patch Compliance Protection
27,000
Virtual servers
3,000
Distinct stores
99%
Deployment time saved
2
IT staff needed to manage
27,000 servers distributed
in over 3,000 locations
15,000
Endpoints needed software
compliance management
80%
Reduced patch
deployment time
$500,000
USD saved on unused
software licenses
$1 million
License noncompliance
fines avoided in USD
50,000
PCs, servers and ATMs
1,800
Branch locations
98.5%
Patch and update
compliance rate
1
Console needed to see,
change, enforce and report
on patch compliance status
4,000
Individual workstations
that needed to be protected
and compliant
Minutes
Time to complete an
accurate asset inventory
98%
Patch and update
compliance rate
50%
Reduced labor costs
Major US Retailer US Foods SunTrust Banks Infirmary Health System Alstom Holdings
98,000
Individual laptops that
needed to be protected
and compliant
60%
Decrease in the amount
of required IT staff
3 days
To deploy software,
down from 2 weeks
97%
Reduced number
of required servers
21© 2015 IBM Corporation
IBM BigFix ecosystem
IBM CONFIDENTIAL
IBM Integrations Business Partners End-users
• IBM QRadar
• IBM Trusteer Apex
• IBM MobileFirst Protect
• IBM Cloud Orchestrator
• IBM Control Desk
• IBM PureScale
• IBM TeaLeaf
• IBM Workload Scheduler
and more …..
BigFix Forums re-launched
IBM BigFix®
FIND IT. FIX IT. SECURE IT…FAST
22© 2015 IBM Corporation
Website: www.ibm.com/security/bigfix
Twitter: @IBMBigFix
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any
kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor
shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use
of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or
capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product
or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries
or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside
your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks
on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access.
IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other
systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE
IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
THANK YOUwww.ibm.com/security
24© 2015 IBM Corporation
What our clients are saying
“…we can now better defend against
internal and external threats. We can
see who is doing what… And with the new
intelligence, we’ve applied new settings
that significantly strengthen our
security posture and reduce the
number of potential security incidents.”
- Infirmary Health
“…we will be able to guarantee that
all of our endpoints are patched
appropriately, and we will be able to
provide solid proof that we have a fully
documented regular patch process
in place… moving us closer to full PCI
DSS compliance.”
- The Co-Operative Food
“IBM Endpoint Manager is easy to
use, which helps us keep operational
costs low and makes the integration
of services much easier.”
- Orange Business Services
“Now that we know what we’ve
deployed and where, we’re better
positioned to find any unpatched
holes in our systems and keep our
corporate data protected.” - Allstate
25© 2015 IBM Corporation
Product Name Changes
26© 2015 IBM Corporation
Integrated endpoint protection ecosystem
• Consolidated view of managed endpoints
• Detailed mobile device views
• Ability to drive simple actions
on mobile devices
‒ Lock, wipe, locate, etc.
• Consolidated asset reporting
1 von 26

Recomendados

Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar von
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarIBM Security
4K views25 Folien
BigFix White Paper von
BigFix White PaperBigFix White Paper
BigFix White PaperContent Rules, Inc.
1.4K views6 Folien
IBM Endpoint Manager for Software Use Analysis (Overview) von
IBM Endpoint Manager for Software Use Analysis (Overview)IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)Kimber Spradlin
5.8K views28 Folien
Post Wannacry Update von
Post Wannacry UpdatePost Wannacry Update
Post Wannacry UpdateThomas Springer
170 views12 Folien
IBM Endpoint Manager for Lifecycle Management (Overview) von
IBM Endpoint Manager for Lifecycle Management (Overview)IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)Kimber Spradlin
6.5K views23 Folien
Gartner technologies for Infosec 2014-2015 von
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
4.8K views105 Folien

Más contenido relacionado

Was ist angesagt?

