integrované nástroje v modernom centre bezpečnostnýchoperácií · integrované nástroje v...

15
Integrované nástroje v modernom centre bezpe č nostn ý ch operácií Ondřej Burián April 2018 Security Intelligence & Response Client Technical Professional Central and Eastern Europe IBM Security

Upload: others

Post on 20-May-2020

9 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Integrované nástroje v modernom centre bezpečnostnýchoperácií · Integrované nástroje v modernom centre bezpečnostnýchoperácií OndřejBurián April 2018 Security Intelligence

Integrované nástroje v modernomcentre bezpečnostných operácií

Ondřej Burián

April 2018

Security Intelligence & Response Client Technical ProfessionalCentral and Eastern EuropeIBM Security

Page 2: Integrované nástroje v modernom centre bezpečnostnýchoperácií · Integrované nástroje v modernom centre bezpečnostnýchoperácií OndřejBurián April 2018 Security Intelligence

2 © 2018 IBM Corporation

Grow Business

Stop Threats

Prove Compliance

GetAhead of

Compliance

Enhance Security Hygiene

Detect & Stop Advanced

Threats

Orchestrate Incident

Response

Master Threat

Hunting

Secure Hybrid Cloud

Protect Critical Assets

Prevent Advanced

Fraud

GovernUsers and Identities

Let’s focus on the most critical security use cases

Outcome-driven security

2 © 2018 IBM Corporation

Page 3: Integrované nástroje v modernom centre bezpečnostnýchoperácií · Integrované nástroje v modernom centre bezpečnostnýchoperácií OndřejBurián April 2018 Security Intelligence

3 © 2018 IBM Corporation

Disconnected security capabilities are failing us

Criminal detection

Fraud protection

Data access controlData protection

Device management

Transaction protection

Content security

Malware protection

Network forensics and threat management

Network visibility and segmentation

Access management

Identity governance and administration

Privileged user management

IDaaS

Malware analysis

Threat sharing

Vulnerability management

Security analytics

Threat and anomaly detection

Incident response

User behavior analytics

Threat hunting and investigation

Mainframe security

Application security management

Application scanning

Firewalls and intrusion prevention

Endpoint detection and response

Endpoint patching and management

IoCs

|

|

|

Page 4: Integrované nástroje v modernom centre bezpečnostnýchoperácií · Integrované nástroje v modernom centre bezpečnostnýchoperácií OndřejBurián April 2018 Security Intelligence

4 © 2018 IBM Corporation

SECURITYORCHESTRATION

& ANALYTICS

THREATINTEL

ENDPOINT NETWORK

MOBILE ADVANCEDFRAUD

DATA

APPS IDENTITY& ACCESS

Build an integrated security immune system

Criminal detectionFraud protection

Data access control

Application security managementApplication scanning

Data protection

Device managementTransaction protection

Content security

Malware protection

Endpoint detection and responseEndpoint patching and management Network forensics and threat management

Firewalls and intrusion prevention

Network visibility and segmentation

Access managementIdentity governance and administrationPrivileged user management

IDaaSMainframe security

Malware analysisThreat sharing

Vulnerability managementSecurity analytics

Threat and anomaly detection

Incident responseUser behavior analytics

Threat hunting and investigation

IoCs

|

| |

Page 5: Integrované nástroje v modernom centre bezpečnostnýchoperácií · Integrované nástroje v modernom centre bezpečnostnýchoperácií OndřejBurián April 2018 Security Intelligence

5 © 2018 IBM Corporation

Supported by hundreds of open integrations

… …

Page 6: Integrované nástroje v modernom centre bezpečnostnýchoperácií · Integrované nástroje v modernom centre bezpečnostnýchoperácií OndřejBurián April 2018 Security Intelligence

6 © 2018 IBM Corporation

The future of security is AI and OrchestrationWhat if you could augment your teams’ intelligence and response?

