IBM Security - PROFI AG€¦ · IBM systems, products and services are designed to be part of a...

19
© 2015 IBM Corporation Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence Peter Kurfürst Vertrieb IBM Security Lösungen Enterprise-Kunden Baden-Württemberg und Bayern Juli 2015 IBM Security

Transcript of IBM Security - PROFI AG€¦ · IBM systems, products and services are designed to be part of a...

Page 1: IBM Security - PROFI AG€¦ · IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional

© 2015 IBM Corporation

Alle Risiken im Blick und bessere ComplianceKumulierte und intelligente Security Alertsmit QRadar Security Intelligence

Peter KurfürstVertrieb IBM Security LösungenEnterprise-KundenBaden-Württemberg und Bayern

Juli 2015

IBM Security

Page 2: IBM Security - PROFI AG€¦ · IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional

2© 2015 IBM Corporation

„Es ist keine Frage ob,

sondern vielmehr wann

und mit welcher Energie ein Unternehmen angegriffen wird.“

Reinhard Vesper, Abteilung Spionageabwehr, Verfassungsschutz NRW

Page 3: IBM Security - PROFI AG€¦ · IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional

3© 2015 IBM Corporation

63%der Betroffnen von Angriffen wurden von externen Organsiationen

auf einen Einbruch in das Netzwerk aufmerksam gemacht.

Anzahl an Tagen, die ein Angreifer im Netzwerk seines

Opfers verbringt, bis der Angreifer erkannt wurde.

243

Page 4: IBM Security - PROFI AG€¦ · IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional

4© 2015 IBM Corporation

50%von befragten Unternehmen fühlen sich nicht sicher in ihrem bestehenden

Sicherheitsumfeld.

Ponemon Institute2014 Global Cost of Data Breach Study

Sponsored by IBM

Page 5: IBM Security - PROFI AG€¦ · IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional

5© 2015 IBM Corporation

Page 6: IBM Security - PROFI AG€¦ · IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional

6© 2015 IBM Corporation

Quelle: Verizon DBIR 2013 Report

Prevent.

Detect.

Respond.

Page 7: IBM Security - PROFI AG€¦ · IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional

7© 2015 IBM Corporation

Page 8: IBM Security - PROFI AG€¦ · IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional

8© 2015 IBM Corporation

Page 9: IBM Security - PROFI AG€¦ · IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional

9© 2015 IBM Corporation

Alle Risiken im Blick

Network and Host Intrusion Prevention.

Network Anomaly Detection. Packet Forensics.

Database Activity Monitoring. Data Leak Prevention.

Security Information and Event Management.

Log Management. Incident Response.

Risk Management. Vulnerability Management.

Configuration and Patch Management.

X-Force Research and Threat Intelligence.

Compliance Management.

Reporting and Scorecards.

Was sind die externen und

internen Bedrohungen?

Sind wir vor diesen

Bedrohungen geschützt?Was passiert jetzt gerade?

Was sind die

Auswirkungen?

Page 10: IBM Security - PROFI AG€¦ · IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional

10© 2015 IBM Corporation

Kumulierte und intelligente Security Alerts

Suspected

IncidentsServers and mainframes

Data activity

Network and virtual activity

Application activity

Configuration information

Security devices

Users and identities

Vulnerabilities and threats

Global threat intelligence

AutomatedOffenseIdentification

• Unlimited data collection, storage and analysis

• Built in data classification

• Automatic asset, service and user discovery and profiling

• Real-time correlation and threat intelligence

• Activity baselining and anomaly detection

• Detects incidentsof the box

Embedded

Intelligence

Offenses

Page 11: IBM Security - PROFI AG€¦ · IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional

11© 2015 IBM Corporation

Übersicht der Lösungskomponenten

Portfolio Overview

QRadar SIEM

QRadar Risk Manager

QRadar Log Manager

Network Activity Collectors (QFlow / VFlow)

Vulnerability Manager

QRadar Incident Forensics

Page 12: IBM Security - PROFI AG€¦ · IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional

12© 2015 IBM Corporation

Eine integrierte Architektur

LogManagement

Security Intelligence

Network Activity

Monitoring

RiskManagement

Vulnerability Management

Network Forensics

Page 13: IBM Security - PROFI AG€¦ · IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional

© 2015 IBM Corporation

Use Cases

Page 14: IBM Security - PROFI AG€¦ · IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional

14© 2015 IBM Corporation

Irrefutable Botnet communication

Layer 7 flow data contains botnet

command control instructions

Erkennung von Bedrohungen

Potential Botnet detected

This is as far as traditional

SIEM can go

IRC on port 80

IBM Security QRadar QFlow

detects a covert channel

Application layer flow analysis kann echte Bedrohungen erkennen

Page 15: IBM Security - PROFI AG€¦ · IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional

15© 2015 IBM Corporation

Einhaltung von Richtlinien

“Compliance Simplified”

Unencrypted traffic

• IBM Security QRadar QFlow saw a cleartext service running on the accounting server

• PCI Requirement 4 states: Encrypt transmission of cardholder data across open, public networks

PCI compliance at risk?

Real-time detection

of possible violation

Page 16: IBM Security - PROFI AG€¦ · IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional

16© 2015 IBM Corporation

Erkennung von internen Bedrohungen

Potential data loss

Who? What? Where?

Who?

An internal user

What?

Oracle data

Where?

Gmail

Page 17: IBM Security - PROFI AG€¦ · IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional

17© 2015 IBM Corporation

Hoher Automatisierungsgrad für eine einfache Inbetriebnahme

Immediatediscovery

of network assets

Proactive vulnerability scans, configuration

comparisons, and policy compliance checks

Simplified deployment

Automated configuration

of log data sourcesand asset database

Automated updates

Stay current with latest threats,

vulnerabilities,and protocols

Out-of-the-box rules and reports

Reduce incident investigations and meet compliance

mandates

Page 18: IBM Security - PROFI AG€¦ · IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional

18© 2015 IBM Corporation

IBM QRadar Security Intelligence ist führend

Leader in the Gartner Magic Quadrant since 2009Security Information and Event Management (SIEM)

IBM QRadar rated #1 by Gartner in 2014in the following categories:

– Ability to execute

– Analytics and behavior profiling

– Compliance use cases

– SIEM use case, product rating, and overall use case

Page 19: IBM Security - PROFI AG€¦ · IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional

© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any

kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor

shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use

of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or

capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product

or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries

or both. Other company, product, or service names may be trademarks or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside

your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks

on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access.

IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other

systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

THANK YOUwww.ibm.com/security