SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
IBM Software                                                                                                   January 2011
White Paper Executive Summary




                                               Secure by Design:
                                               Ongoing validation
                                               The goals and motivations that drive companies to proficiency in IT
                                               security are different than for other IT initiatives, and so are the costs.
            Contents
                                               While building systems that are slower than competitive solutions
              2 Integrating the Secure by      might lose a few clients, failing to protect data and information will
                Design components              alienate many more.
              2 Understanding threats
                                               Some companies add security on an ad-hoc basis. However, piecemeal
                and vulnerabilities on an
                ongoing basis                  security is costly, inefficient, and typically fosters a reactive rather than
                                               proactive security posture. By not incorporating security into the foun-
              3 Ensuring the security of the   dational controls of the business, companies are forced to constantly
                infrastructure                 add security controls to try to keep up with organizational, technology,
              3 Extending the Secure           and Internet landscape changes. Constantly implementing entirely new
                by Design vision to the        controls to safeguard information and assets as new technologies and
                enterprise                     new compliance regulations emerge puts businesses at risk, from both
                                               security and financial perspectives. Organizations must start thinking
                                               differently about the relationship between security and the rest of the
                                               IT infrastructure.

                                               Built on the philosophy of Secure by Design, IBM Security Solutions
                                               are focused on the following three primary components of creating and
                                               maintaining a secure infrastructure:

                                               ●   Knowledge of threats and vulnerabilities
                                               ●   Structural elements
                                               ●   Ongoing validation
IBM Software                                                                                                              January 2011
White Paper Executive Summary




The third in a three-part series, this executive summary               approach to Internet security. One of the best-known com-
white paper will focus on the ongoing validation of the secure         mercial security research groups in the world, the team helps
infrastructure.                                                        educate and protect companies on an ongoing basis from
                                                                       today’s malicious threats, so organizations can eliminate any
Integrating the Secure by Design                                       potential vulnerabilities. The X-Force team:
components
Ongoing validation of IT security—the third Secure by
                                                                       ●   Researches and tracks the evolution of threats through the
Design component—is a fundamental aspect of security best                  IBM Global Operations Center
practices. The first two elements of Secure by Design focus
                                                                       ●   Advises customers and the general public on how to
on understanding the threats and vulnerabilities present in                respond to emerging and critical threats
the world today and the structural elements that comprise a
                                                                       ●   Develops assessment and countermeasure technology
secure infrastructure. The concept of ongoing validation is                for IBM products, providing customers with information
effectively incorporating those elements into the security pos-            about how IBM products and services can protect against
ture on an ongoing basis. Security needs to be approached as               the threat
process, not as a collection of products.
                                                                       ●   Delivers the latest information on Internet threats and vul-
                                                                           nerabilities through notifications, such as Protection
To be really successful at building an infrastructure capable of           Advisories and Alerts
responding to the evolving threat landscape requires a proac-
                                                                       ●   Produces reports, such as the Trend and Risk Report and
tive approach to security. Companies not only need to design               the Threat Insight Report, throughout the year
their infrastructure with security in mind, they also need to
                                                                       ●   Maintains the world’s most comprehensive threats and vul-
be constantly evaluating their overall security posture. To do             nerabilities database, the IBM X-Force database—the result
otherwise is to embrace a flawed approach of purely reac-                   of thousands of hours of research by the team, with much
tionary security. For these reactive companies, attempting                 of its data used to power the proactive protection delivered
to provide ongoing validation is not unlike changing the tires             by IBM products
on a car that is already moving. As such, in order to run
smoothly, and maintain business continuity day after day,              IBM doesn’t just help increase awareness of the threats and
companies need to proactively secure their infrastructure.             vulnerabilities that exist today. IBM helps companies better
                                                                       understand the context of the threat, such as specifically how
                                                                       it might be affecting midsize retailers across Europe. In this
Understanding threats and vulnerabilities
                                                                       way, companies can make decisions based on a deeper under-
on an ongoing basis                                                    standing of the challenges they face. IBM helps clients not
The threat landscape continually evolves and changes, and for
                                                                       only understand the world that exists outside their four walls,
companies to remain competitive, they must stay ahead of
                                                                       but also delivers meaningful intelligence about how their
potential threats. The IBM X-Force® research and develop-
                                                                       business fits into that outside world.
ment team can provide the foundation for a preemptive




