SlideShare a Scribd company logo
1 of 31
IBM Security Systems

Security in High Risk Environment
Vulnerabilities, Vulnerabilities and Vulnerabilities

Jan Bojtos
Security Channel Manager
Central & Eastern Europe
IBM Security Systems
jan.bojtos@sk.ibm.com

© 2013 IBM Corporation
1

© 2013 IBM Corporation
IBM Security Systems

You know? You can
do this online now.

2

© 2013 IBM Corporation
IBM Security Systems

Agenda

 Application Security
 Vulnerability Management
 New Generation Network Security

3

© 2013 IBM Corporation
IBM Security Systems

Agenda

 Application Security
 Vulnerability Management
 New Generation Network Security

4

© 2013 IBM Corporation
IBM Security Systems

Security
Incident
s in the
first
half of

5

© 2013 IBM Corporation
IBM Security Systems

The Application Security landscape
Web application vulnerabilities dominate the enterprise threat landscape
Applications in Development
 In-house development
 Outsourced development

Production Applications
 Developed in house
 Acquired
 Off-the-shelf commercial apps

•
•

6

Web application vulnerabilities surged
14% from 2,921 vulnerabilities in 2011
to 3,551 vulnerabilities in 2012
47% of all vulnerabilities that the IBM XForce documented in 2012 were
considered web application
vulnerabilities
*IBM X-Force 2012 Trend & Risk Report

 Vulnerabilities are spread through
a wide variety of applications

**IBM X-Force 2012 Trend & Risk Report

© 2013 IBM Corporation
Applications

IBM Security Systems

Challenge 1: Finding more vulnerabilities using advanced techniques

Total Potential
Security Issues

Static Analysis
- Analyze Source Code
- Use during development
- Uses Taint Analysis /
Pattern Matching

Dynamic Analysis
- Analyze Live Web Application
- Use during testing
- Uses HTTP tampering

Hybrid Analysis
- Correlate Dynamic and
Static results
- Assists remediation by
identification of line of code

Run-Time Analysis
- Combines Dynamic Analysis
with run-time agent
- More results, better accuracy
77

Client-Side Analysis

!New
!New

- Analyze downloaded Javascript
code which runs in client
!New
- Unique in the industry !New
© 2013 IBM Corporation
IBM Security Systems

Challenge 2: Reducing Costs Through a Secure by Design
Approach
80% of development costs
80% of development costs
are spent identifying and
are spent identifying and
correcting defects!*
correcting defects!*

Average Cost of a Data Breach
Average Cost of a Data Breach
$7.2M** from law suits, loss of customer
$7.2M** from law suits, loss of customer
trust, damage to brand
trust, damage to brand

Find during Development

Find during Build

Find during QA/Test

Find in Production

$80/defect

$240/defect

$960/defect

$7,600 / defect

“As financially-motivated attackers have shifted their focus to applications, Web application security has become a top priority. However,
“As financially-motivated attackers have shifted their focus to applications, Web application
the responsibility for web application security cannot rest solely with information security. Enterprises should evaluate how to identify
the responsibility for web application security cannot rest solely with information security. Enterprises should evaluate how to
vulnerabilities in Web applications earlier in the development process as transparently as possible using web application security testing
vulnerabilities
products or services.”
products or services.”
Neil MacDonald, Gartner, 12-6-11
Neil MacDonald, Gartner, 12-6-11

8

* Source: National Institute of Standards and Technology

** Source: Ponemon Institute 2009-10

© 2013 IBM Corporation
IBM Security Systems

Challenge 3: Bridging the Security/Development gap
Break down organizational silos
 Security experts establish security testing
policies
 Development teams test early in the cycle

Provide Management Visibility
 Dashboard of application risk
 Enable compliance with
regulation-specific reporting

 Treat vulnerabilities as development
defects

“… we wanted to go to a multiuser web-based solution
“… we wanted to go to a multiuser web-based solution
that enabled us to do concurrent scans and provide our
that enabled us to do concurrent scans and provide our
customers with a web-based portal for accessing and
customers with a web-based portal for accessing and
sharing information on identified issues.”
sharing information on identified issues.”
Alex Jalso, Asst Dir, Office of InfoSecurity, WVU
Alex Jalso, Asst Dir, Office of InfoSecurity, WVU
9

Developer
Architect
Quality
Professional

Enables
Collaboration
Security Auditor

© 2013 IBM Corporation
IBM Security Systems

Finding Vulnerabilities During Security Test Phase

SDLC
Coding
% of Issue found by stage of SDLC
10

Build

QA

Security

Production

Most Issues are
Most Issues are
found by security
found by security
auditors prior to
auditors prior to
going live.
going live.

© 2013 IBM Corporation
IBM Security Systems

Maturity of Security Testing

SDLC
Coding
% of Issue found by stage of SDLC
11

Build

QA

Security

Production

Desired Profile
Desired Profile

© 2013 IBM Corporation
IBM Security Systems

Organizations need to take a proactive approach to Application Security
 Embed security testing early in the
development lifecycle to support agile
delivery demands
 Bridge the gap between “Security”
and “Development” through joint
collaboration and visibility, enabling
regulatory compliance
 Integrate security testing into the
development lifecycle, through
interfaces to development tools

A proactive team approach to
Application Security
AppScan
Static
Analysis

Hybrid
Analysis

Dynamic
Analysis

Collaboration
Governance

Visibility

Analyst

Developer

Quality
Professional

Architect

Security Auditor

12

© 2013 IBM Corporation
IBM Security Systems

IBM Security Systems AppScan Suite –
Comprehensive Application Vulnerability Management
SECURITY
REQUIREMENTS

CODE

BUILD

QA

AppScan Enterprise

Security
Requirements
Definition
Security
requirements
defined before
design &
implementation

AppScan Source

Build security
testing into the
IDE

PRE-PROD

PRODUCTION

AppScan onDemand

AppScan
Standard

Security &
Automate Security Security / compliance
Compliance
testing incorporated
/ Compliance
Testing,
into testing &
testing in the
oversight, control,
remediation
Build Process
policy, audits
workflows

AppScan
Standard
Outsourced testing
for security audits &
production site
monitoring

Application Security Best Practices – Secure Engineering Framework

13
13

Dynamic Analysis/Blackbox –
Static Analysis/Whitebox -

© 2013 IBM Corporation
IBM Security Systems

Agenda

 Application Security
 Vulnerability Management
 New Generation Network Security

14

© 2013 IBM Corporation
IBM Security Systems

Vulnerability market trends

1

Escalating
Escalating
threat landscape
threat landscape

Vulnerabilities are
increasing in volume and
severity, while attackers
are exploiting them
quicker than ever before…
and with greater
sophistication

15

2

Evolving IT
Evolving IT
infrastructures
infrastructures

Rapid adoption of mobile and
cloud – as well as the ever
increasing speed and
complexity of IT – make
discovery and accuracy of
new and existing risks a
daunting task

3

Surpassing simple
Surpassing simple
compliance efforts
compliance efforts

Routine snapshots
may satisfy the
auditors, but hardly
enough to understand
what’s really going
on within your IT
environment

© 2013 IBM Corporation
IBM Security Systems

Customer business problems
Problems in current Vulnerability management deployments:

!!

Yo
ur
V

Siloed system limitations

!!

rV

uln

rV

uln

era

uln

era
bil
itie
era
s
bil
itie
s

bil
it

ies

Hidden risks remain

Leaves
unanswered
questions

16

Yo
u

Data overload inhibitor

!!