3 Enablers of Successful Cyber Attacks and How to Thwart Them von
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart ThemIBM Security
1.4K views18 Folien
IBM Endpoint Manger for Power Management (Overview) von
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)Kimber Spradlin
4.2K views26 Folien
IBM Endpoint Manager for Mobile Devices (Overview) von
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)Kimber Spradlin
7.9K views41 Folien
IBM Security Immune System von
IBM Security Immune SystemIBM Security Immune System
IBM Security Immune SystemJuan Pablo Coelho
1.7K views40 Folien
IBM QRadar Security Intelligence Overview von
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
2.8K views29 Folien
IBM Security QFlow & Vflow von
IBM Security QFlow & VflowIBM Security QFlow & Vflow
IBM Security QFlow & VflowCamilo Fandiño Gómez
1.8K views6 Folien

Was ist angesagt?(20)

3 Enablers of Successful Cyber Attacks and How to Thwart Them von IBM Security
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
IBM Security1.4K views
IBM Endpoint Manger for Power Management (Overview) von Kimber Spradlin
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)
Kimber Spradlin4.2K views
IBM Endpoint Manager for Mobile Devices (Overview) von Kimber Spradlin
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
Kimber Spradlin7.9K views
The New Assure Security: Complete IBM i Compliance and Security von Precisely
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
Precisely333 views
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera... von Andris Soroka
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
Andris Soroka2.7K views
SIEM enabled risk management , SOC and GRC v1.0 von Rasmi Swain
SIEM enabled risk management , SOC and GRC v1.0SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0
Rasmi Swain1.7K views
Mobile Devices & BYOD Security – Deployment & Best Practices von Cisco Canada
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
Cisco Canada9.1K views
Owasp Proactive Controls for Web developer von Sameer Paradia
Owasp  Proactive Controls for Web developerOwasp  Proactive Controls for Web developer
Owasp Proactive Controls for Web developer
Sameer Paradia 937 views
MOP Technical Presentation.Ppt von tswong
MOP Technical Presentation.PptMOP Technical Presentation.Ppt
MOP Technical Presentation.Ppt
tswong1.2K views

Similar a IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security

Mitigate attacks with IBM BigFix and Q-Radar von
Mitigate attacks with IBM BigFix and Q-RadarMitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-RadarFrancisco González Jiménez
1.9K views25 Folien
Cyber threats von
Cyber threatsCyber threats
Cyber threatsSonia Baratas Alves
262 views25 Folien
What’s the State of Your Endpoint Security? von
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?IBM Security
2.4K views21 Folien
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdf von
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdfHCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdf
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdfDNUG e.V.
24 views21 Folien
HCL BigFix - DNUG Stammtisch Salzburg von
HCL BigFix - DNUG Stammtisch SalzburgHCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgDNUG e.V.
46 views22 Folien
Cutting Through the Software License Jungle: Stay Safe and Control Costs von
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsIBM Security
1.1K views21 Folien

Similar a IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security(20)

What’s the State of Your Endpoint Security? von IBM Security
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?
IBM Security2.4K views
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdf von DNUG e.V.
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdfHCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdf
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdf
DNUG e.V.24 views
HCL BigFix - DNUG Stammtisch Salzburg von DNUG e.V.
HCL BigFix - DNUG Stammtisch SalzburgHCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch Salzburg
DNUG e.V.46 views
Cutting Through the Software License Jungle: Stay Safe and Control Costs von IBM Security
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control Costs
IBM Security1.1K views
A New Remedy for the Cyber Storm Approaching von SPI Conference
A New Remedy for the Cyber Storm ApproachingA New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm Approaching
SPI Conference291 views
Protecting Mission-Critical Source Code from Application Security Vulnerabili... von IBM Security
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
IBM Security1.8K views
IBM Security Strategy Overview von xband
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
xband1.6K views
DACHNUG50 BigFix WorkspaceAndAutomation.pdf von DNUG e.V.
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
DNUG e.V.4 views
Security Operations and Response von xband
Security Operations and ResponseSecurity Operations and Response
Security Operations and Response
xband1K views
Why Network and Endpoint Security Isn’t Enough von Imperva
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
Imperva2.1K views
5 Steps to Reduce Your Window of Vulnerability von Skybox Security
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
Skybox Security860 views
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg von dawnrk
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
dawnrk238 views
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg von dawnrk
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
dawnrk211 views
Maintaining Continuous Compliance with HCL BigFix von HCLSoftware
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFix
HCLSoftware7 views
How to Solve Your Top IT Security Reporting Challenges with AlienVault von AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVault
AlienVault1.6K views
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance... von IBM Security
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
IBM Security2.4K views

Más de IBM Security

Automation: Embracing the Future of SecOps von
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
2K views22 Folien
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on... von
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
914 views39 Folien
Bridging the Gap between Privacy and Security: Using Technology to Manage Com... von
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
941 views24 Folien
Integrated Response with v32 of IBM Resilient von
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
1K views21 Folien
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P... von
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
775 views12 Folien
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated... von
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
742 views18 Folien