                                                                   2
IBM Software                                                                                                           January 2011
White Paper Executive Summary




Ensuring the security of the infrastructure                           practices and solutions empower companies to often be in
To sustain a solid security posture, even companies that              compliance before new compliance regulations arise. By tak-
design the infrastructure with adequate security controls will        ing advantage of IBM’s Secure by Design philosophy, a com-
need to continue to invest in information security. Companies         pany’s IT decisions and purchases are not dictated by external
can, however, take a smart, cost-effective approach to contin-        events, but rather by a drive to enhance business operations
ually building a more secure infrastructure.                          and profitability.

Various events and developments can spur the need for new             Extending the Secure by Design vision to
security controls, such as new technologies, the changing             the enterprise
threat landscape, new compliance regulations, and even a suc-         With a broad and deep awareness of today’s information
cessful attack. Some companies implement new controls with            security landscape and challenges, IBM equips companies
each new development that can impact the security of the              with the security they need today, while providing the tools
infrastructure. Yet companies are at a disadvantage when the          and methodologies to validate the security infrastructure on
terms of their security are always being dictated to them, pro-       an ongoing basis. From the security intelligence provided day
moting a reactive security posture.                                   after day by the IBM X-Force team, to the comprehensive
                                                                      portfolio of IBM Security Solutions, the Secure by Design
Compliance is a good example of how companies often                   philosophy permeates everything that IBM delivers to its cus-
approach security after the fact. Many companies wait                 tomers, providing customers ongoing security benefits.
until new regulations emerge, and then focus resources on             Forrester Research sums up best how the IBM Secure by
establishing a methodology and identifying the security tools         Design vision is establishing IBM as leader in information
that can bring the organization into compliance. However,             security:
compliance is a response to the threats of yesterday.
Changing security controls with every new compliance regu-
lation means that companies are looking backward rather               “Security organizations that require global
than forward. This approach to compliance also requires that          reach, a broad suite of security services,
companies dedicate unnecessary costs to their security
processes.
                                                                      and good threat intelligence from a single
                                                                      vendor should look to IBM to deliver these
IBM is dedicated to helping organizations create a proactive          services.”1
security posture that better secures the enterprise and more
effectively meets compliance demands. Secure by Design




                                                                  3
For more information
To learn more about Secure by Design: Ongoing validation,
please contact your IBM marketing representative or
IBM Business Partner, or visit the following website:
ibm.com/security
                                                                  © Copyright IBM Corporation 2011

Additionally, financing solutions from IBM Global Financing        IBM Corporation
can enable effective cash management, protection from tech-       Software Group
                                                                  Route 100
nology obsolescence, improved total cost of ownership and         Somers, NY 10589 U.S.A.
return on investment. Also, our Global Asset Recovery
                                                                  Produced in the United States of America
Services help address environmental concerns with new,            January 2011
more energy-efficient solutions. For more information on          All Rights Reserved
IBM Global Financing, visit: ibm.com/financing                     IBM, the IBM logo, ibm.com and X-Force are trademarks or
                                                                  registered trademarks of International Business Machines Corporation
                                                                  in the United States, other countries, or both. If these and other
                                                                  IBM trademarked terms are marked on their first occurrence in this
                                                                  information with a trademark symbol (® or ™), these symbols indicate
                                                                  U.S. registered or common law trademarks owned by IBM at the time
                                                                  this information was published. Such trademarks may also be registered
                                                                  or common law trademarks in other countries. A current list of
                                                                  IBM trademarks is available on the web at “Copyright and trademark
                                                                  information” at ibm.com/legal/copytrade.shtml

                                                                  Other company, product or service names may be trademarks or service
                                                                  marks of others.