Yo
u

CV
E
CV CV
E
E
CV CV CV
CV
E E E
CV CV CV CVE
E
CV CV
E E
E
E C C C C CV
E
CV CV CV VE VE VE CVE C E C
V
E E CE C C C
V V
V
CV CV CV VE VE E VE C E C E C E CV
CV
E
E C C C C C CV VE VE VE
E
E
E
V VE VE E
C
C
E
CV CV CVE VE VE EVC C C C CV CV CVE CVE VE
E
V
E
C CV C VE E VE
C
CVE CV CCV CVE VE E VE CVC E C E CV CVE CVE CVE VE
VE V C
E E VEE C C CVCVCVE VE CVE E VE E C C
C C C
CV CV V V E E
CV CV CV E E E E C C C C CVC CV C V VE VE VE VE C
C CV
E CE C C CC CV CV V V VE VE EVE E VE E C C
E
V
C C C
V E
EE E C
CV CV CVVE VE E VVE E C C C CV V CV VCV VE V VE VE VE C E C E CV
CC
E
E E CE CCV C CV V C V V V E E CE E C CE C CV C
V V
E
VE
CV CV CVE E VE E VE E E VE E CE E CVCV V CV VCV VE VE E VE C E C E CV
V
C
V
C C CVV
E C C C CC CV V V CCE VE V E E E CE E C C C C
E
E
V
E
C E
VE
V E
CV CV CVVE VE E VVE E E E CVECC CE C CVCV VE VE CVEVE VEVE E C E CV
CC CV V V V V
C
E
E CC E CC CV CVE V CVECE EVE E VE E C C C C CVC CVCV V VE E
E
E
V
CV CV V VE VVE CCE VEE C C C CE VC CV CV V V VE VE EVE E E E C CV
C
E CCE V C CV VV V V V CEVE E E E E C C C C C
C
C
E CE C C
V
V
E
E
VEV
V E VVC C E EV E C C CC E
CC C V
CV CV CVVE VE E VVE E E E E EECCV E CV V CV VE V VCVEVE VEVE C E C E CV
C
V
E E
C
V
E
C C CV V V V VE E CE E E E CCE C CVC C C
E
VE C V
CV CV CCVECCVE VE E VVECE E E E CECCE V V V VE V VE VE EVEVEVEVE C E CV
E CC
C CC CV
V
V
V
E CE
E
C C C C V CV V VV E C E CE E C C C C C
E
VV C E V VV E CVE EE E CV CVV V V C V V V
CV CV CVVECCEE VVE VE E CEEC E E V CV CV VE V CEE E E VE E E E C E CV
C E
CV CE V CVE E E E
E
CC
V
E
E E
CC CC C V V
CV C CV CVE V VC CV V
C V C CC
CV CV CV CCVE VVE VVECVE E C EEC E E V CVE VCVE E EVE E VE E C E CV
E C C
VE E
V CVE E E E E E C C C CVC CV
V
E E
C CC
V
E
E
VV
CV CV V V
CV
CV CV CV CVE CVVE VVECC EECVEE C E CCCVE CVE E E E VE EVE E C E C
CV C
E CC E
E E
E
VV V E VV VV C E E C C CV C CV V V
CV
E
CV CV CV CVE CVE VVE C EEC E C V E CEE CV CVECVE VE E VE E C E C E
EC
CV C CV V VEE E VE C C C
V
E E
C
V V
E
V
CC VC C V V
CV CV CVE CVE VE VVE C EECC EECCE E V V CCV VE VE EVE E C E C E
EC
V
E C E C C CV CV
V VE
V E VVE VVE E E CEE C CVC CV
E
C V
CE V
VE VE VE C E C E C E C V CCV CCVE VE E VE E VE E CV E CV
V
CV
CV CV VE VE VE VEE CEE C E CCV CV CVE E E C E
C
E
CV VE
E C E C CV CV CV CVVE VVE VEE
E
EC
E C E C E CCV CCV CVE CVE
VE VE
E
VE E
VEE
VE
CV CV CV
V V
C C
E C E C E C E CVE CV CCVE VE VE
V
VE VE VE
E E C E CV CVE
EC
CV CV CVE CVE VE
VE
E C E C CV CV
VE VE
E E
CV CV CVE
EC EC
VE VE
CV
E

Creates
security
gaps

•
•
•
•
•

Has that been patched?
Has or will it be exploited?
Does my firewall block it?
Does my IPS block it?
Does it matter?

© 2013 IBM Corporation
IBM Security Systems

Our solution: IBM Security QRadar Vulnerability Manager
Solution Highlights
 Unique VA solution
integrated with Security
Intelligence context/data

New

Log
Manager

SIEM

Network
Activity
Monitor

Risk
Manager

Vulnerability
Manager

 Providing unified view of all
vulnerability information
 Dramatically improving
actionable information
through rich context
 Reducing total cost of
ownership through product
consolidation
Security Intelligence is extending and transforming vulnerability management
– just as it did with logs, events, flows and risk management.
17

© 2013 IBM Corporation
IBM Security Systems

IBM Security QRadar Vulnerability Manager key features
 Contains an embedded, well
proven, scalable, analyst
recognised, PCI certified scanner
 Detects 70,000+ vulnerabilities
 Tracks National Vulnerability
Database (CVE)
 Present in all QRadar log and flow
collectors and processors
 Integrated external scanner
 Complete vulnerability view
supporting 3rd party vulnerability
system data feeds
 Supports exception and
remediation processes of VM with
seamlessly integrated reporting
and dash boarding
18

Complete Vulnerability Context and Visibility

Integrated
vulnerability
scanner

Network
discovery and
asset
information

IBM
Security
Context

3rd Party
vulnerability
solutions

AppScan
Guardium
Endpoint (BigFix)
Network IPS
X-Force

e.g. Qualys
Rapid7
Nessus
nCircle
McAfee
© 2013 IBM Corporation
IBM Security Systems

Security Intelligence Integration
 QVM scanners present in every QRadar
appliance
− ‘Switch’ on distributed scanning
 Event triggered scanning
− E.g. New asset seen
 Rapid and dynamic scans using asset
search based scans
− Less time spent searching
 Shared reporting and dashboard
infrastructure, providing single view

Scanning

 External threat posture, exploit events,
network usage, and security context
seamlessly integrated

20

© 2013 IBM Corporation
IBM Security Systems

What’s a difference?
Standard VM

Y
Yo our V
Yo
u
ur r Vu ulne
Vu
r
l
lne nera abili
t ie
rab bil
ilit ities s
ies

CV
E
CV CV CV
E E C EC
CV
V
E CV CV V
CV CV E C E C E C E CV
CV
EC
E CVE VE VE VE
EC C E C
CV CV
C
V
E C VE E CVE VE
E CVE CVC CVE VE VE C E C
C
CV CV V
VC C C V
V
EV
E
CV CVC CVE CVE VE VE C E C
E
E
E
C
E
CV CV CVE EVC EVCV CV CVE VE VE
CV C VC CVE CVE
E
E
E
E
C
C
E CVE CVC EV
C
E
E CV CV
CV CV CVC EVC EVCV EVCVC CVE CVE VE VE
C C
E E C
E CE E EVCV VCV VE V VE VC E CV E CV CV CV
V C E VE C C E C CV
EC E C
EV
CV CV
E E C VC E
V
E C E C EC
E
E
E CV E CVE
CV
E CVC VEVC CVC VC VE C E VE E C
E
V
CV CV E V E VE EVE EVE CVCVE CVE VE VE VE C E C
EC
CVC CV EVC CVC
C
E CE C CVC CVE EV EVE EVE EVE CV CV VE VE
CV CV
VE
VE E EV VCV
CV
E
CV CV VE CV E CV CVC CVE E
E
C C C E C E C C CV
E C CVE
E
E
V
E EVC CVE EV V VCV CV E CV E V
E CE C CVE CVC
E
V
V
E
E C C
CV CV E VE CVC E VE VE C CVE CVE VE CV VCV E C E CV E CV
E
EV
E
CV CV C CVE CVE VCV VC C E C E CV V CVE E
EC
E C C E V CV
E CVE E
EV E C
EC
E CVC CVE E
E C C VE CV C VC E
CV CV
E E CV C E E
E EVC EVE C V
C C
CV VE C
E VE E CVE VC VE
C EE
E CVC CV C CV C V E C C E V E V V VC V CVC CV E VE VE
E
C
E
CV CC E V E VE E VE E VE CVE E CE E E CV VCV VE C VE CV CV
E C VE
CV C CV
E E
CV CV V C V C E
VE CV CV
EC
VE CVC CVC CVE CVE E
E
VE
E E C E C CV CV E E EV
CV EVC CVE E VE E VE VE E CVC CVEV VE VE C E C
CV
CV CV
VE
E
CV C
E
C
E
C C CV
E CE C CV C EVC V C VE VE E V CV E VC C V CV E VE VE
E C
V E
C
E
CV CV E V E VE E VE VE CV C CE E E C EVCV VCVC E C E CV
EC EE
CV CV C CVE CVE E V V CV VEVE E C E CV CV
C
E EE
C
E
E C E EVE E VE E
CV V
C
CV CV CVE E VE VE VE CE E CVC VCV VCV VE C E CV
C
E E
E C E C CVE VE V VE V E V CVE E VCV CVC CVE CVE
E
CV C C C C C CE CV C VC CVE CVE V E
E E
CV E V EVC CV CV
VE VE CV C E E E E VE
E C CV C
E
E
V C VC
C
E E
CV E
CV CV E VE VE VE VE CVC CVEV VE C VE C E
CV CV CVE CVE CVE V VC E E C E
E
EC EC E
C
V
C E V CV CVE E C VE C V V
E
C C
V
C
VE VE VE CE E CE E CVC VCV VE C E C E
E E
V
C V C C C E E
CV VE V CV CVE EVE E CV CVE VE
CV
CE
E C VC VCV E V E C
E C E C VE VE V EV E C C
C
CV
E
C
E CV
VE VE VE CV C CVC EVE VE C VE
E
CV VCV E VE EVEV CV V
E C C EC
CV
VE C
E C E C E CV VE V E C E C E
E
VE
VE VE CVC CVE CVE VE
E
CV CVE E VE CV CV
CV
E
EC C E E
VE VE CV
E
CV
E

