SlideShare a Scribd company logo
1 of 32
Download to read offline
Título presentación
Soluciones de Seguridad
Nicolás Pérez de Arenaza
Nombre y Apellido
Agenda



    •   Algunas definiciones
    •   IBM Security Framework & Portfolio
    •   Personas - Enterprise Single Sign On.
    •   Network – VSAFE
    •   Storage – FastBack




2                                               © 2012 IBM Corporation
Activos Digitales



    • Activo es un bien tangible o intangible que tiene una
      persona o empresa, mediante el cual se obtienen
      beneficios económicos.

    • En todas las organizaciones, en mayor o medida de
      acuerdo a su actividad, los datos son un activo (activo
      digital).

    • La Seguridad Informática y la Seguridad de la
      Información tienen la misión de proteger este tipo de
      activos intangibles, a la vez que los mantienen
      accesibles para quienes deben utilizarlos.
3                                                        © 2012 IBM Corporation
Para pensar .…



    • Clasificar los datos (en fx continuidad del negocio).
    • Amenazas y Vulnerabilidades.
    • Gestión de Riesgos:
       – Evitar (no instalar una fábrica en zona sísmica).
       – Reducir (construcciones antisísmicas, instalaciones ignífugas, planes
          de contingencia, generadores de energía).
        – Retener (muy común – aceptar las consecuencias del riesgo –en
          gral. por falta de alternativas, o por inconciencia => involuntario).
       – Transferir (contratar un seguro).
    • La seguridad es Proceso Continuo.
    • Los errores se miden por sus consecuencias.

4                                                                            © 2012 IBM Corporation
IBM Security Framework




5                            © 2012 IBM Corporation
IBM Security Framework

                                       Security Governance,
                                       Security Governance,                                SIEM (Security Intelligence,
                                                                                           SIEM (Security Intelligence,
                                                Risk & Compliance
                                                 Risk & Compliance                              Enterprise Compliance)
                                                                                                Enterprise Compliance)



                                            Identity and
                                            Identity and               Identity Management
                                                                       Identity Management
                                        Access Management
                                        Access Management
                                                                                                          Access Management
                                                                                                          Access Management


                                                Data                   Data Loss Prevention
                                                                       Data Loss Prevention
                                                Data
                                               Security
                                               Security
                                                                         Encryption and Key
                                                                         Encryption and Key               Messaging Security
                                                                                                          Messaging Security
                                                                       Lifecycle Management
                                                                       Lifecycle Management
                                               E-mail
                                                E-mail                Database Monitoring and
                                                                      Database Monitoring and
                                               Security
                                               Security                                                      Data Masking
                                                                                                             Data Masking
                                                                            Protection
                                                                            Protection


                                                                     App Vulnerability Scanning
                                                                     App Vulnerability Scanning
                                         Application Security
                                         Application Security                                           Web Application Firewall
                                                                                                        Web Application Firewall
                                                                     App Source Code Scanning
                                                                     App Source Code Scanning

                                             Web // URL
                                             Web URL                  Access and Entitlement
                                                                      Access and Entitlement                 SOA Security
                                                                                                             SOA Security
                                              Filtering
                                              Filtering                   Management
                                                                          Management


                                                                           Vulnerability
                                                                           Vulnerability
                                        Infrastructure Security
                                        Infrastructure Security                                           Mainframe Security
                                                                                                          Mainframe Security
                                                                           Assessment
                                                                            Assessment
                                                                                                          Intrusion Prevention
                                                                                                          Intrusion Prevention
                                            Threat Assessment
                                            Threat Assessment            Web/URL Filtering
                                                                         Web/URL Filtering                       System
                                                                                                                 System
Note: Unlike the IBM
heterogeneous security                       Firewall, IDS/IPS,           Security Event
                                                                          Security Event                 Virtual System Security
                                                                                                         Virtual System Security
framework, Oracle focuses on                MFS, End Point Mgmt.          Management
                                                                           Management
the people level and (partially)
the compliance, data, and                                                               IBM Kassel content security team
application levels only.                                                                Managed Security Services
                                                                                        2,000+ security engineers in 11 centers
  6                                                                                                               © 2012 IBM Corporation
IBM's security portfolio…