                                                                  The customer is responsible for ensuring compliance with legal
                                                                  requirements. It is the customer’s sole responsibility to obtain advice of
                                                                  competent legal counsel as to the identification and interpretation of any
                                                                  relevant laws and regulatory requirements that may affect the customer’s
                                                                  business and any actions the customer may need to take to comply with
                                                                  such laws. IBM does not provide legal advice or represent or warrant
                                                                  that its services or products will ensure that the customer is in
                                                                  compliance with any law or regulation.
                                                              1
                                                                  Source: The Forrester Wave™: Managed Security Services, by Khalid Kark,
                                                                  Security & Risk Professionals, August 4, 2010.


                                                                           Please Recycle




                                                                                                                    WGE03009-USEN-00

Weitere ähnliche Inhalte

Andere mochten auch

Ibm xiv storage your ideal cloud building block
Ibm xiv storage   your ideal cloud building blockIbm xiv storage   your ideal cloud building block
Ibm xiv storage your ideal cloud building blockArun Gopinath
 
Centralizing security on the mainframe
Centralizing security on the mainframeCentralizing security on the mainframe
Centralizing security on the mainframeArun Gopinath
 
Health Tips by VisitHazara.Com
Health Tips by VisitHazara.ComHealth Tips by VisitHazara.Com
Health Tips by VisitHazara.ComMuneer Qureshi
 
Listening
ListeningListening
Listeningphilywu
 
唯一一隻登上時代雜誌封面的狗狗
唯一一隻登上時代雜誌封面的狗狗唯一一隻登上時代雜誌封面的狗狗
唯一一隻登上時代雜誌封面的狗狗Fa Zhou Shi
 
Полмиллиона юзеров в онлайне без падений: оптимизация высоконагруженного se...
Полмиллиона юзеров в онлайне без падений: оптимизация высоконагруженного se...Полмиллиона юзеров в онлайне без падений: оптимизация высоконагруженного se...
Полмиллиона юзеров в онлайне без падений: оптимизация высоконагруженного se...Sergey Xek
 
Tutorial Install SQL SERVER 2008
Tutorial Install SQL SERVER 2008Tutorial Install SQL SERVER 2008
Tutorial Install SQL SERVER 2008Robby Firmansyah
 
Abubakari Fostering youth employment in the agrifood sector
Abubakari Fostering youth employment in the agrifood sectorAbubakari Fostering youth employment in the agrifood sector
Abubakari Fostering youth employment in the agrifood sectorfutureagricultures
 
Den absolut bedste satire fra 2013. Helt sikkert. Jeg lover!
Den absolut bedste satire fra 2013. Helt sikkert. Jeg lover!Den absolut bedste satire fra 2013. Helt sikkert. Jeg lover!
Den absolut bedste satire fra 2013. Helt sikkert. Jeg lover!Carmichael Billingsley
 
5 books for your business understanBooks
5 books for your business understanBooks5 books for your business understanBooks
5 books for your business understanBooksHaridas Patel
 

Andere mochten auch (11)

Ibm xiv storage your ideal cloud building block
Ibm xiv storage   your ideal cloud building blockIbm xiv storage   your ideal cloud building block
Ibm xiv storage your ideal cloud building block
 
Centralizing security on the mainframe
Centralizing security on the mainframeCentralizing security on the mainframe
Centralizing security on the mainframe
 
Health Tips by VisitHazara.Com
Health Tips by VisitHazara.ComHealth Tips by VisitHazara.Com
Health Tips by VisitHazara.Com
 
Listening
ListeningListening
Listening
 
唯一一隻登上時代雜誌封面的狗狗
唯一一隻登上時代雜誌封面的狗狗唯一一隻登上時代雜誌封面的狗狗
唯一一隻登上時代雜誌封面的狗狗
 
Полмиллиона юзеров в онлайне без падений: оптимизация высоконагруженного se...
Полмиллиона юзеров в онлайне без падений: оптимизация высоконагруженного se...Полмиллиона юзеров в онлайне без падений: оптимизация высоконагруженного se...
Полмиллиона юзеров в онлайне без падений: оптимизация высоконагруженного se...
 