Más de IBM Security(20)

Automation: Embracing the Future of SecOps von IBM Security
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
IBM Security2K views
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on... von IBM Security
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
IBM Security914 views
Bridging the Gap between Privacy and Security: Using Technology to Manage Com... von IBM Security
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
IBM Security941 views
Integrated Response with v32 of IBM Resilient von IBM Security
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
IBM Security1K views
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P... von IBM Security
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
IBM Security775 views
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated... von IBM Security
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
IBM Security742 views
Accelerating SOC Transformation with IBM Resilient and Carbon Black von IBM Security
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
IBM Security966 views
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration von IBM Security
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
IBM Security1.3K views
Are You Ready to Move Your IAM to the Cloud? von IBM Security
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
IBM Security2K views
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence von IBM Security
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
IBM Security3.2K views
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec... von IBM Security
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
IBM Security1.1K views
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ... von IBM Security
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
IBM Security4.2K views
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ... von IBM Security
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
IBM Security3.6K views
WannaCry Ransomware Attack: What to Do Now von IBM Security
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
IBM Security6.9K views
How to Improve Threat Detection & Simplify Security Operations von IBM Security
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
IBM Security1.9K views
Retail Mobility, Productivity and Security von IBM Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
IBM Security1.4K views
Close the Loop on Incident Response von IBM Security
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
IBM Security2.6K views
Orchestrate Your Security Defenses; Protect Against Insider Threats von IBM Security
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
IBM Security1.2K views

Último

DALI Basics Course 2023 von
DALI Basics Course  2023DALI Basics Course  2023
DALI Basics Course 2023Ivory Egg
14 views12 Folien
ChatGPT and AI for Web Developers von
ChatGPT and AI for Web DevelopersChatGPT and AI for Web Developers
ChatGPT and AI for Web DevelopersMaximiliano Firtman
181 views82 Folien
Combining Orchestration and Choreography for a Clean Architecture von
Combining Orchestration and Choreography for a Clean ArchitectureCombining Orchestration and Choreography for a Clean Architecture
Combining Orchestration and Choreography for a Clean ArchitectureThomasHeinrichs1
69 views24 Folien
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen... von
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...NUS-ISS
28 views70 Folien
SAP Automation Using Bar Code and FIORI.pdf von
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdfVirendra Rai, PMP
19 views38 Folien
Transcript: The Details of Description Techniques tips and tangents on altern... von
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...BookNet Canada
130 views15 Folien

Último(20)

DALI Basics Course 2023 von Ivory Egg
DALI Basics Course  2023DALI Basics Course  2023
DALI Basics Course 2023
Ivory Egg14 views
Combining Orchestration and Choreography for a Clean Architecture von ThomasHeinrichs1
Combining Orchestration and Choreography for a Clean ArchitectureCombining Orchestration and Choreography for a Clean Architecture
Combining Orchestration and Choreography for a Clean Architecture
ThomasHeinrichs169 views
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen... von NUS-ISS
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
NUS-ISS28 views
Transcript: The Details of Description Techniques tips and tangents on altern... von BookNet Canada
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...
BookNet Canada130 views
.conf Go 2023 - Data analysis as a routine von Splunk
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
Splunk93 views
Business Analyst Series 2023 - Week 3 Session 5 von DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10209 views
Future of Learning - Yap Aye Wee.pdf von NUS-ISS
Future of Learning - Yap Aye Wee.pdfFuture of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdf
NUS-ISS41 views
Black and White Modern Science Presentation.pptx von maryamkhalid2916
Black and White Modern Science Presentation.pptxBlack and White Modern Science Presentation.pptx
Black and White Modern Science Presentation.pptx
maryamkhalid291614 views
Future of Learning - Khoong Chan Meng von NUS-ISS
Future of Learning - Khoong Chan MengFuture of Learning - Khoong Chan Meng
Future of Learning - Khoong Chan Meng
NUS-ISS33 views
handbook for web 3 adoption.pdf von Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex19 views
RADIUS-Omnichannel Interaction System von RADIUS
RADIUS-Omnichannel Interaction SystemRADIUS-Omnichannel Interaction System
RADIUS-Omnichannel Interaction System
RADIUS15 views
The Importance of Cybersecurity for Digital Transformation von NUS-ISS
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
NUS-ISS27 views

IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security

  • 1. © 2015 IBM Corporation Bridging the Endpoint Gap Between IT Ops and Security Murtuza Choilawala | Product Management & Strategy, IBM Security Rohan Ramesh | Product Marketing, IBM Security IBM BigFix
  • 2. 2© 2015 IBM Corporation IBM Security Strategy Buyers CISO, CIO, and Line-of-Business Deliver a broad portfolio of solutions differentiated through their integration and innovation to address the latest trends Key Security Trends IBM Security Portfolio Strategy, Risk and Compliance Cybersecurity Assessment and Response Security Intelligence and Operations Advanced Fraud Protection Identity and Access Management Data Security Application Security Network, Mobile and Endpoint Protection Advanced Threat and Security Research Support the CISO agenda1 Innovate around megatrends2 Lead in selected segments3 Advanced Threats Skills Shortage Cloud Mobile and Internet of Things Compliance Mandates
  • 3. 3© 2015 IBM Corporation You can’t fix what you can’t see Incident response is the No. 1 factor to reduce the cost of a data breach Despite existing tools, breaches continue to rise Lack of visibility and control contributes to security breaches and financial loss *Source: 2015 Cost of a Data Breach Study: Global Analysis, Ponemon Institute, May 2015 “Major global bank compromised and millions of depositor records stolen due to missed server upgrade cycle” ? global average cost of a data breach* $3.8M 
  • 4. 4© 2015 IBM Corporation Siloed IT Operations and Security Teams IT OPERATIONS • Apply patches and fixes • Implement security and operational policy • Manual process takes weeks / months IT SECURITY • Scan for compliance status • Create security policies • Identify vulnerabilities Disparate tools, manual processes, lack of integration and narrow visibility
  • 5. 5© 2015 IBM Corporation Architecture Complexity Resources  Heavy, resource-intensive agent(s)  Multiple products, multiple agents  Not Internet-friendly Why other approaches fail  Too much admin and infrastructure  Little pre-built content  Each task detracts from higher value projects  Slow, scan-based architectures  Limited coverage  Not cost-effective at scale
  • 6. 6© 2015 IBM Corporation IBM BigFix: Bridge the gap between Security and IT Ops ENDPOINT SECURITY Discovery and Patching Lifecycle Management Software Compliance and Usage Continuous Monitoring Threat Protection Incident Response ENDPOINT MANAGEMENT IBM BigFix® FIND IT. FIX IT. SECURE IT. …FAST Shared visibility and control between IT Operations and Security IT OPERATIONS SECURITY Reduce operational costs while improving your security posture
  • 7. 7© 2015 IBM Corporation Single Intelligent Agent • Performs multiple functions • Continuous self-assessment & policy enforcement • Minimal system impact (< 2% CPU) IBM BigFix Single intelligent agent Lightweight, robust infrastructure • Use existing systems as relays • Built-in redundancy •Support/secure roaming endpoints Cloud-based content delivery • Highly extensible • Automatic, on-demand functionality Single server and console •Highly secure and scalable •Aggregates data, analyzes & reports •Pushes out pre-defined/custom policies Real-Time Visibility Scalability Ease of Use BigFix Platform Flexible policy language (Fixlets) • Thousands of out-of-the-box policies • Best practices for operations and security • Simple custom policy authoring • Highly extensible/applicable across all platforms
  • 8. 8© 2015 IBM Corporation Endpoint management Find and fix problems in minutes, across endpoints on and off the network IBM BigFix® FIND IT. FIX IT. SECURE IT…FAST Discovery and Patching A single console to identify, patch and report on endpoints Lifecycle Management Asset discovery, software distribution and advanced patching across 90+ platforms Software Compliance and Usage Software license control to improve compliance and reduce costs and risk ENDPOINT MANAGEMENT Reduce admin and infrastructure costs
  • 9. 9© 2015 IBM Corporation Discovery and Patching Lifecycle Management Software Compliance and Usage Discovery and patching A single-console management system to identify, patch, and report on multiple devices and attributes  Discover and report on every endpoint – Desktops – Laptops – Servers – Purpose-specific endpoints e.g., ATMs and point-of-sale (POS) devices  Gain accurate, up-to-the minute visibility and continuous enforcement of patches  Manage patches to hundreds of thousands of endpoints, multiple operating systems and applications – automatically  Clients report >98% first pass patch success Protecting 50,000 PCs, servers and ATMs in 1,800 locations with one console SunTrust Banks