                             Enterprise Governance, Risk and Compliance Management

            IBM OpenPages                  Algorithmics (recent acquisition)      i2 Corporation (recent acquisition)



                                                 IBM Security Portfolio
                                                 IBM Security Portfolio
                                   IT Security / Compliance Analytics & Reporting

         QRadar               QRadar Log               QRadar Risk                  IBM Privacy, Audit and
          SIEM                 Manager                  Manager                 Compliance Assessment Services

                                     IT Infrastructure – Operational Security Domains
                                                                                                                             Security
                                                                                                                            Consulting
          People                  Data                Applications         Network
                                                                                         Infrastructure     Endpoint

    Identity & Access      Guardium                AppScan                 Network                Endpoint
    Management Suite       Database Security       Source Edition          Intrusion Prevention   Manager (BigFix)
                                                                                                                              Managed
                                                                                                  zSecure, Server and
    Federated              Optim                   AppScan                 DataPower                                          Services
                                                                                                  Virtualization
    Identity Manager       Data Masking            Standard Edition        Security Gateway
                                                                                                  Security
                                                                                                  Native Server
    Enterprise             Key Lifecycle           Security                QRadar Anomaly
                                                                                                  Security (RACF, IBM
    Single Sign-On         Manager                 Policy Manager          Detection / QFlow
                                                                                                  Systems)                    X-Force
                           Data Security           Application                                                               and IBM
    Identity Assessment,   Assessment Service      Assessment Service      Managed Firewall,                                 Research
                                                                           Unified Threat and     Penetration
    Deployment and
                                                   AppScan OnDemand        Intrusion Prevention   Testing Services
    Hosting Services       Encryption and
                                                   Software as a           Services
                           DLP Deployment
                                                   Service

7                                                                                                                       © 2012 IBM Corporation
TAM ESSO




           •   > Seguridad
           •   > Cumplimiento
           •   < Costos operativos
           •   > Productividad


8                           © 2012 IBM Corporation
VMware IPS




9   9                © 2012 IBM Corporation
Escenario de Red




              Firewall/VP
              N




                        IDS/IP
                        S


10                               © 2012 IBM Corporation
Convergencia Servidores y Redes




11                                     © 2012 IBM Corporation
Nuevas Amenazas/Riesgos a
                                partir de la Virtualización


  Amenazas Tradicionales        Las Amenazas tradicionales
                                pueden atacar VMs del mismo
  Nuevas Amenazas a             modo que en los sistemas físicos
  entornos Virtuales


                                                                   Dispersión de VMs
                                                                   ——————————
                                                                   Dynamic relocation
                                                                   ——————————
Management                                                         Robo de VMs
Vulnerabilities
——————————
Secure storage of VMs
and the management
DATA
——————————                                                         Recursos Compartidos
Requires new                                                       ——————————
skill sets                                                         Punto único de falla



                                                                   Stealth rootkits
                                                                   in hardware now
                                                                   possible
                                                                   ——————————
                                                                   Virtual NICs & Virtual
                                                                   Hardware are targets



                           MAS COMPONENTES = MAYOR EXPOSICION
1212
                                                                       © 2012 IBM Corporation
Desafíos de la Seguridad para
                             Entornos Virtuales

Nuevas Vulnerabilidades
259 new virtualization vulnerabilities over the last 5 years
New attack types (e.g. Hyperjacking, hypervisor escape, VM attacks)



Mayor Superficie de Ataque
Virtual endpoints have same security challenges as their physical counterparts
Virtualization management systems provide new attack vector
Hypervisor itself is an attack vector