Tutorial Install SQL SERVER 2008
Tutorial Install SQL SERVER 2008Tutorial Install SQL SERVER 2008
Tutorial Install SQL SERVER 2008
 
Abubakari Fostering youth employment in the agrifood sector
Abubakari Fostering youth employment in the agrifood sectorAbubakari Fostering youth employment in the agrifood sector
Abubakari Fostering youth employment in the agrifood sector
 
Den absolut bedste satire fra 2013. Helt sikkert. Jeg lover!
Den absolut bedste satire fra 2013. Helt sikkert. Jeg lover!Den absolut bedste satire fra 2013. Helt sikkert. Jeg lover!
Den absolut bedste satire fra 2013. Helt sikkert. Jeg lover!
 
Notam 24-04-2015
Notam 24-04-2015Notam 24-04-2015
Notam 24-04-2015
 
5 books for your business understanBooks
5 books for your business understanBooks5 books for your business understanBooks
5 books for your business understanBooks
 

Kürzlich hochgeladen

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Secure by design ongoing validation

  • 1. IBM Software January 2011 White Paper Executive Summary Secure by Design: Ongoing validation The goals and motivations that drive companies to proficiency in IT security are different than for other IT initiatives, and so are the costs. Contents While building systems that are slower than competitive solutions 2 Integrating the Secure by might lose a few clients, failing to protect data and information will Design components alienate many more. 2 Understanding threats Some companies add security on an ad-hoc basis. However, piecemeal and vulnerabilities on an ongoing basis security is costly, inefficient, and typically fosters a reactive rather than proactive security posture. By not incorporating security into the foun- 3 Ensuring the security of the dational controls of the business, companies are forced to constantly infrastructure add security controls to try to keep up with organizational, technology, 3 Extending the Secure and Internet landscape changes. Constantly implementing entirely new by Design vision to the controls to safeguard information and assets as new technologies and enterprise new compliance regulations emerge puts businesses at risk, from both security and financial perspectives. Organizations must start thinking differently about the relationship between security and the rest of the IT infrastructure. Built on the philosophy of Secure by Design, IBM Security Solutions are focused on the following three primary components of creating and maintaining a secure infrastructure: ● Knowledge of threats and vulnerabilities ● Structural elements ● Ongoing validation
  • 2. IBM Software January 2011 White Paper Executive Summary The third in a three-part series, this executive summary approach to Internet security. One of the best-known com- white paper will focus on the ongoing validation of the secure mercial security research groups in the world, the team helps infrastructure. educate and protect companies on an ongoing basis from today’s malicious threats, so organizations can eliminate any Integrating the Secure by Design potential vulnerabilities. The X-Force team: components Ongoing validation of IT security—the third Secure by ● Researches and tracks the evolution of threats through the Design component—is a fundamental aspect of security best IBM Global Operations Center practices. The first two elements of Secure by Design focus ● Advises customers and the general public on how to on understanding the threats and vulnerabilities present in respond to emerging and critical threats the world today and the structural elements that comprise a ● Develops assessment and countermeasure technology secure infrastructure. The concept of ongoing validation is for IBM products, providing customers with information effectively incorporating those elements into the security pos- about how IBM products and services can protect against ture on an ongoing basis. Security needs to be approached as the threat process, not as a collection of products. ● Delivers the latest information on Internet threats and vul- nerabilities through notifications, such as Protection To be really successful at building an infrastructure capable of Advisories and Alerts responding to the evolving threat landscape requires a proac- ● Produces reports, such as the Trend and Risk Report and tive approach to security. Companies not only need to design the Threat Insight Report, throughout the year their infrastructure with security in mind, they also need to ● Maintains the world’s most comprehensive threats and vul- be constantly evaluating their overall security posture. To do nerabilities database, the IBM X-Force database—the result otherwise is to embrace a flawed approach of purely reac- of thousands of hours of research by the team, with much tionary security. For these reactive companies, attempting of its data used to power the proactive protection delivered to provide ongoing validation is not unlike changing the tires by IBM products on a car that is already moving. As such, in order to run smoothly, and