22

QRadar QVM

!!

CV
E
CV CV
E
E
CV CV CV
E EC
E
CV CV CV
VE
E E
E
CV CV ICVE CVE
CV
E na C
C
E E
C c
CV CV CVE VE tiVE VE C
E
v
E
CV CV eCVE VE
CV CV CV
E
C CV CV
E E EC
E
CV CV CV CVE VE VE E C E C
E
CV CV V
E
VE
E
C
C
CV CV CVE VE VE E C E C E CV CV
E
E
E
CV CV CVE VE VE E
CV CV CVE
Pa E C E C C CV CVE CVE CVE
E
E
CV
tcE VE VE VE E C C CV CVE
CV CV CV
hC C CV CV VE VE E
E
E E
ed
CV CV CV CVE VE VE E C E C CV CV CVE
C
E
C
E EC
VE E
E
CV CV
CV V CVE VE VE VE
CV CV
E
C C
E EC
E
E
CV CVE CVE VE VE E C
CV CV CV CVE VE
E
CV CV CVE VE
C
E
E
Cr E CVE CVE CVE CVE CVE CVE C E CVE CV CVE
CV
iE iC C CV CV CV VE VE l E C E C
B
tc V
E E
VEl E
E
a
C Coc V V
CV CV CVE CVE VE VE keE C E
CV
E
E
E
C C CV d VE
CV CV CVE CVE VE VE E C
E
C
V
EA
C
CV CV CVE CVE VE VE C E
t ri E
CV
Es
CV CV CVE CVE E VE
kE E
!
C C
CV CV CVE VE VE
E
E
CV CV
CV CV
E
E
Ex E CV E CV
CV
pEo E C E
l Ci V
VE E
ted
CV
!E

Yo
ur
V

uln
e

rab
ilit

ies

© 2013 IBM Corporation
IBM Security Systems

QVM enables customers to interpret ‘sea’ of vulnerabilities
Inactive: QFlow
Collector data helps
QRadar Vulnerability
Manager sense
application activity
Patched: IBM
Endpoint Manager
helps QVM
understand which
vulnerabilities will be
patched
Critical: Vulnerability
knowledge base,
remediation flow and
QRM policies inform
QVM about business
critical vulnerabilities
23

CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE
CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE
CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE
CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE
CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE
CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE
CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE
CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE
CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE
CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE
CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE
CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE
CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE
CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE
CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE
CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE

Inactive

Blocked

Patched

Critcal

At Risk!

Blocked: QRadar
Risk Manager helps
QVM understand
which vulnerabilities
are blocked by
firewalls and IPSs

Exploited!

At Risk: X-Force Threat and SIEM
security incident data, coupled with
QFlow network traffic visibility, help
QVM see assets communicating with
potential threats

Exploited: SIEM
correlation and IPS
data help QVM
reveal which
vulnerabilities have
been exploited

© 2013 IBM Corporation
IBM Security Systems

QRadar Vulnerability Manager offering structure
 Licensed based on number of Assets
scanned
 Base Vulnerability Manager capability
– QVM vulnerability scans up to 255 assets
– Unlimited QVM discovery scans
– Hosted scanner for DMZ scanning
– Ability to apply QVM functionality to all 3rd
party scanner data integrated with QRadar
– Deploy QVM Scanner on any managed
host

AppScan

– Deploy unlimited standalone software or
Virtual Scanners

 Simple capacity increases

24

IBM
Endpoint
Manager

© 2013 IBM Corporation
IBM Security Systems

Agenda

 Application Security
 Vulnerability Management
 New Generation Network Security

25

© 2013 IBM Corporation
IBM Security Systems

The Evolving Challenges of Network Security

1

Complexity of
Complexity of
Attacks
Attacks

2

Complexity of
Complexity of
Users
Users

• Advanced Persistent Threats

• Blending work/personal use

• 0-Day Vulnerabilities

• Broad information sharing

• Targeted Phishing

• Poor security vigilance

• Stealth Botnets

• Targeted by social engineering

• Designer Malware

26

3

Complexity of
Complexity of
Technology
Technology

• Point solutions creating
“Security Sprawl”
• Bring Your Own Device
• Evolving networking and
connectivity standards
• Rapid growth of web
applications

© 2013 IBM Corporation
IBM Security Systems

Introducing IBM Security Network Protection XGS
The Next Generation of IBM intrusion prevention solutions

ADVANCED
THREAT PROTECTION

SEAMLESS DEPLOYMENT &
INTEGRATION

Proven protection from
sophisticated and
constantly evolving
threats, powered by
X-Force®

27

COMPREHENSIVE
VISIBILITY & CONTROL

Helps discover and block
existing infections and
rogue applications while
enforcing access policies

Adaptive deployment and
superior integration with
the full line of IBM
security solutions

© 2013 IBM Corporation
IBM Security Systems

Advanced Threat Protection
The XGS 5100 helps protect against a full spectrum of targeted attacks,
even in SSL-encrypted connections

Infrastructure
System-level
Attacks

Service-level
Attacks

Users
Web Application
Attacks

Spear
Phishing
Client-side
Application
Protection

Malicious
Attachments

Web/Social
Media Risks

X
X
X
X

X
X












Extensible, Ahead-of-the-Threat Protection
backed by the power of IBM X-Force® to help
protect against mutating threats

28

© 2013 IBM Corporation
IBM Security Systems

Comprehensive Visibility & Control
Context-aware access control policies block
pre-existing infections, rogue applications, and policy violations

Complete Identity Awareness
associates valuable users and
groups with their network activity,
application usage and
application actions

Access Control Policies block
pre-existing compromises and
rogue applications as well as
enforce corporate usage policies

400+

2,000+

20 Billion+

Protocols and File Formats Analyzed

Applications and Actions Identified

Deep Packet Inspection fully
classifies network traffic,
regardless of address, port ,
protocol, application, application
action or security event

30

URLs classified in 70 Categories
© 2013 IBM Corporation
IBM Security Systems

Seamless Deployment and Integration
Quick initial deployment and immediate integration points with other security
technologies such as QRadar
Adaptable
Deployment

Advanced QRadar
Integration

• Seven varieties of network
interface modules

• Helps mitigate known
and unknown attacks

• Flexible performance
licensing

• Detect “low and slow”
and advanced persistent
threats

• Built-in, programmable
network bypass
• Integrated SSL inspection

32

• Analysis and correlation
across both IBM and
non-IBM products

Breadth and Depth of
Portfolio

• Protection of people, data,
applications and
infrastructure
• Advanced cross-product
research & development
• Solutions and services for
practically every security
need
© 2013 IBM Corporation
IBM Security Systems

New XGS Product Line

33

© 2013 IBM Corporation
IBM Security Systems

IBM Security Network Protection (XGS)

The Next Generation of IBM’s legendary network security solutions

Top 5 Reasons to Upgrade to or Purchase an XGS
Appliance
1.Visibility and Control over Web and non-Web applications and use
2.Ability to secure encrypted traffic without separate hardware (SSL)
3.Wide performance range with a simple license (600Mbps - 5Gbps)
4.Integrated bypass and flexible network connections (1GbE/10GbE)
5.Tight integration with QRadar including ability to send flow data

34

© 2013 IBM Corporation
IBM Security Systems

ibm.com/security
© Copyright IBM Corporation 2012. All rights reserved. The information contained in these materials is provided for informational purposes
only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use
of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any
warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement
governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in
all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole
discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any
way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United
© 2013 IBM Corporation
35 States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

More Related Content

Viewers also liked

Software Security Initiative And Capability Maturity Models
Software Security Initiative And Capability Maturity ModelsSoftware Security Initiative And Capability Maturity Models
Software Security Initiative And Capability Maturity Models
Marco Morana
 
Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1
Marco Morana
 
UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1
Bryan Cline, Ph.D.
 