La mayor flexibilidad puede aumentar los riesgos de seguridad
Migration of VMs for load balancing can make them more difficult to secure
Ease of addition of VMs increases likelihood that insecure systems will go online
Malicious insiders can inflict massive damage very quickly


13                                                                       © 2012 IBM Corporation
Desafío: Proteger el Hypervisor




     Vuln
     Vuln
              vCenter
            Admin clients
               vCenter
             Admin clients

     Vuln
     Vuln                                     Vul
                                              Vul
              vCenter
               vCenter                         n
              servers
               servers
     Vuln
     Vuln     Service
               Service
              Console
               Console                              Unprotected VM

                                                    Vul
                                                    Vul   Virtual
                                                           Virtual
                             Privileged              n
                                                     n    Devices
                                                           Devices
                              Privileged
                              Access
                                Access



                                       Vuln
                                       Vuln




14                                                                   © 2012 IBM Corporation
Desafío: Pérdida de visibilidad
                         en la red virtual

                                                    Unauthorized
                                                    communication




Attacks through
authorized
communication
channels.




    15                                              © 2012 IBM Corporation
Desafío: Seguridad Contínua
                      luego de Migraciones de VM



           Physical Host                    Physical Host

     VM
      VM      VM
               VM           VM
                             VM                VM
                                                VM          VM
                                                             VM




       vSwitch
        vSwitch            vSwitch
                            vSwitch     vSwitch
                                         vSwitch            vSwitch
                                                             vSwitch




16                                                                 © 2012 IBM Corporation
Desafío: Dispersión de Virtual
                                                      Machines


•        Dispersión de VMs: VMs obsoletas o maliciosas, proliferan en los ambientes virtualizados.
•        Controlar la dispersión de VMs a través de auto-discovery
•        Detectar nuevas VMs en el momento en que pretender ser activadas




                                                          VM        VM mal
                                   VM          VM
                                                        descono-   intencio-
                                 Conocida    Conocida
                                                          cida       nada




                                     Hypervisor Hypervisor




    17                                                                                           © 2012 IBM Corporation
IBM Security Virtual Server
                                Protection for VMware
Helps customers to be more secure, compliant and cost-effective by delivering integrated and
optimized security for virtual data centers.

                                                                     VMsafe Integration
                                                                     Firewall and Intrusion
                                                                      Prevention
                                                                     Rootkit Detection/Prevention
                                                                     Inter-VM Traffic Analysis
                                                                     Automated Protection for
                                                                      Mobile VMs (VMotion)
                                                                     Virtual Network Segment
                                                                      Protection
                                                                     Virtual Network-Level
                                                                      Protection
                                                                     Virtual Infrastructure
                                                                      Auditing (Privileged User)
                                                                     Virtual Network Access
                                                                      Control

18                                                                                  © 2012 IBM Corporation
Desafío: Proteger el Hypervisor
                                                                                                                    Hypervisor-Integrated
                                                                                                                          Security
                                                 Traditional Agent-based
                                                         Security




                              Vuln
                              Vuln
                                  vCenter
                                 Admin clients
                                   vCenter
                                  Admin clients

                              Vuln
                              Vuln                                Vul
                                                                  Vul
                                     VM Mgmt
                                      VM Mgmt                      n
                                                                   n
                                      Servers
                                       Servers
                              Vuln
                              Vuln
                                     Service
                                      Service                                                        Unprotected VM
                                     Console
                                      Console
Effectively Protect                                                                                      Virtual
                                                                                                          Virtual   Vul
                                                                                                                    Vul
                                                                                                         Devices     n
                                                                                                                     n
the Platform by                                               Privileged
                                                               Privileged
                                                               Access
                                                                 Access
                                                                                                          Devices

