Security Business Partner Guide Value Propositions

Slides:



Advertisements
Similar presentations
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
Advertisements

Solutions & Services to ‘Multiply your Business Performance’ 2013.
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
Barracuda Web Application Firewall
Security Controls – What Works
Unified Logs and Reporting for Hybrid Centralized Management
IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
E-Learning, Human Capital Management and the Banking Sector Dimitris Baltas, ATC ROM.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
IBM Software Business Partners 1 © 2011 IBM CorporationMikkel Norsk – Channel Sales Support Up to Double (2X) SVI Competitive Incentive Business Partner.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
© 2012 IBM Corporation Click here for Table of Contents This document is for IBM and IBM Business Partner use only. It is not intended for client distribution.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
The Eyeblaster ACM Advertising Campaign Management.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
© 2012 IBM Corporation Click here for Table of Contents This document is for IBM and IBM Business Partner use only. It is not intended for client distribution.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Sigur Ecommerce Pvt. Ltd.
© 2012 IBM Corporation Click here for Table of Contents This document is for IBM and IBM Business Partner use only. It is not intended for client distribution.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
© 2012 IBM Corporation Click here for Table of Contents This document is for IBM and IBM Business Partner use only. It is not intended for client distribution.
Network security Product Group 2 McAfee Network Security Platform.
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 1.
© 2012 IBM Corporation Click here for Table of Contents This document is for IBM and IBM Business Partner use only. It is not intended for client distribution.
Wireless Intrusion Prevention System
Built on Azure, Moodle Helps Educators Create Proprietary Private Web Sites Filled with Dynamic Courses that Extend Learning Anytime, Anywhere MICROSOFT.
© 2012 IBM Corporation Click here for Table of Contents This document is for IBM and IBM Business Partner use only. It is not intended for client distribution.
Deconstructing API Security
© 2012 IBM Corporation Click here for Table of Contents This document is for IBM and IBM Business Partner use only. It is not intended for client distribution.
© 2011 IBM Corporation Building a Smarter Planet Smarter Approach to Stop Threats Before They Impact Your Business Hong Kong 22 Sep 2011 Venkatesh Sadayappan.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
© 2010 IBM Corporation Information Management Adding Guardium Skills for Optim Partners Your Jump-Start Guide to Guardium Your jump-start guide to adding.
Sam Chughtai IBM Security Solutions Executive The Challenging State of Cyber Security September 20 th, 2012.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
© 2012 IBM Corporation Click here for Table of Contents This document is for IBM and IBM Business Partner use only. It is not intended for client distribution.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
ABOUT COMPANY Janbask is one among the fastest growing IT Services and consulting company. We provide various solutions for strategy, consulting and implement.
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Threat Response Manager (STRM)
Partner Toolbox Data & AI
OIT Security Operations
Deployment Planning Services
Partner Toolbox Cloud Infrastructure & Management
LANDesk® Management Suite 8.6 with ThinkVantageTM Technologies
Built on Microsoft Azure, 11Ants Retail Analytics Customer Science Solution Delivers Real Growth Opportunities to Retailers with Loyalty Programs MICROSOFT.
Microsoft Azure-Powered BlueCielo Meridian360 Portal Improves Asset Data Integrity and Facilitates Secure Collaboration with External Stakeholders MICROSOFT.
Hybrid Management and Security
Partner Toolbox Cloud Application Development
Transforming IT Management
Securing Your Digital Transformation
One-Stop Shop Manages All Technical Vendor Data and Documentation and is Globally Deployed Using Microsoft Azure to Support Asset Owners/Operators MICROSOFT.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Data Insights Summit
Presentation transcript:

Security Business Partner Guide Value Propositions

Worldwide Security Segment Opportunity Exceeds $73B by 2015 WW Security Products and Services Segment Opportunity (2011 – 2015) WW Security Product Opportunity by Segment (2012) Market opportunity Worldwide Security Segment Opportunity Exceeds $73B by 2015 Source: IBM Market Insights, 2H 2011 This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution.