NG BB 49 Risk Assessment
NG BB 49 Risk AssessmentNG BB 49 Risk Assessment
NG BB 49 Risk Assessment
Leanleaders.org
 

Viewers also liked (20)

SDLC Transformation-Point of View
SDLC Transformation-Point of ViewSDLC Transformation-Point of View
SDLC Transformation-Point of View
 
BSIMM and Security Initiative Improvement @OWASPNoVA 02/06/2014
BSIMM and Security Initiative Improvement @OWASPNoVA 02/06/2014BSIMM and Security Initiative Improvement @OWASPNoVA 02/06/2014
BSIMM and Security Initiative Improvement @OWASPNoVA 02/06/2014
 
Securing your web apps before they hurt the organization
Securing your web apps before they hurt the organizationSecuring your web apps before they hurt the organization
Securing your web apps before they hurt the organization
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
 
Software Security Initiative And Capability Maturity Models
Software Security Initiative And Capability Maturity ModelsSoftware Security Initiative And Capability Maturity Models
Software Security Initiative And Capability Maturity Models
 
Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1
 
Washington Mutual Bank's Collapse Under An Audit Perspective
 Washington Mutual Bank's  Collapse Under An Audit Perspective Washington Mutual Bank's  Collapse Under An Audit Perspective
Washington Mutual Bank's Collapse Under An Audit Perspective
 
UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1
 
Lan & Wan
Lan & WanLan & Wan
Lan & Wan
 
KSA Business Intelligence Qualifications
KSA Business Intelligence QualificationsKSA Business Intelligence Qualifications
KSA Business Intelligence Qualifications
 
Software Security Initiatives
Software Security InitiativesSoftware Security Initiatives
Software Security Initiatives
 
Test Process Maturity Measurement and Related Measurements
Test Process Maturity Measurement and Related MeasurementsTest Process Maturity Measurement and Related Measurements
Test Process Maturity Measurement and Related Measurements
 
Ensure Software Security already during development
Ensure Software Security already during developmentEnsure Software Security already during development
Ensure Software Security already during development
 
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security StrategyDSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
 
Application of Quality Risk Management in Commissioning & Qualifcation
Application of Quality Risk Management in Commissioning & QualifcationApplication of Quality Risk Management in Commissioning & Qualifcation
Application of Quality Risk Management in Commissioning & Qualifcation
 
CSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionCSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps session
 
Third Party Risk Due Diligence - Feb 2012
Third Party Risk Due Diligence - Feb 2012Third Party Risk Due Diligence - Feb 2012
Third Party Risk Due Diligence - Feb 2012
 
Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...
Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...
Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...
 
NG BB 49 Risk Assessment
NG BB 49 Risk AssessmentNG BB 49 Risk Assessment
NG BB 49 Risk Assessment
 
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLCDevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
 

Similar to DSS ITSEC 2013 Conference 07.11.2013 - Security in High Risk Environment

Introduction Sebyde BV | Security Testing | Security Awareness | Secure Devel...
Introduction Sebyde BV | Security Testing | Security Awareness | Secure Devel...Introduction Sebyde BV | Security Testing | Security Awareness | Secure Devel...
Introduction Sebyde BV | Security Testing | Security Awareness | Secure Devel...
Derk Yntema
 
Velocity NY 2016 - Devops: Who Does What?
Velocity NY 2016 - Devops: Who Does What?Velocity NY 2016 - Devops: Who Does What?
Velocity NY 2016 - Devops: Who Does What?
cornelia davis
 

Similar to DSS ITSEC 2013 Conference 07.11.2013 - Security in High Risk Environment (20)

Five critical conditions to maximizing security intelligence investments
Five critical conditions to maximizing security intelligence investmentsFive critical conditions to maximizing security intelligence investments
Five critical conditions to maximizing security intelligence investments
 
CRA - overview of vulnerability handling
CRA - overview of vulnerability handlingCRA - overview of vulnerability handling
CRA - overview of vulnerability handling
 
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsHow To [relatively] Secure your Web Applications
How To [relatively] Secure your Web Applications
 
Humans and Data Don’t Mix: Best Practices to Secure Your Cloud
Humans and Data Don’t Mix: Best Practices to Secure Your CloudHumans and Data Don’t Mix: Best Practices to Secure Your Cloud
Humans and Data Don’t Mix: Best Practices to Secure Your Cloud
 
Introduction Sebyde BV | Security Testing | Security Awareness | Secure Devel...
Introduction Sebyde BV | Security Testing | Security Awareness | Secure Devel...Introduction Sebyde BV | Security Testing | Security Awareness | Secure Devel...
Introduction Sebyde BV | Security Testing | Security Awareness | Secure Devel...
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
 
BitSensor Webwinkel Vakdagen
BitSensor Webwinkel VakdagenBitSensor Webwinkel Vakdagen
BitSensor Webwinkel Vakdagen
 
Build Automate and Test Strategies - BATMAN
Build Automate and Test Strategies - BATMAN Build Automate and Test Strategies - BATMAN
Build Automate and Test Strategies - BATMAN
 
Velocity NY 2016 - Devops: Who Does What?
Velocity NY 2016 - Devops: Who Does What?Velocity NY 2016 - Devops: Who Does What?
Velocity NY 2016 - Devops: Who Does What?
 
Continuous security
Continuous securityContinuous security
Continuous security
 
Widespread security flaws in web application development 2015
Widespread security flaws in web  application development 2015Widespread security flaws in web  application development 2015
Widespread security flaws in web application development 2015
 
Settle the Score
Settle the ScoreSettle the Score
Settle the Score
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
 
Expert Web App Pen Testing - Aardwolf Security.pptx
Expert Web App Pen Testing - Aardwolf Security.pptxExpert Web App Pen Testing - Aardwolf Security.pptx
Expert Web App Pen Testing - Aardwolf Security.pptx
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
 
Black Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open SourceBlack Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open Source
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security
 
Splunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat DefenseSplunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat Defense
 

More from Andris Soroka

More from Andris Soroka (20)