Securing Common
                                                                            Vul
Entry-Points Against                                                        Vul
                                                                             n
                                                                             n
Attackers:
 – Combination of
   traditional software and
   physical devices
 – Central management
   provides single pane-of-
   glass for maximum                                                                                    Vul
                                                                                                        Vul
   situational awareness                                                                                 n
                                                                                                         n
 – Coverage for
   vulnerabilities arising
   from software bugs and
   mis-configuration
                                                                                  Network Security
19                                                                                                                   © 2012 IBM Corporation
                                                                                     Appliance
Desafío: Pérdida de visibilidad
                               en la red virtual

                                                          Unauthorized
                                                          communication
                                                          between is prevented


  Security Virtual
     Machine –
  Integrated with
  the Hypervisor




Attacks through
authorized
communication
channels are stopped.




    20                                                    © 2012 IBM Corporation
Desafío: Seguridad Contínua
                                      luego de Migraciones de VM

 Maintain security posture                                 Abstraction from underlying
  regardless of the VM’s physical                            physical servers provides
  host                                                       dynamic security optimized for
                           Security Admin Console            mobility




                             Physical Host                         Physical Host
             SVM
              SVM           VM       VM      VM               VM          VM         SVM
                                                                                      SVM
                             VM       VM      VM               VM          VM




            Network
              Network
         Introspection
           Introspection                                                               Network
                                                                                         Network
               API
                API           vSwitch
                               vSwitch       vSwitch
                                              vSwitch   vSwitch
                                                         vSwitch         vSwitch
                                                                          vSwitch   Introspection
                                                                                      Introspection
                                                                                          API
                                                                                           API




 21                                                                                  © 2012 IBM Corporation
Desafío: Dispersión de Virtual
                                                 Machines

• VM Sprawl: Obsolete or rogue VMs proliferating in the virtualized environment
• Control VM sprawl through                                                         Automatically quarantine
  auto-discovery of assets                                                          from network
• Detect new VMs as they
                                1.Detect VMs automatically
  come on-line                  2.Assess security posture                       Apply relevant security
                                                                                          policy



                                                                                  Known        Known
            Known      Unknown                                                                                  Rogue
                                    Rogue                              SVM        Guest        Guest
 SVM        Guest       Guest
                                     VM
                                                                                                                 VM
                                                                                   VM           VM
             VM          VM




                 Hypervisor                                                           Hypervisor


                                            • Assess security
                                              posture
                                            • Ensure only approved
                                              VMs gain network
                                              access

  22                                                                                               © 2012 IBM Corporation
Tres razonables para proteger
                            infraestructuras virtualizadas

 Necesidad                 Cómo ayuda IBM Virtual Server Protection for VMware®



Mitigar los nuevos                                 Provee protección
riesgos y complejidades                            dinámica para cada capa
introducidas a partir de                           de la infraestructura virtual
la Virtualización


Mantener cumplimiento                              Ayuda a mantener cumplimiento
de regulaciones y                                  aportando seguridad y reportes
estándares                                         propios de la infraestructura virtual



                                                   Aumenta el Retorno de la
Ediciencia Operativa
                                                   Inversión (ROI) de la
                                                   infraestructura virtual


 23                                                                       © 2012 IBM Corporation
Aumento del ROI de la
                                                infraestructura virtualizada



     •        Automated Protection as each                   •   Less management overhead eliminates
              VM comes online                                    redundant processing tasks
               – Automatic Discovery                               – One Security Virtual Machine (SVM) per
               – Automated vulnerability assessment                  physical server
               – IBM Virtual Patch® technology                     – 1:many protection-to-VM ratio
     •        Non-intrusive                                        – CPU-intensive processing removed from
               – No reconfiguration of the virtual network           the guest OS and consolidated in SVM
                                                             •   Centralized Management
               – No presence in the guest OS
                     • Improved stability                          – IBM Proventia® Management
                                                                     SiteProtector™ system
                     • More CPU/memory available
                                                                   – IBM Tivoli Endpoint Manager
                        for workloads
                     • Decreased attack surface
     •        Protection for any guest OS
               – Reduction in security agents for
                   multiple OSs