Respond quickly with confidenceOrchestrate a complete and dynamic response, enabling faster, more intelligent remediation

– Create dynamic playbooks built on NIST / CERT / SANS

– Deploy response procedures and expertise

Use AI to gain a head startAutomatically investigate incidents and anomalies to identify the most likely threats

– Quickly gather insights from millions of external sources

– Apply cognitive reasoning to build relationships

IBM QRadar Advisor with Watson IBM Resilient

Page 7: Integrované nástroje v modernom centre bezpečnostnýchoperácií · Integrované nástroje v modernom centre bezpečnostnýchoperácií OndřejBurián April 2018 Security Intelligence

7 © 2018 IBM Corporation

The future of security is CollaborationAre you part of the bigger picture?

Share real-time threat intelligenceInteract with 41K+ users and 800+ TB of threat intelligence on the IBM X-Force Exchange

Join an ecosystem of defensesCustomize your security with 140+ apps on the IBM Security App Exchange

Page 8: Integrované nástroje v modernom centre bezpečnostnýchoperácií · Integrované nástroje v modernom centre bezpečnostnýchoperácií OndřejBurián April 2018 Security Intelligence

8 IBM Security

FIGHT THREATS

Page 9: Integrované nástroje v modernom centre bezpečnostnýchoperácií · Integrované nástroje v modernom centre bezpečnostnýchoperácií OndřejBurián April 2018 Security Intelligence

9 IBM Security

“We need help analyzing huge amounts of information in real-time to identify trends and useful information for more actionable insights.”

Detect & StopAdvanced Threats

OrchestrateIncident Response

MasterThreat Hunting

Page 10: Integrované nástroje v modernom centre bezpečnostnýchoperácií · Integrované nástroje v modernom centre bezpečnostnýchoperácií OndřejBurián April 2018 Security Intelligence

10 IBM Security

Detect and stop advanced threats

Automatically uncover the full scope of a security incident

• 2.3M+ security documents• 10B+ security data elements

• 80K+ documents read per day• 250K+ investigations enhanced

IBM QRadar Advisor with Watson

Page 11: Integrované nástroje v modernom centre bezpečnostnýchoperácií · Integrované nástroje v modernom centre bezpečnostnýchoperácií OndřejBurián April 2018 Security Intelligence

11 IBM Security

Detect and stop advanced threats

Advanced analytics for advanced threat detection and response across the enterprise

The User Behavior Analytics dashboard is an integrated part of the QRadar console

IBM QRadar User Behavior Analytics

Page 12: Integrované nástroje v modernom centre bezpečnostnýchoperácií · Integrované nástroje v modernom centre bezpečnostnýchoperácií OndřejBurián April 2018 Security Intelligence

12 IBM Security

Orchestrate incident response

End-to-end workflow, collaboration,actions and expertise to respond with confidence

IBM Resilient Incident Response

• Hunt for indicators using deep forensics

• Deploy response procedures and expertise

Page 13: Integrované nástroje v modernom centre bezpečnostnýchoperácií · Integrované nástroje v modernom centre bezpečnostnýchoperácií OndřejBurián April 2018 Security Intelligence

13 IBM Security

Master threat hunting

Analyst-driven investigations using big data and threat intelligence to get ahead of the threats

• Visually investigate with built-in analytics to uncover hidden threats faster

• Easily combine both structured and unstructured data to support investigative analysis

i2 Enterprise Insight Analysis

Page 14: Integrované nástroje v modernom centre bezpečnostnýchoperácií · Integrované nástroje v modernom centre bezpečnostnýchoperácií OndřejBurián April 2018 Security Intelligence

14 IBM Security

LET’S TAKE A LOOK

Page 15: Integrované nástroje v modernom centre bezpečnostnýchoperácií · Integrované nástroje v modernom centre bezpečnostnýchoperácií OndřejBurián April 2018 Security Intelligence

ibm.com/security

securityintelligence.com

xforce.ibmcloud.com

@ibmsecurity

youtube/user/ibmsecuritysolutions

© Copyright IBM Corporation 2018. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.

FOLLOW US ON:

THANK YOUibm.com/security/community