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

DSS ITSEC 2013 Conference 07.11.2013 - Security in High Risk Environment

  • 1. IBM Security Systems Security in High Risk Environment Vulnerabilities, Vulnerabilities and Vulnerabilities Jan Bojtos Security Channel Manager Central & Eastern Europe IBM Security Systems jan.bojtos@sk.ibm.com © 2013 IBM Corporation 1 © 2013 IBM Corporation
  • 2. IBM Security Systems You know? You can do this online now. 2 © 2013 IBM Corporation
  • 3. IBM Security Systems Agenda  Application Security  Vulnerability Management  New Generation Network Security 3 © 2013 IBM Corporation
  • 4. IBM Security Systems Agenda  Application Security  Vulnerability Management  New Generation Network Security 4 © 2013 IBM Corporation
  • 5. IBM Security Systems Security Incident s in the first half of 5 © 2013 IBM Corporation
  • 6. IBM Security Systems The Application Security landscape Web application vulnerabilities dominate the enterprise threat landscape Applications in Development  In-house development  Outsourced development Production Applications  Developed in house  Acquired  Off-the-shelf commercial apps • • 6 Web application vulnerabilities surged 14% from 2,921 vulnerabilities in 2011 to 3,551 vulnerabilities in 2012 47% of all vulnerabilities that the IBM XForce documented in 2012 were considered web application vulnerabilities *IBM X-Force 2012 Trend & Risk Report  Vulnerabilities are spread through a wide variety of applications **IBM X-Force 2012 Trend & Risk Report © 2013 IBM Corporation
  • 7. Applications IBM Security Systems Challenge 1: Finding more vulnerabilities using advanced techniques Total Potential Security Issues Static Analysis - Analyze Source Code - Use during development - Uses Taint Analysis / Pattern Matching Dynamic Analysis - Analyze Live Web Application - Use during testing - Uses HTTP tampering Hybrid Analysis - Correlate Dynamic and Static results - Assists remediation by identification of line of code Run-Time Analysis - Combines Dynamic Analysis with run-time agent - More results, better accuracy 77 Client-Side Analysis !New !New - Analyze downloaded Javascript code which runs in client !New - Unique in the industry !New © 2013 IBM Corporation
  • 8. IBM Security Systems Challenge 2: Reducing Costs Through a Secure by Design Approach 80% of development costs 80% of development costs are spent identifying and are spent identifying and correcting defects!* correcting defects!* Average Cost of a Data Breach Average Cost of a Data Breach $7.2M** from law suits, loss of customer $7.2M** from law suits, loss of customer trust, damage to brand trust, damage to brand Find during Development Find during Build Find during QA/Test Find in Production $80/defect $240/defect $960/defect $7,600 / defect “As financially-motivated attackers have shifted their focus to applications, Web application security has become a top priority. However, “As financially-motivated attackers have shifted their focus to applications, Web application the responsibility for web application security cannot rest solely with information security. Enterprises should evaluate how to identify the responsibility for web application security cannot rest solely with information security. Enterprises should evaluate how to vulnerabilities in Web applications earlier in the development process as transparently as possible using web application security testing vulnerabilities products or services.” products or services.” Neil MacDonald, Gartner, 12-6-11 Neil MacDonald, Gartner, 12-6-11 8 * Source: National Institute of Standards and Technology ** Source: Ponemon Institute 2009-10 © 2013 IBM Corporation
  • 9. IBM Security Systems Challenge 3: Bridging the Security/Development gap Break down organizational silos  Security experts establish security testing policies  Development teams test early in the cycle Provide Management Visibility  Dashboard of application risk  Enable compliance with regulation-specific reporting  Treat vulnerabilities as development defects “… we wanted to go to a multiuser web-based solution “… we wanted to go to a multiuser web-based solution that enabled us to do concurrent scans and provide our that enabled us to do concurrent scans and provide our customers with a web-based portal for accessing and customers with a web-based portal for accessing and sharing information on identified issues.” sharing information on identified issues.” Alex Jalso, Asst Dir, Office of InfoSecurity, WVU Alex Jalso, Asst Dir, Office of InfoSecurity, WVU 9 Developer Architect Quality Professional Enables Collaboration Security Auditor © 2013 IBM Corporation
  • 10. IBM Security Systems Finding Vulnerabilities During Security Test Phase SDLC Coding % of Issue found by stage of SDLC 10 Build QA Security Production Most Issues are Most Issues are found by security found by security auditors prior to auditors prior to going live. going live. © 2013 IBM Corporation
  • 11. IBM Security Systems Maturity of Security Testing SDLC Coding % of Issue found by stage of SDLC 11 Build QA Security Production Desired Profile Desired Profile © 2013 IBM Corporation
  • 12. IBM Security Systems Organizations need to take a proactive approach to Application Security  Embed security testing early in the development lifecycle to support agile delivery demands  Bridge the gap between “Security” and “Development” through joint collaboration and visibility, enabling regulatory compliance  Integrate security testing into the development lifecycle, through interfaces to development tools A proactive team approach to Application Security AppScan Static Analysis Hybrid Analysis Dynamic Analysis Collaboration Governance Visibility Analyst Developer Quality Professional Architect Security Auditor 12 © 2013 IBM Corporation
  • 13. IBM Security Systems IBM Security Systems AppScan Suite – Comprehensive Application Vulnerability Management SECURITY REQUIREMENTS CODE BUILD QA AppScan Enterprise Security Requirements Definition Security requirements defined before design & implementation AppScan Source Build security testing into the IDE PRE-PROD PRODUCTION AppScan onDemand AppScan Standard Security & Automate Security Security / compliance Compliance testing incorporated / Compliance Testing, into testing & testing in the oversight, control, remediation Build Process policy, audits workflows AppScan Standard Outsourced testing for security audits & production site monitoring Application Security Best Practices – Secure Engineering Framework 13 13 Dynamic Analysis/Blackbox – Static Analysis/Whitebox - © 2013 IBM Corporation
  • 14. IBM Security Systems Agenda  Application Security  Vulnerability Management  New Generation Network Security 14 © 2013 IBM Corporation