Leading Products & Services in Every Security Segment Portfolio overview Leading Products & Services in Every Security Segment 3 3

Solution Area: Security Intelligence and Analytics Portfolio overview Solution Area: Security Intelligence and Analytics Portfolio Overview QRadar SIEM Integrated log, threat, compliance management Asset profiling and flow analytics Offense management and workflow QRadar Risk Manager Predictive threat modeling & simulation Scalable configuration monitoring and audit Advanced threat and impact analysis QRadar Log Manager Turnkey log management Upgradeable to enterprise SIEM QRadar Network Anomaly Detection Network analytics, behavior and anomaly detection Fully integrated with SIEM Helping our customers optimize security with additional context, automation and integration

People Solution Area: People Portfolio Overview IBM Security Identity Manager * Automate the creation, modification, and termination of users throughout the entire lifecycle Identity control including role management and auditing IBM Security Access Manager Family * Automates sign-on and authentication to enterprise web applications and services Entitlement management for fine-grained access enforcement IBM Security zSecure suite * User friendly layer over RACF to improve administration and reporting Monitor, audit and report on security events and exposures on mainframes. Manage and extend enterprise identity context across all security domains with end-to-end Identity Intelligence * Solution package purchase options available

Solution Area: Data Portfolio Overview IBM InfoSphere Guardium Product Family Database Activity Monitoring - continuously monitor and block unauthorized access to databases Privileged User Monitoring - detect or block malicious or unapproved activity by DBAs, developers and outsourced personnel Prevent Database Leaks - detect and block leakage in the data center Database Vulnerability Assessment - scan databases to detect vulnerabilities and take action Audit and Validate Compliance - simplify SOX, PCI- DSS, and Data Privacy processes with pre- configured reports and automated workflows IBM Security Key Lifecycle Manager Centralize and automate the encryption key management process Simplify administration with an intuitive user interface for configuration and management Enterprise-wide solutions for assuring the privacy and integrity of trusted information in your data center

Solution Area: Applications Portfolio overview Solution Area: Applications Reducing the costs of developing secure applications and assuring the privacy and integrity of trusted information Portfolio Overview AppScan Enterprise Edition Enterprise-class solution for application security testing and risk management with governance, collaboration and security intelligence Multi-user solution providing simultaneous security scanning and centralized reporting AppScan Standard Edition Desktop solution to automate web application security testing for IT Security, auditors, and penetration testers AppScan Source Edition Adds source code analysis to AppScan Enterprise with static application security testing 7

Solution Area: Infrastructure (Network) Portfolio overview Solution Area: Infrastructure (Network) Guard against sophisticated attacks using an Advanced Threat Protection Platform with insight into users, content and applications Portfolio Overview IBM Security Network Intrusion Prevention (IPS) Delivers Advanced Threat Detection and Prevention designed to stop targeted attacks against high value assets Proactively protects systems with IBM Virtual Patch® technology. Protects web applications from threats such as SQL Injection and Cross-site Scripting attacks Integrated Data Loss Prevention (DLP) monitors data security risks throughout your network Network Anomaly Detection for predictive early detection of network threats, system mis-configurations and out of policy traffic Provides Ahead of the Threat® protection backed by world renowned IBM X-Force Research IBM Security SiteProtector Provides central management of security devices to control policies, events, analysis and reporting for your business Behavior and Anomaly Analytics for predictive early detection of network threats, system mis-configurations and out of policy traffic 8

Why IBM Security Systems? Value Propositions Why IBM Security Systems? IBM Security Systems Unique and Comprehensive Security Framework $1.8B investment in innovative technologies 6K+ security engineers and consultants Largest vulnerability database Award-winning X-Force® research Analyst-recognized leadership in every segment Bringing of IBM’s security software and hardware products into one unified team will enable us to develop the integrated strategy and roadmap needed in today’s world of ever-increasing security complexity. We are building our team to provide and single voice of IBM security for the client and to support the CISO in developing Intelligence ● Integration ● Expertise 9