  • 10. 10© 2015 IBM Corporation Managing 27,000 servers across 3,000+ locations with two IT staff Major US Retailer Lifecycle management Reduce cost, risk, and complexity of managing endpoints  Streamline asset discovery and software distribution  Prebuilt automation scripts  Automated advanced patching for physical, virtual and clustered servers  Role based software deployment and user self-provisioning  Bare-metal provisioning, OS imaging and driver management  PC and Mac power management Manage the endpoint lifecycle from a single pane of glass Discovery and Patching Lifecycle Management Software Compliance and Usage
  • 11. 11© 2015 IBM Corporation Software compliance and usage Identify what software is installed and how it’s used  Discover all licensed and unlicensed software with in-depth granularity across operating systems and devices  Reduce license compliance exposure and associated fines  Decrease software license costs by eliminating unused or redundant software  8,000+ software publishers, 40,000+ software products, 50+ cross OS virtualizations  Mitigate risk from unauthorized and malicious software $ Discovery and Patching Lifecycle Management Software Compliance and Usage Saved $500K in unused software licenses while avoiding $1M in non-compliance fines across 15,000+ endpoints US Foods SW Catalogue, ISO 19770 enabled
  • 12. 12© 2015 IBM Corporation Disrupt the attack chain Real-time situational awareness and incident response IBM BigFix® FIND IT. FIX IT. SECURE IT…FAST Continuous Monitoring Discover vulnerabilities and enforce continuous compliance BEFORE an attack Threat Protection Detect and defend against endpoint threats in real time DURING an attack Incident Response Quarantine and remediate non-compliant or infected endpoints AFTER an attack ENDPOINT SECURITY Actionable Intelligence Real-time incident response
  • 13. 13© 2015 IBM Corporation 98% patch and update compliance rate on 4,000+ workstations with 50% reduced labor costs Infirmary Health System Continuous security configuration compliance Accurate, real-time visibility and continuous security configuration enforcement Continuous compliance “set and forget” • No high-risk periods • Lower total cost • Continued improvement • Identify and report on any configuration drift • Library of 9,000+ compliance checks (e.g., CIS, PCI, USGCB, DISA STIG) Traditional compliance “out of synch” • High-risk and cost periods • Manual approach causes endpoints to fall out of compliance again Continuous Monitoring Threat Protection Incident Response Traditional versus Continuous Time Compliance ContinuousTraditional RISK
  • 14. 14© 2015 IBM Corporation Advanced endpoint protection Stop exploits before application vendors provide updates Third-party AV ProtectionProtection IBMTrusteer Apex • Anti-virus protection and Data Loss Prevention • Deploy and enforce security configuration policies IBM BigFix® • Third-party anti-virus management • Manage compliance, quarantine and remediate Continuous protection from advanced persistent threats • Multi-layered protection designed to break the threat lifecycle in real-time Continuous Monitoring Threat Protection Incident Response
  • 15. 15© 2015 IBM Corporation A look ahead Integrated real-time endpoint intelligence for closed-loop risk management IBM QRadarIBM BigFix Real-time endpoint intelligence Network anomaly detection Provides current endpoint status Correlates events and generates alerts Prompts IT staff to fix vulnerabilities • Improves asset database accuracy • Strengthens risk assessments • Enhances compliance reporting • Accelerates risk prioritization of threats and vulnerabilities • Increases reach of vulnerability assessment to off-network endpoints Integrated, closed-loop risk management Continuous Monitoring Threat Protection Incident Response
  • 16. 16© 2015 IBM Corporation Respond to threats with blazing speed Incident response Fix problems in minutes  Respond to threats and vulnerabilities with remediation in minutes  Automatic, continuous, closed-loop remediation of endpoints  Implement policies across the organization for on- and off-network endpoints Remediate Evaluate Report Continuous Monitoring Threat Protection Incident Response