  • 15. IBM Security Systems Vulnerability market trends 1 Escalating Escalating threat landscape threat landscape Vulnerabilities are increasing in volume and severity, while attackers are exploiting them quicker than ever before… and with greater sophistication 15 2 Evolving IT Evolving IT infrastructures infrastructures Rapid adoption of mobile and cloud – as well as the ever increasing speed and complexity of IT – make discovery and accuracy of new and existing risks a daunting task 3 Surpassing simple Surpassing simple compliance efforts compliance efforts Routine snapshots may satisfy the auditors, but hardly enough to understand what’s really going on within your IT environment © 2013 IBM Corporation
  • 16. IBM Security Systems Customer business problems Problems in current Vulnerability management deployments: !! Yo ur V Siloed system limitations !! rV uln rV uln era uln era bil itie era s bil itie s bil it ies Hidden risks remain Leaves unanswered questions 16 Yo u Data overload inhibitor !! Yo u CV E CV CV E E CV CV CV CV E E E CV CV CV CVE E CV CV E E E E C C C C CV E CV CV CV VE VE VE CVE C E C V E E CE C C C V V V CV CV CV VE VE E VE C E C E C E CV CV E E C C C C C CV VE VE VE E E E V VE VE E C C E CV CV CVE VE VE EVC C C C CV CV CVE CVE VE E V E C CV C VE E VE C CVE CV CCV CVE VE E VE CVC E C E CV CVE CVE CVE VE VE V C E E VEE C C CVCVCVE VE CVE E VE E C C C C C CV CV V V E E CV CV CV E E E E C C C C CVC CV C V VE VE VE VE C C CV E CE C C CC CV CV V V VE VE EVE E VE E C C E V C C C V E EE E C CV CV CVVE VE E VVE E C C C CV V CV VCV VE V VE VE VE C E C E CV CC E E E CE CCV C CV V C V V V E E CE E C CE C CV C V V E VE CV CV CVE E VE E VE E E VE E CE E CVCV V CV VCV VE VE E VE C E C E CV V C V C C CVV E C C C CC CV V V CCE VE V E E E CE E C C C C E E V E C E VE V E CV CV CVVE VE E VVE E E E CVECC CE C CVCV VE VE CVEVE VEVE E C E CV CC CV V V V V C E E CC E CC CV CVE V CVECE EVE E VE E C C C C CVC CVCV V VE E E E V CV CV V VE VVE CCE VEE C C C CE VC CV CV V V VE VE EVE E E E C CV C E CCE V C CV VV V V V CEVE E E E E C C C C C C C E CE C C V V E E VEV V E VVC C E EV E C C CC E CC C V CV CV CVVE VE E VVE E E E E EECCV E CV V CV VE V VCVEVE VEVE C E C E CV C V E E C V E C C CV V V V VE E CE E E E CCE C CVC C C E VE C V CV CV CCVECCVE VE E VVECE E E E CECCE V V V VE V VE VE EVEVEVEVE C E CV E CC C CC CV V V V E CE E C C C C V CV V VV E C E CE E C C C C C E VV C E V VV E CVE EE E CV CVV V V C V V V CV CV CVVECCEE VVE VE E CEEC E E V CV CV VE V CEE E E VE E E E C E CV C E CV CE V CVE E E E E CC V E E E CC CC C V V CV C CV CVE V VC CV V C V C CC CV CV CV CCVE VVE VVECVE E C EEC E E V CVE VCVE E EVE E VE E C E CV E C C VE E V CVE E E E E E C C C CVC CV V E E C CC V E E VV CV CV V V CV CV CV CV CVE CVVE VVECC EECVEE C E CCCVE CVE E E E VE EVE E C E C CV C E CC E E E E VV V E VV VV C E E C C CV C CV V V CV E CV CV CV CVE CVE VVE C EEC E C V E CEE CV CVECVE VE E VE E C E C E EC CV C CV V VEE E VE C C C V E E C V V E V CC VC C V V CV CV CVE CVE VE VVE C EECC EECCE E V V CCV VE VE EVE E C E C E EC V E C E C C CV CV V VE V E VVE VVE E E CEE C CVC CV E C V CE V VE VE VE C E C E C E C V CCV CCVE VE E VE E VE E CV E CV V CV CV CV VE VE VE VEE CEE C E CCV CV CVE E E C E C E CV VE E C E C CV CV CV CVVE VVE VEE E EC E C E C E CCV CCV CVE CVE VE VE E VE E VEE VE CV CV CV V V C C E C E C E C E CVE CV CCVE VE VE V VE VE VE E E C E CV CVE EC CV CV CVE CVE VE VE E C E C CV CV VE VE E E CV CV CVE EC EC VE VE CV E Creates security gaps • • • • • Has that been patched? Has or will it be exploited? Does my firewall block it? Does my IPS block it? Does it matter? © 2013 IBM Corporation
  • 17. IBM Security Systems Our solution: IBM Security QRadar Vulnerability Manager Solution Highlights  Unique VA solution integrated with Security Intelligence context/data New Log Manager SIEM Network Activity Monitor Risk Manager Vulnerability Manager  Providing unified view of all vulnerability information  Dramatically improving actionable information through rich context  Reducing total cost of ownership through product consolidation Security Intelligence is extending and transforming vulnerability management – just as it did with logs, events, flows and risk management. 17 © 2013 IBM Corporation
  • 18. IBM Security Systems IBM Security QRadar Vulnerability Manager key features  Contains an embedded, well proven, scalable, analyst recognised, PCI certified scanner  Detects 70,000+ vulnerabilities  Tracks National Vulnerability Database (CVE)  Present in all QRadar log and flow collectors and processors  Integrated external scanner  Complete vulnerability view supporting 3rd party vulnerability system data feeds  Supports exception and remediation processes of VM with seamlessly integrated reporting and dash boarding 18 Complete Vulnerability Context and Visibility Integrated vulnerability scanner Network discovery and asset information IBM Security Context 3rd Party vulnerability solutions AppScan Guardium Endpoint (BigFix) Network IPS X-Force e.g. Qualys Rapid7 Nessus nCircle McAfee © 2013 IBM Corporation
  • 19. IBM Security Systems Security Intelligence Integration  QVM scanners present in every QRadar appliance − ‘Switch’ on distributed scanning  Event triggered scanning − E.g. New asset seen  Rapid and dynamic scans using asset search based scans − Less time spent searching  Shared reporting and dashboard infrastructure, providing single view Scanning  External threat posture, exploit events, network usage, and security context seamlessly integrated 20 © 2013 IBM Corporation
  • 20. IBM Security Systems What’s a difference? Standard VM Y Yo our V Yo u ur r Vu ulne Vu r l lne nera abili t ie rab bil ilit ities s ies CV E CV CV CV E E C EC CV V E CV CV V CV CV E C E C E C E CV CV EC E CVE VE VE VE EC C E C CV CV C V E C VE E CVE VE E CVE CVC CVE VE VE C E C C CV CV V VC C C V V EV E CV CVC CVE CVE VE VE C E C E E E C E CV CV CVE EVC EVCV CV CVE VE VE CV C VC CVE CVE E E E E C C E CVE CVC EV C E E CV CV CV CV CVC EVC EVCV EVCVC CVE CVE VE VE C C E E C E CE E EVCV VCV VE V VE VC E CV E CV CV CV V C E VE C C E C CV EC E C EV CV CV E E C VC E V E C E C EC E E E CV E CVE CV E CVC VEVC CVC VC VE C E VE E C E V CV CV E V E VE EVE EVE CVCVE CVE VE VE VE C E C EC CVC CV EVC CVC C E CE C CVC CVE EV EVE EVE EVE CV CV VE VE CV CV VE VE E EV VCV CV E CV CV VE CV E CV CVC CVE E E C C C E C E C C CV E C CVE E E V E EVC CVE EV V VCV CV E CV E V E CE C CVE CVC E V V E E C C CV CV E VE CVC E VE VE C CVE CVE VE CV VCV E C E CV E CV E EV E CV CV C CVE CVE VCV VC C E C E CV V CVE E EC E C C E V CV E CVE E EV E C EC E CVC CVE E E C C VE CV C VC E CV CV E E CV C E E E EVC EVE C V C C CV VE C E VE E CVE VC VE C EE E CVC CV C CV C V E C C E V E V V VC V CVC CV E VE VE E C E CV CC E V E VE E VE E VE CVE E CE E E CV VCV VE C VE CV CV E C VE CV C CV E E CV CV V C V C E VE CV CV EC VE CVC CVC CVE CVE E E VE E E C E C CV CV E E EV CV EVC CVE E VE E VE VE E CVC CVEV VE VE C E C CV CV CV VE E CV C E C E C C CV E CE C CV C EVC V C VE VE E V CV E VC C V CV E VE VE E C V E C E CV CV E V E VE E VE VE CV C CE E E C EVCV VCVC E C E CV EC EE CV CV C CVE CVE E V V CV VEVE E C E CV CV C E EE C E E C E EVE E VE E CV V C CV CV CVE E VE VE VE CE E CVC VCV VCV VE C E CV C E E E C E C CVE VE V VE V E V CVE E VCV CVC CVE CVE E CV C C C C C CE CV C VC CVE CVE V E E E CV E