Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
To cloud
Self-Service
Highly Virtualized
Location Independence
Workload Automation
Rapid Elasticity
Standardization
1.
2.
3.
4.
5.
6.
7.
SmartCloud Security
SmartCloud Security
SmartCloud Security
Identity Protection
Threat Protection
1 Identity
Vulnerability
Mgt.Log
Service
Security
Event and
Mgt.
Requirement
Full life-cycle identity
management (cradle-tograve) for cloud-based
users
Access, authorization
control, and fraud
prevention for
applications and data in
the cloud
Ability to track and log
user activities, report
violations, and prove
compliance
Capability
Federated single sign-on to multiple web-based and cloud applications
with a single ID and password for employees, customers, BPs, vendors
User self-service for identity creation and password reset
Securely provision, manage, automate and track privileged access to
critical enterprise resources
Automated management and risk-based enforcement of access control
policies across every application, data source, operating system and
even company boundaries
Role-based identity and access management aligns users roles to
their access capabilities, simplifies management and compliance
Security incident and event management for compliance reporting and
auditing of users and their activitiesin both cloud and traditional
environments
The ability to monitor, control, and report on privileged identities (e.g.,
systems and database administrators) for cloud-based administrators
1 Identity
1 Identity
Administrators share
privileged UserIDs
1 Identity
IBM Security
Privileged Identity Management
ID
Databases
1 Identity
Key Themes
Standardized IAM
and Compliance
Management
Expand IAM vertically to provide identity
and access intelligence to the business;
Integrate horizontally to enforce user
access to data, app, and infrastructure
Insider Threat
and IAM Governance
SmartCloud Security
SmartCloud Security
SmartCloud Security
Identity Protection
Threat Protection
6 Protect VMs
Before Virtualization
After Virtualization
6 Protect VMs
Rootkit Detection /
Prevention
Virtual Network-Level
Protection
Virtual Infrastructure
Auditing (Privileged User)
There
Therehave
havebeen
been100
100vulnerabilities
vulnerabilitiesdisclosed
disclosedacross
acrossall
allof
of
VMwares
virtualization
products
since
1999.*
VMwares virtualization products since 1999.*
57%
57%of
ofthe
thevulnerabilities
vulnerabilitiesdiscovered
discoveredin
inVMware
VMwareproducts
productsare
are
remotely
accessible,
while
46%
are
high
risk
vulnerabilities.*
remotely accessible, while 46% are high risk vulnerabilities.*
2013 IBM Corporation
4 Patch Management
Optimizing the patch cycle and help ensure the security of both
traditional and Cloud computing assets
+
Distributed Endpoints
Web
App
DB
Physical Servers
+
Virtual Servers
Capability
7 Security Intelligence
Event Correlation
Database Activity
Offense
Activity Baselining & Identification
Application Activity
Configuration Info
Vulnerability Info
Anomaly Detection
User Activity
Detecting threats
Consolidating data silos
Deep
Intelligence
JK 2012-04-26
Extensive Data
Sources
SmartCloud Security
SmartCloud Security
SmartCloud Security
Identity Protection
Threat Protection
2 Data
Understand, define
policy
Establish
compliance and
security intelligence
2 Data
QRadar
Integration
Across Multiple
Deployment
Models
Key Themes
Enhanced Compliance
Management
Dynamic
Data Protection
3 Applications
3 Applications
Key Themes
Security Intelligence
Integration
Federating
identities for public
and hybrid cloud
environments
Security
Application
Scanning for
cloud based
applications
Federated Identity
Manager
Business Gateway
AppScan Static /
Dynamic Analysis
Virtual Server
Protection
Network IPS
Virtual Applicance
Endpoint Manager /
SmartCloud Patch
Guardium database
monitoring and
protection
2013 IBM Corporation
IBM X-Force
Other Links:
People
Data
Applications
Infrastructure
Segment / Report
Analyst Recognition
2012
2011
2012
2012
2010
2011
2012***
2011
2011*
2012**
2010
2011
Data
Applications
Infrastructure
Data Masking
2013
2010
2011
2012
2013
2010
Leader
Leader
Visionary
Niche Player
Strong Performer
Challenger
Contender
2010
V13-05
Offsite management
of security logs
and events
Application
Security
Management
Managed
Web and Email
Security
Security-as-a-Service (SaaS)
from IBM Managed Security Services
Security Intelligence People Data Apps Infrastructure
IBM X-Force
Threat Analysis
Service
Mobile Device
Security
Management
Vulnerability
Management
Service
Help provide
proactive discovery
and remediation of
vulnerabilities