IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.

Slides:



Advertisements
Similar presentations
THE BUSINESS NEED Create affordable alternative/ provide enterprise power/capability for any-sized company Reduce resource-draining burden of meeting.
Advertisements

2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
© 2010 IBM Corporation Document number A New Security Blue Print- Smart Security for a Smarter Planet Vaidy Iyer (Leader, IBM Security Solutions)
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Formulating a Security Policy for the Modern IT Landscape.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Dell Connected Security Solutions Simplify & unify.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Idaho Cybersecurity Task Force Department of Administration 16 Sep 2015.
Security Business Partner Guide Value Propositions
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
IBM Mobile Security solutions 1IBM and Business Partner Sellers Only Enterprise Applications and Cloud Services Identity, Fraud, and Data Protection Device.
© 2012 IBM Corporation IBM Security Services smarter security for a smarter planet.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Integration Framework: QRadar 7.2 MR1.
Wireless Intrusion Prevention System
Synchronized Security Revolutionizing Advanced Threat Protection
IBM Security Pelin Konakçı IBM Security Software Sales Leader
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
© 2011 IBM Corporation Building a Smarter Planet Smarter Approach to Stop Threats Before They Impact Your Business Hong Kong 22 Sep 2011 Venkatesh Sadayappan.
© 2014 IBM Corporation 1 IBM Security Systems Cloud Security Clouds can be secure IBM Security Systems April 2014.
OTech CalCloud Security General 1  Meets the operational and compliance requirements of the State  SAM/SIMM  NIST  FedRAMP v2  Other necessary regulatory.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Combating Constantly Evolving Advanced Threats – Solution Architecture Mats Aronsson, Nordic Technical Leader Trusteer, IBM Security.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Sam Chughtai IBM Security Solutions Executive The Challenging State of Cyber Security September 20 th, 2012.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
1 Sophos Security made simple. Steven Hecht Channel Account Executive Andy Miller Enterprise Account Manager
Cyber Security for the real world Tim Brown Dell Fellow and CTO Dell Security Solutions.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
© 2015 IBM Corporation Rethinking the Challenge of Cyber Security Ravi Srinivasan VP, Strategy and Product Management IBM Security September 24, 2015.
IT Security Mandatory Solutions Andris Soroka 2nd of July, RIGA.
DATS Portfolio. PARTNERS & Solutions END TO END DATA CENTER SOLUTIONS Building a robust, resilient IT infrastructure. Lenovo System x combines unbeatable.
Expand the value of security IBM SECURITY IMMUNE SYSTEM STRATEGY Christian Falco August 2016
Your Partner for Superior Cybersecurity
Cybersecurity - What’s Next? June 2017
Journey to Microsoft Secure Cloud
Capabilities Matrix Access and Authentication
(1888 PressRelease) Staying Ahead of Today’s Rapidly Evolving Security Landscape
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Joe, Larry, Josh, Susan, Mary, & Ken
Matt G change over point ?
I have many checklists: how do I get started with cyber security?
2nd SG 13 Regional Workshop for Africa on “Future Networks: Cloud Computing, Energy Saving, Security & Virtualization” (Tunis, Tunisia, 28 April 2014)
Identity & Access Management
Securing the Threats of Tomorrow, Today.
2nd SG 13 Regional Workshop for Africa on “Future Networks: Cloud Computing, Energy Saving, Security & Virtualization” (Tunis, Tunisia, 28 April 2014)
Secure once, run anywhere Simplify your security with Sophos
| UNC.
How to Mitigate the Consequences What are the Countermeasures?
(With Hybrid Network Support)
Presentation transcript:

IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader

© 2015 IBM Corporation IBM Security 2

© 2015 IBM Corporation IBM Security 3

© 2015 IBM Corporation IBM Security 4

© 2015 IBM Corporation IBM Security 5

© 2015 IBM Corporation IBM Security 6

© 2015 IBM Corporation IBM Security 7

© 2015 IBM Corporation IBM Security 8

© 2015 IBM Corporation IBM Security 9

© 2015 IBM Corporation IBM Security 10

© 2015 IBM Corporation IBM Security 11

© 2015 IBM Corporation IBM Security 12

© 2015 IBM Corporation IBM Security 13

© 2015 IBM Corporation IBM Security 14

© 2015 IBM Corporation IBM Security 15

© 2015 IBM Corporation IBM Security 16

© 2015 IBM Corporation IBM Security 17

© 2015 IBM Corporation IBM Security 18

© 2015 IBM Corporation IBM Security 19

© 2015 IBM Corporation IBM Security 20

© 2015 IBM Corporation IBM Security 21

© 2015 IBM Corporation IBM Security 22 - Identity and Access Governance Guardium Data Security AppScan Source Network Intrusion Prevention Trusteer Apex Identity and Access Management Guardium Database Vulnerability Mgmt AppScan Dynamic Next Generation Network Protection Mobile & Endpoint Management Privileged Identity Management Guardium / Optim Data Masking DataPower SOA Security SiteProtector Threat Management Virtualization and Server Security Federated Access and SSO Key Lifecycle Manager Security Policy Manager Network Anomaly Detection Mainframe Security IBM X-Force and Trusteer Threat Intelligence Advanced Fraud Protection Trusteer Rapport Trusteer Pinpoint Malware Detection Trusteer Pinpoint ATO Detection Trusteer Mobile Risk Engine Security Intelligence and Analytics Strategy, Risk and Compliance Security Maturity Benchmarking Security Strategy and Roadmap Development Security Risk Assessment and Program Design Industrial Controls (NIST, SCADA) Payment Card Advisory (PCI) Identity Strategy and Assessment Data Security and Assessment Embedded Device Testing Firewall / IDPS / UTM Management Web Protection and Managed DDoS User Provisioning and Access Mgmt EncryptionPenetration Testing Hosted Web, and Vulnerability Management Deployment and Migration Total Authentication Solution Data Loss Prevention Application Security Assessment Staff Augmentation Managed and Cloud Identity Mobile Application Testing PeopleDataApplicationsNetworkInfrastructureEndpoint Emergency ResponseManaged SIEMIncident PlanningCyber Threat IntelSecurity Operations Center Design Services QRadar SIEMQRadar Log ManagerQRadar Risk MgrQRadar Vulnerability MgrQRadar Incident Forensics The IBM Security Portfolio Services Products Cybersecurity Assessment and Response Threat Intelligence AdvisoryX-Force Threat AnalysisPenetration TestingIncident PreparationEmergency Response

© 2015 IBM Corporation IBM Security 23

© 2015 IBM Corporation IBM Security 24