maintain business continuity day after day, IBM doesn’t just help increase awareness of the threats and companies need to proactively secure their infrastructure. vulnerabilities that exist today. IBM helps companies better understand the context of the threat, such as specifically how it might be affecting midsize retailers across Europe. In this Understanding threats and vulnerabilities way, companies can make decisions based on a deeper under- on an ongoing basis standing of the challenges they face. IBM helps clients not The threat landscape continually evolves and changes, and for only understand the world that exists outside their four walls, companies to remain competitive, they must stay ahead of but also delivers meaningful intelligence about how their potential threats. The IBM X-Force® research and develop- business fits into that outside world. ment team can provide the foundation for a preemptive 2
  • 3. IBM Software January 2011 White Paper Executive Summary Ensuring the security of the infrastructure practices and solutions empower companies to often be in To sustain a solid security posture, even companies that compliance before new compliance regulations arise. By tak- design the infrastructure with adequate security controls will ing advantage of IBM’s Secure by Design philosophy, a com- need to continue to invest in information security. Companies pany’s IT decisions and purchases are not dictated by external can, however, take a smart, cost-effective approach to contin- events, but rather by a drive to enhance business operations ually building a more secure infrastructure. and profitability. Various events and developments can spur the need for new Extending the Secure by Design vision to security controls, such as new technologies, the changing the enterprise threat landscape, new compliance regulations, and even a suc- With a broad and deep awareness of today’s information cessful attack. Some companies implement new controls with security landscape and challenges, IBM equips companies each new development that can impact the security of the with the security they need today, while providing the tools infrastructure. Yet companies are at a disadvantage when the and methodologies to validate the security infrastructure on terms of their security are always being dictated to them, pro- an ongoing basis. From the security intelligence provided day moting a reactive security posture. after day by the IBM X-Force team, to the comprehensive portfolio of IBM Security Solutions, the Secure by Design Compliance is a good example of how companies often philosophy permeates everything that IBM delivers to its cus- approach security after the fact. Many companies wait tomers, providing customers ongoing security benefits. until new regulations emerge, and then focus resources on Forrester Research sums up best how the IBM Secure by establishing a methodology and identifying the security tools Design vision is establishing IBM as leader in information that can bring the organization into compliance. However, security: compliance is a response to the threats of yesterday. Changing security controls with every new compliance regu- lation means that companies are looking backward rather “Security organizations that require global than forward. This approach to compliance also requires that reach, a broad suite of security services, companies dedicate unnecessary costs to their security processes. and good threat intelligence from a single vendor should look to IBM to deliver these IBM is dedicated to helping organizations create a proactive services.”1 security posture that better secures the enterprise and more effectively meets compliance demands. Secure by Design 3
  • 4. For more information To learn more about Secure by Design: Ongoing validation, please contact your IBM marketing representative or IBM Business Partner, or visit the following website: ibm.com/security © Copyright IBM Corporation 2011 Additionally, financing solutions from IBM Global Financing IBM Corporation can enable effective cash management, protection from tech- Software Group Route 100 nology obsolescence, improved total cost of ownership and Somers, NY 10589 U.S.A. return on investment. Also, our Global Asset Recovery Produced in the United States of America Services help address environmental concerns with new, January 2011 more energy-efficient solutions. For more information on All Rights Reserved IBM Global Financing, visit: ibm.com/financing IBM, the IBM logo, ibm.com and X-Force are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml Other company, product or service names may be trademarks or service marks of others. The customer is responsible for ensuring compliance with legal requirements. It is the customer’s sole responsibility to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law or regulation. 1 Source: The Forrester Wave™: Managed Security Services, by Khalid Kark, Security & Risk Professionals, August 4, 2010. Please Recycle WGE03009-USEN-00