  • 17. 17© 2015 IBM Corporation PREPARE (less than 3 hours) How a retail giant responded to the Shellshock / Bash bug Resolving a critical issue on ~600 servers in under four hours with IBM BigFix • Issue discovered and teams mobilized • Teams created necessary patch scripts within a fixlet and tested manually • Fixlets were pushed to the BigFix server for distribution The security team used IBM BigFix to remediate ~600 servers while they could previously only address 35 servers Major US Retailer Total Time ~ 4 Hours PREPARE (less than 3 hours) SCAN (less than 30 minutes)DEPLOY (less than 30 minutes) • Endpoint management team executed analysis of systems to determine which systems were vulnerable • Corrective actions were implemented using IBM BigFix SCAN (less than 30 minutes) • Scanned and deployed to ~600 servers in less than 30 minutes • New systems reporting online were automatically addressed within minutes based upon their group membership SCAN (less than 30 minutes)
  • 18. 18© 2015 IBM Corporation IBM BigFix – Unified Management and Security Lifecycle Inventory Patch Compliance Protection  Patch Mgmt  Asset Discovery  SW Distribution  Advance Patching  Remote Control  OS Deployment  Power Mgmt  Sequenced Task Automation  SW/HW Inventory  SW Usage Reporting  Software Catalogue Correlation  SW Tagging  OS Patching  3rd party App Patching  Offline Patching  Patch Mgmt  Sec Config Mgmt  Vuln Assessment  Comp Analytics  3rd Party AV Mgmt  Self Quarantine Add-on:  PCI DSS  Anti-Malware  Firewall Add-on:  Data Loss Prevention & Device Control IT OPERATIONS SECURITY IBM BigFix® FIND IT. FIX IT. SECURE IT… FAST
  • 19. 19© 2015 IBM Corporation Gartner has recognized IBM as a leader Magic Quadrant for Client Management Tools Note: This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from IBM. G00264801. Disclaimer: Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. Gartner Magic Quadrant Report June 2015 LEADER - Four Years in a ROW!! Analyst(s): Kevin Knox, Terrence Cosgrove Link to Gartner MQ report
  • 20. 20© 2015 IBM Corporation Client results Lifecycle Inventory Patch Compliance Protection 27,000 Virtual servers 3,000 Distinct stores 99% Deployment time saved 2 IT staff needed to manage 27,000 servers distributed in over 3,000 locations 15,000 Endpoints needed software compliance management 80% Reduced patch deployment time $500,000 USD saved on unused software licenses $1 million License noncompliance fines avoided in USD 50,000 PCs, servers and ATMs 1,800 Branch locations 98.5% Patch and update compliance rate 1 Console needed to see, change, enforce and report on patch compliance status 4,000 Individual workstations that needed to be protected and compliant Minutes Time to complete an accurate asset inventory 98% Patch and update compliance rate 50% Reduced labor costs Major US Retailer US Foods SunTrust Banks Infirmary Health System Alstom Holdings 98,000 Individual laptops that needed to be protected and compliant 60% Decrease in the amount of required IT staff 3 days To deploy software, down from 2 weeks 97% Reduced number of required servers
  • 21. 21© 2015 IBM Corporation IBM BigFix ecosystem IBM CONFIDENTIAL IBM Integrations Business Partners End-users • IBM QRadar • IBM Trusteer Apex • IBM MobileFirst Protect • IBM Cloud Orchestrator • IBM Control Desk • IBM PureScale • IBM TeaLeaf • IBM Workload Scheduler and more ….. BigFix Forums re-launched IBM BigFix® FIND IT. FIX IT. SECURE IT…FAST
  • 22. 22© 2015 IBM Corporation Website: www.ibm.com/security/bigfix Twitter: @IBMBigFix
  • 23. © Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. THANK YOUwww.ibm.com/security
  • 24. 24© 2015 IBM Corporation What our clients are saying “…we can now better defend against internal and external threats. We can see who is doing what… And with the new intelligence, we’ve applied new settings that significantly strengthen our security posture and reduce the number of potential security incidents.” - Infirmary Health “…we will be able to guarantee that all of our endpoints are patched appropriately, and we will be able to provide solid proof that we have a fully documented regular patch process in place… moving us closer to full PCI DSS compliance.” - The Co-Operative Food “IBM Endpoint Manager is easy to use, which helps us keep operational costs low and makes the integration of services much easier.” - Orange Business Services “Now that we know what we’ve deployed and where, we’re better positioned to find any unpatched holes in our systems and keep our corporate data protected.” - Allstate
  • 25. 25© 2015 IBM Corporation Product Name Changes
  • 26. 26© 2015 IBM Corporation Integrated endpoint protection ecosystem • Consolidated view of managed endpoints • Detailed mobile device views • Ability to drive simple actions on mobile devices ‒ Lock, wipe, locate, etc. • Consolidated asset reporting