integrované nástroje v modernom centre bezpečnostnýchoperácií · integrované nástroje v...
Post on 20-May-2020
9 Views
Preview:
TRANSCRIPT
Integrované nástroje v modernomcentre bezpečnostných operácií
Ondřej Burián
April 2018
Security Intelligence & Response Client Technical ProfessionalCentral and Eastern EuropeIBM Security
2 © 2018 IBM Corporation
Grow Business
Stop Threats
Prove Compliance
GetAhead of
Compliance
Enhance Security Hygiene
Detect & Stop Advanced
Threats
Orchestrate Incident
Response
Master Threat
Hunting
Secure Hybrid Cloud
Protect Critical Assets
Prevent Advanced
Fraud
GovernUsers and Identities
Let’s focus on the most critical security use cases
Outcome-driven security
2 © 2018 IBM Corporation
3 © 2018 IBM Corporation
Disconnected security capabilities are failing us
Criminal detection
Fraud protection
Data access controlData protection
Device management
Transaction protection
Content security
Malware protection
Network forensics and threat management
Network visibility and segmentation
Access management
Identity governance and administration
Privileged user management
IDaaS
Malware analysis
Threat sharing
Vulnerability management
Security analytics
Threat and anomaly detection
Incident response
User behavior analytics
Threat hunting and investigation
Mainframe security
Application security management
Application scanning
Firewalls and intrusion prevention
Endpoint detection and response
Endpoint patching and management
IoCs
|
|
|
4 © 2018 IBM Corporation
SECURITYORCHESTRATION
& ANALYTICS
THREATINTEL
ENDPOINT NETWORK
MOBILE ADVANCEDFRAUD
DATA
APPS IDENTITY& ACCESS
Build an integrated security immune system
Criminal detectionFraud protection
Data access control
Application security managementApplication scanning
Data protection
Device managementTransaction protection
Content security
Malware protection
Endpoint detection and responseEndpoint patching and management Network forensics and threat management
Firewalls and intrusion prevention
Network visibility and segmentation
Access managementIdentity governance and administrationPrivileged user management
IDaaSMainframe security
Malware analysisThreat sharing
Vulnerability managementSecurity analytics
Threat and anomaly detection
Incident responseUser behavior analytics
Threat hunting and investigation
IoCs
|
| |
5 © 2018 IBM Corporation
Supported by hundreds of open integrations
… …
6 © 2018 IBM Corporation
The future of security is AI and OrchestrationWhat if you could augment your teams’ intelligence and response?
Respond quickly with confidenceOrchestrate a complete and dynamic response, enabling faster, more intelligent remediation
– Create dynamic playbooks built on NIST / CERT / SANS
– Deploy response procedures and expertise
Use AI to gain a head startAutomatically investigate incidents and anomalies to identify the most likely threats
– Quickly gather insights from millions of external sources
– Apply cognitive reasoning to build relationships
IBM QRadar Advisor with Watson IBM Resilient
7 © 2018 IBM Corporation
The future of security is CollaborationAre you part of the bigger picture?
Share real-time threat intelligenceInteract with 41K+ users and 800+ TB of threat intelligence on the IBM X-Force Exchange
Join an ecosystem of defensesCustomize your security with 140+ apps on the IBM Security App Exchange
8 IBM Security
FIGHT THREATS
9 IBM Security
“We need help analyzing huge amounts of information in real-time to identify trends and useful information for more actionable insights.”
Detect & StopAdvanced Threats
OrchestrateIncident Response
MasterThreat Hunting
10 IBM Security
Detect and stop advanced threats
Automatically uncover the full scope of a security incident
• 2.3M+ security documents• 10B+ security data elements
• 80K+ documents read per day• 250K+ investigations enhanced
IBM QRadar Advisor with Watson
11 IBM Security
Detect and stop advanced threats
Advanced analytics for advanced threat detection and response across the enterprise
The User Behavior Analytics dashboard is an integrated part of the QRadar console
IBM QRadar User Behavior Analytics
12 IBM Security
Orchestrate incident response
End-to-end workflow, collaboration,actions and expertise to respond with confidence
IBM Resilient Incident Response
• Hunt for indicators using deep forensics
• Deploy response procedures and expertise
13 IBM Security
Master threat hunting
Analyst-driven investigations using big data and threat intelligence to get ahead of the threats
• Visually investigate with built-in analytics to uncover hidden threats faster
• Easily combine both structured and unstructured data to support investigative analysis
i2 Enterprise Insight Analysis
14 IBM Security
LET’S TAKE A LOOK
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
© Copyright IBM Corporation 2018. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
FOLLOW US ON:
THANK YOUibm.com/security/community
top related