V EVC CV CV VE VE CV C E E E E VE E C CV C E E V C VC C E E CV E CV CV E VE VE VE VE CVC CVEV VE C VE C E CV CV CVE CVE CVE V VC E E C E E EC EC E C V C E V CV CVE E C VE C V V E C C V C VE VE VE CE E CE E CVC VCV VE C E C E E E V C V C C C E E CV VE V CV CVE EVE E CV CVE VE CV CE E C VC VCV E V E C E C E C VE VE V EV E C C C CV E C E CV VE VE VE CV C CVC EVE VE C VE E CV VCV E VE EVEV CV V E C C EC CV VE C E C E C E CV VE V E C E C E E VE VE VE CVC CVE CVE VE E CV CVE E VE CV CV CV E EC C E E VE VE CV E CV E 22 QRadar QVM !! CV E CV CV E E CV CV CV E EC E CV CV CV VE E E E CV CV ICVE CVE CV E na C C E E C c CV CV CVE VE tiVE VE C E v E CV CV eCVE VE CV CV CV E C CV CV E E EC E CV CV CV CVE VE VE E C E C E CV CV V E VE E C C CV CV CVE VE VE E C E C E CV CV E E E CV CV CVE VE VE E CV CV CVE Pa E C E C C CV CVE CVE CVE E E CV tcE VE VE VE E C C CV CVE CV CV CV hC C CV CV VE VE E E E E ed CV CV CV CVE VE VE E C E C CV CV CVE C E C E EC VE E E CV CV CV V CVE VE VE VE CV CV E C C E EC E E CV CVE CVE VE VE E C CV CV CV CVE VE E CV CV CVE VE C E E Cr E CVE CVE CVE CVE CVE CVE C E CVE CV CVE CV iE iC C CV CV CV VE VE l E C E C B tc V E E VEl E E a C Coc V V CV CV CVE CVE VE VE keE C E CV E E E C C CV d VE CV CV CVE CVE VE VE E C E C V EA C CV CV CVE CVE VE VE C E t ri E CV Es CV CV CVE CVE E VE kE E ! C C CV CV CVE VE VE E E CV CV CV CV E E Ex E CV E CV CV pEo E C E l Ci V VE E ted CV !E Yo ur V uln e rab ilit ies © 2013 IBM Corporation
  • 21. IBM Security Systems QVM enables customers to interpret ‘sea’ of vulnerabilities Inactive: QFlow Collector data helps QRadar Vulnerability Manager sense application activity Patched: IBM Endpoint Manager helps QVM understand which vulnerabilities will be patched Critical: Vulnerability knowledge base, remediation flow and QRM policies inform QVM about business critical vulnerabilities 23 CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE Inactive Blocked Patched Critcal At Risk! Blocked: QRadar Risk Manager helps QVM understand which vulnerabilities are blocked by firewalls and IPSs Exploited! At Risk: X-Force Threat and SIEM security incident data, coupled with QFlow network traffic visibility, help QVM see assets communicating with potential threats Exploited: SIEM correlation and IPS data help QVM reveal which vulnerabilities have been exploited © 2013 IBM Corporation
  • 22. IBM Security Systems QRadar Vulnerability Manager offering structure  Licensed based on number of Assets scanned  Base Vulnerability Manager capability – QVM vulnerability scans up to 255 assets – Unlimited QVM discovery scans – Hosted scanner for DMZ scanning – Ability to apply QVM functionality to all 3rd party scanner data integrated with QRadar – Deploy QVM Scanner on any managed host AppScan – Deploy unlimited standalone software or Virtual Scanners  Simple capacity increases 24 IBM Endpoint Manager © 2013 IBM Corporation
  • 23. IBM Security Systems Agenda  Application Security  Vulnerability Management  New Generation Network Security 25 © 2013 IBM Corporation
  • 24. IBM Security Systems The Evolving Challenges of Network Security 1 Complexity of Complexity of Attacks Attacks 2 Complexity of Complexity of Users Users • Advanced Persistent Threats • Blending work/personal use • 0-Day Vulnerabilities • Broad information sharing • Targeted Phishing • Poor security vigilance • Stealth Botnets • Targeted by social engineering • Designer Malware 26 3 Complexity of Complexity of Technology Technology • Point solutions creating “Security Sprawl” • Bring Your Own Device • Evolving networking and connectivity standards • Rapid growth of web applications © 2013 IBM Corporation
  • 25. IBM Security Systems Introducing IBM Security Network Protection XGS The Next Generation of IBM intrusion prevention solutions ADVANCED THREAT PROTECTION SEAMLESS DEPLOYMENT & INTEGRATION Proven protection from sophisticated and constantly evolving threats, powered by X-Force® 27 COMPREHENSIVE VISIBILITY & CONTROL Helps discover and block existing infections and rogue applications while enforcing access policies Adaptive deployment and superior integration with the full line of IBM security solutions © 2013 IBM Corporation
  • 26. IBM Security Systems Advanced Threat Protection The XGS 5100 helps protect against a full spectrum of targeted attacks, even in SSL-encrypted connections Infrastructure System-level Attacks Service-level Attacks Users Web Application Attacks Spear Phishing Client-side Application Protection Malicious Attachments Web/Social Media Risks X X X X X X         Extensible, Ahead-of-the-Threat Protection backed by the power of IBM X-Force® to help protect against mutating threats 28 © 2013 IBM Corporation
  • 27. IBM Security Systems Comprehensive Visibility & Control Context-aware access control policies block pre-existing infections, rogue applications, and policy violations Complete Identity Awareness associates valuable users and groups with their network activity, application usage and application actions Access Control Policies block pre-existing compromises and rogue applications as well as enforce corporate usage policies 400+ 2,000+ 20 Billion+ Protocols and File Formats Analyzed Applications and Actions Identified Deep Packet Inspection fully classifies network traffic, regardless of address, port , protocol, application, application action or security event 30 URLs classified in 70 Categories © 2013 IBM Corporation
  • 28. IBM Security Systems Seamless Deployment and Integration Quick initial deployment and immediate integration points with other security technologies such as QRadar Adaptable Deployment Advanced QRadar Integration • Seven varieties of network interface modules • Helps mitigate known and unknown attacks • Flexible performance licensing • Detect “low and slow” and advanced persistent threats • Built-in, programmable network bypass • Integrated SSL inspection 32 • Analysis and correlation across both IBM and non-IBM products Breadth and Depth of Portfolio • Protection of people, data, applications and infrastructure • Advanced cross-product research & development • Solutions and services for practically every security need © 2013 IBM Corporation
  • 29. IBM Security Systems New XGS Product Line 33 © 2013 IBM Corporation
  • 30. IBM Security Systems IBM Security Network Protection (XGS) The Next Generation of IBM’s legendary network security solutions Top 5 Reasons to Upgrade to or Purchase an XGS Appliance 1.Visibility and Control over Web and non-Web applications and use 2.Ability to secure encrypted traffic without separate hardware (SSL) 3.Wide performance range with a simple license (600Mbps - 5Gbps) 4.Integrated bypass and flexible network connections (1GbE/10GbE) 5.Tight integration with QRadar including ability to send flow data 34 © 2013 IBM Corporation
  • 31. IBM Security Systems ibm.com/security © Copyright IBM Corporation 2012. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United © 2013 IBM Corporation 35 States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Editor's Notes