Business Partner Reference http://www.encodeinc.com IBM Premier Level Business Partner in Partner World SVP Authorized in all five IBM software brands Track record of over 700 security engagements, and a world-class Support Services organization with over 100 long-term customers Recipient of multiple IBM excellence awards: 2009 IBM Beacon Award For Delivery Excellence 2008 Avnet Crystal Growth Award 2010 IBM Beacon Award Finalist, Overall Technical Excellence. Member IBM Security Global Advisory Board Member Business Partner Advisory Council, Security Systems Division Enchoice is a strong example of a successful ECM Partner that has invested heavily in our program and IBM. Enchoice has been working with Filenet and then IBM ECM for almost 20 years. They started out as a VAR and methodically grew their skills and services. Over time they developed repeatable assets that evolved into multiple industry solutions. They are also a support provider for many of our products, driving even more value and revenue per opportunity. As you can see Enchoice is a very successful organization that has expanded their reach to include multiple IBM brands and IBM awards. 10 10 10

Security Business Partner Profile The ideal Business Partner for IBM Security Systems has a well-developed security practice selling across one or multiple security segments: Network/Threat, People/Identity, Application, Data or Security Intelligence. Many of our Business Partners are specialists in one of those areas, bringing very deep skills and expertise to our customers. Key cornerstones of a great security business are: consultative selling approach pre-sales technical support deployment/implementation practice New Business Partners must also be willing to participate in IBM incentive programs and invest in marketing and opportunity identification. Security partners don’t fit just a single model. There are large and small partners in every geography. Some partners specialize in just one or two solution areas, others have broad security practices and engage with customers across their spectrum of security needs. IBM Security Business Partners typically resell our products as well as implement them for customers. They have strong technical skills as well as the ability to prospect and utilize marketing tactics for demand generation. If a Business Partner has selling and technical skills in any of the IBM Security segments: Network, Application, People/Identity, Data or Security Intelligence, we would welcome working with them in the Security Systems brand. 11

Security Business Partner Resources ibm.com/partnerworld/security Sales Plays, Security Talk Replays, Sales Kits, Top Gun Prep, Certifications Pre-packaged marketing campaigns – it’s easy! 12 12

5 Quick Steps to Get Started Resources 5 Quick Steps to Get Started Join PartnerWorld to become an IBM Business Partner, then… 1 Visit the Security PartnerWorld site to access Business Partner sales and marketing tools and materials and training Complete your Security Business Partner profile Plan to maximize your profitability & your team’s education path by reviewing the Software Value Plus (SVP) & Software Value Incentive (SVI) criteria & product categories. Educate your sales and delivery teams & become SVP Authorized to resell security through Training & Certification. Develop a marketing plan and take advantage of IBM’s programs and drive demand with IBM Co-Marketing. 2 Here are 5 quick steps to get started: 1. To become an IBM Business Partner, you only have to join PartnerWorld, which gives you access to the resources you need to begin building and selling IBM-based solutions, products and services. There is no charge to join. Just accept the PartnerWorld Agreement and you will have easy access to valuable benefits, tools and support that can transform your business, today and tomorrow. There are many resources available that explain more about the benefits of being an IBM Business Partner and of PartnerWorld, a website dedicated to providing access to solutions, skills and resources to help IBM Business Partners win in the marketplace. Complete your Brand specific Business Partner profile: An up-to-date PPS profile is key to maintaining your access to PartnerWorld resources. Keep in mind that qualification for entitlement is based on the characteristics of your company's relationship with IBM such as contracts, country, PartnerWorld membership level, certifications, skills and solutions. Plan to maximize your profitability & your team’s education path by reviewing the Software Value Plus (SVP) & Software Value Incentive (SVI) criteria & product categories. Educate your Sales and Delivery Teams & become SVP Authorized to resell IBM software through Training & Certification Develop a Marketing plan and take advantage of IBM’s programs and drive demand with IBM Co-Marketing 3 4 5 13 13