  1. This is a great depiction of the paradigm change we are talking about…..
  2. 2012 was a record year for reported data breaches and security incidents, with a 40 percent increase in total volume over 2011.1 In the first half of 2013, security incidents have already surpassed the total number reported in 2011 and are on track to surpass 2012. This year kicked off with a number of high profile sophisticated attacks on major websites, media, and tech companies
  3. The IBM X-Force team is a group that researches the threat landscape and publishes a bi-annual report. This report is publicly available, and is recommended reading for anyone interested in security vulnerabilities. Application vulnerabilities are the largest category of vulnerabilities identified by the X-Force team, and they continue to grow at an alarming rate. It is important to note that application vulnerabilities may be present in both applications you develop and applications you buy (i.e. in-house, out-sourced, or off-the-shelf). Furthermore, Verizon 2010 Data Breach Investigations Report shows that 92% of compromised data records are obtained through web applications, indicating that application vulnerabilities are the attack vector of choice for hackers. The X-Force report is available at http://www-935.ibm.com/services/us/iss/xforce/trendreports/
  4. No single automated analysis technique can find all possible vulnerabilities. Each technique has its own strengths and blind spots, which is why a single point tool can leave you exposed. To find the most vulnerabilities, you should employ all the analysis techniques available today. IBM has combined a leading Static Analysis solution (developed by Ounce Labs) with a leading Dynamic Analysis solution (developed by Watchfire). IBM has combined these two established technologies, and has since added Hybrid analysis to combine and correlate their results. In 2011, IBM added new techniques for client-side analysis (aka Javascript Analyzer) and most recently run-time analysis (aka Glassbox). Static Analysis examines the source code for potential vulnerabilities. Static analysis can be used earlier in the development cycle, because you don’t need a running application. Static analysis can also produce a large volume of results, which can overwhelm development teams. Also, developers may question whether an identified vulnerability can be exploited (i.e. the “issue” could be mitigated somewhere else in the code, so it may not manifest itself as a true vulnerability). Dynamic Analysis tests a running application, by probing it in similar ways to what a hacker would use. With Dynamic Analysis results, it is easier to connect the vulnerability and a potential exploit. Dynamic Analysis is reliant on an ability to automatically traverse an application and test possible inputs. With Dynamic Analysis, the auditor is always asking “did I get proper test coverage”. Because Dynamic Analysis requires a running application, it typically cannot be used until an application is ready for functional testing (i.e. later in the development cycle). Hybrid Analysis brings together Dynamic and Static to correlate and verify the results. Issues identified using dynamic analysis can be traced to the offending line of code. Issues identified in static analysis can be validated with an external test. Client-side Analysis (aka JSA) analyzes code which is downloaded to the client. As more functionality is performed client-side, the prospect of client-side vulnerabilities and exploits increases. This capability, new in 2011, is unique in the market. Run-time Analysis (aka Glassbox) places a run-time agent on the application machine, and analyzes the application as it is being tested. This combines the aspects of Dynamic and Static analysis at run-time, finding more vulnerabilities with greater accuracy. Glassbox analysis was introduced in the most recent release of AppScan, at the end of 2011.
  5. Organizations cannot afford the risk of a data breach. In 2009-2010, the average cost of a data breach was calculated as greater than $7.2M per breach. Organizations that we have talked to calculate the potential cost of a data breach to be in the millions of dollars, not counting the potential loss of customer trust or damage to the company’s brand. Once you decide that you cannot afford a data breach, your objective must be to avoid a breach at the lowest possible cost. Development teams have known for a long time that the most cost-effective way to fix defects is to fix them as early as possible in the development cycle. It is well-documented that fixing defects found late can be orders of magnitude more expensive than fixing them during development. The traditional time for a security audit is just before an application goes into production. As you can see from this chart, there is a very high cost of fixing a defect which is found at this time. The cost is so high, in fact, that many organizations will accept the risk of a breach and queue up the security fix for their next release cycle. This decision is usually driven by the business imperative to get an application into production to meet an external deadline. Clearly a more prudent and cost-effective approach is to find the defect in development, at build time, or in QA. To make this happen, you need tools which the development and QA team can use – which do not require you to be a security expert. Due to the multiple technologies employed, AppScan can be used earlier in the development cycle. Thanks to AppScan’s developer-friendly reporting, AppScan produces actionable information for development teams. AppScan also supports integration with the development tools, causing the least disruption to the current development processes. (Data source for defect costs: Source: GBS Industry standard study Defect cost derived in assuming it takes 8 hrs to find, fix and repair a defect when found in code and unit test. Defect FFR cost for other phases calculated by using the multiplier on a blended rate of $80/hr.)
  6. In many organizations, security and development teams do not communicate well. This is understandable, because there are very few tools and processes to facilitate that communication. Using AppScan Enterprise, customers can have a single repository of application security information, which ties in to the other development tools in use. Security analysts and auditors can establish security testing policies and templates to be used by the development team. Security Auditors can submit identified vulnerabilities as software defects. Developers can run tests early in the life cycle, and obtain valuable remediation advice and assistance. Managers can maintain oversight of the process. This visibility can be a key component of a compliance program as well.
  7. To summarize, a proactive approach is required for Application Security. Organizations should not ignore Application vulnerabilities – the cost of a breach is too high and the risk is too great. The question becomes “what is the most cost-effective way of reducing the risk of a data breach?” This chart summarizes the key steps that an organization can take: Test early in the cycle. As seen earlier in this presentation, this reduces the cost of fixing by orders of magnitude. Bridge the gap between “Security” and “Development”, by providing an application security toolset that is intended to support both of their needs, and facilitating communication and common visibility. Use automation to integrate with application development tools, improving the flow of data and reducing disruption of the current development process.
  8. Threat Landscape: Vulnerabilities increasing by rate of 12 / day Automated exploit kits appear within weeks of new disclosures Persistent and stealthy attacks continuously search chosen targets for weaknesses IT Infrastructure: Mobile device integration multiplies complexity of endpoints Evolving networking and connectivity standards Rapid growth of Web applications Compliance isn’t enough Routine tactics only appease auditors Protecting business assets requires continuous monitoring Complete spectrum of tools required to safe-guard networks These dynamics contribute to a whack-a-mole scenario where it’s impossible to totally secure the network.
  9. a. Data overload: ‘Ocean’ of issues overwhelming patching and remediation processes. You should have the ability to identify and prioritize vulnerabilities based on context (link to intelligent) b. Siloed system limitations: Multiple systems housing vulnerabilities for network, application, databases create huge inefficiencies in both time and effort. You should have the ability to integrate vulnerability management processes and data into a single platform (link to integrated) c. Unknown risks remain: Dated information and missing coverage allows security weaknesses to remain hidden. You should have the ability to discover new assets and scale to new environments with ease (link to automated)
  10. Integration Shares QRadar deployed infrastructure, asset and network models, data repositories, reports, dashboards, APIs, and workflow Incorporates data from IPS, Firewalls, X-Force, flow monitors, web application scanners, endpoint systems, and more Automation Quickly and dynamically scans discovered network assets Alerts users to out-of-policy or high risk vulnerabilities Updates include new vulnerability signatures Provides complete audit trail from detection through remediation Intelligence Aggregates vulnerability data from multiple scanners and database feeds for superior visibility Reduces data overload by applying network security and usage context Excludes remediated issues from future reports
  11. We partnered with an established vendor to revamp and integrate a new scanning engine into QRadar. Between us and our partner, we’ve been monitoring and managing vulnerabilities longer than anyone else in the industry (considering IBM also has an older ISS scanner engine).” Revamped the architecture of our product Totally integrated into QRadar Used well established PCI-certified engine Partnered to achieve
  12. QRadar Vulnerability Manager's primary competitors are standalone VM solutions, including Qualys, Nessus, Rapid 7 and nCircle. The primary differentiation between QVM and these solutions comes from QVM's integration with QRadar, specifically; .*QVM Is the only vulnerability management solution that offers complete network context * Network context means customers can reduce the number of vulnerabilities they need to focus on.. QVM can apply network usage context to vulnerability management. Identifying what vulnerable assets are communicating with internal and external threat sources,* Standalone vulnerability solutions cannot do this, as they have no network traffic visibility * QVM can apply QFLow layer 7 traffic to vulnerabilities highlighting what vulnerability have (or have no) associated network traffic indicating those vulnerable applications are not active* Standalone vulnerability solutions cannot do this, as they have no network traffic visibility * QVM can understand what vulnerabilities are exposed to threat sources in the network due to firewall and IPS configuration* nCircle has some limited capability in this area, but the other leading vulbnerability tools do not *Standalone VA solutions require additional integrations with tools such as Redseal, Skybox and AlgoSec to do this, adding cost, integration headaches and duplication of work. 2. QVM can provide complete visibliity of web application, database, end point and network infrastructure from multiple VA solutions Standalone VM solution will offer web application, database scanning, end poitnt scanning, but there are not as comprehensive as specific point solutions in this space which is why many customers also have point solutiosn to address these areas. * QVM is the only VA solution on the market that can do this * 3.. QVM can provide internal and external scanning without any additional infrastructur
  13. Threat Landscape: Vulnerabilities increasing by rate of 12 / day Automated exploit kits appear within weeks of new disclosures Persistent and stealthy attacks continuously search chosen targets for weaknesses IT Infrastructure: Mobile device integration multiplies complexity of endpoints Evolving networking and connectivity standards Rapid growth of Web applications Compliance isn’t enough Routine tactics only appease auditors Protecting business assets requires continuous monitoring Complete spectrum of tools required to safe-guard networks These dynamics contribute to a whack-a-mole scenario where it’s impossible to totally secure the network.
  14. The XGS 5100 is a follow-on release from our initial launch of this product last year Positioning the solution around three main pillars - Threat protection - Network control - Integration We’ll get into each of these pillars a bit more in a minute…
  15. Getting back into the three pillars of XGS that I laid out previously, let’s talk about the protection capabilities Having protection capabilities is table stakes for anyone who claims to be an IPS The type of protection offered is very important as well This is something we’ve been known for over many years, comes from ISS, who helped invent this whole market back in the late 1990s Infrastructure protection - Still very key, but definition is blurry - Infrastructure attacks – OS/service up about 4% YoY; webapp attacks up 14% YoY – protection is key - Our solution offers protection against all of these different types of attacks User protection - Common addage these days in security – “Why hack the infrastructure when you can hack the users?” - We have seen an 8x increase since 2010 in the number of spear phishing attacks - With this in mind, the XGS adds a new layer of user protection capabilities to help prevent user-based attacks
  16. The second pillar of our positioning involves comprehensive network visibiltiy and control This involves: identifying applications on the network, associating them with their corresponding users, and controlling actions Security use cases for this: botnet C&C, phishing links, anonymous proxies, etc. Non-security use cases as well, like blocking Skype, posting access to Facebook, controlling access to Pandora
  17. Finally, moving to our third pillar, integration is something that we do particularly well compared to the rest of the industry. IPS never stands alone, must play well with others This starts with adaptable deployment - Network interfaces to match what’s there - Flexible licensing so you don’t pay for throughput you’re not yet using - Integrated bypass and SSL in a 1U appliance so customers save on both power and rack space Integration with Qradar - not just for events, but also for flow data - gives customers more complete view of network, saves on flow collectors Depth of portfolio is also key, especially for the types of clients that IBM services