         24                                                                                    © 2012 IBM Corporation
24
VSP vs Host Based virtualizadas


             Host-Based Agent                                   Virtual Server Protection

                     Firewall functions only in the
                      Firewall functions only in the                        Firewall enforces virtual
                                                                             Firewall enforces virtual
Isolation
 Isolation           context of the VM
                                                       Isolation
                                                        Isolation           network-wide policy
                      context of the VM                                      network-wide policy


                                                                            Secures all virtual machines
                                                                             Secures all virtual machines
Attack Prevention
 Attack Prevention   Requires agent to be present
                      Requires agent to be present     Attack Prevention
                                                        Attack Prevention   automatically
                                                                             automatically


                     Security is impacted by VM
                      Security is impacted by VM                            Security is not impacted by
                                                                             Security is not impacted by
VM State
 VM State            state change
                                                       VM State
                                                        VM State            VM state change
                      state change                                           VM state change


                                                                            Policy is enforced outside of
                                                                             Policy is enforced outside of
                     Policy is enforced only within
                      Policy is enforced only within
Security Policies
 Security Policies   the VM
                                                       Security Policies
                                                        Security Policies   the VM and irrespective of the
                                                                             the VM and irrespective of the
                      the VM                                                VMs location
                                                                             VMs location




25                                                                                         © 2012 IBM Corporation
Novedades en Copias de
       Seguridad (Backup)




2626
                                © 2012 IBM Corporation
Ventanas de Backup




27                        © 2012 IBM Corporation
Sitio de Contingencia
     Rapid / Disaster Recovery




28                               © 2012 IBM Corporation
Respaldo de Oficinas Remotas




29                                  © 2012 IBM Corporation
TSM 6.3 Node Replication




30                              © 2012 IBM Corporation
TSM Suite for Unified Recovery




31                                    © 2012 IBM Corporation
“Generating Higher Value at IBM” includes selected references to certain non-GAAP financial measures that are made to facilitate a comparative
view of the company's ongoing operational performance. For information about the company's financial results related to (i) free cash flow
excluding Global Financing Receivables and (ii) operating (non-GAAP) earnings, which are in each case non-GAAP measures, see the company's
Form 8-K submitted to the SEC on January 18, 2011(Attachment II-Non-GAAP Supplementary Materials).

More Related Content

What's hot

Microsoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution PresentationMicrosoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution Presentation
Microsoft Private Cloud
 
Information Risk Security model and metrics
Information Risk Security model and metricsInformation Risk Security model and metrics
Information Risk Security model and metrics
Vladimir Jirasek
 

What's hot (20)

STKI Summit 2009 -Infrastructure Services Trends
STKI Summit 2009 -Infrastructure Services TrendsSTKI Summit 2009 -Infrastructure Services Trends
STKI Summit 2009 -Infrastructure Services Trends
 
Complete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceComplete Security with Sophos and Softchoice
Complete Security with Sophos and Softchoice
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete Security
 
Agam Profile
Agam ProfileAgam Profile
Agam Profile
 
Agama Profile
Agama ProfileAgama Profile
Agama Profile
 
Sw keynote
Sw keynoteSw keynote
Sw keynote
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
Microsoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution PresentationMicrosoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution Presentation
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 
eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Security
 
Information Governance
Information GovernanceInformation Governance
Information Governance
 
CRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff CrumeCRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff Crume
 
“8th National Biennial Conference on Medical Informatics 2012”
“8th National Biennial Conference on Medical Informatics 2012”“8th National Biennial Conference on Medical Informatics 2012”
“8th National Biennial Conference on Medical Informatics 2012”
 
Information Risk Security model and metrics
Information Risk Security model and metricsInformation Risk Security model and metrics
Information Risk Security model and metrics
 
Outlook emerging security_technology_trends
Outlook emerging security_technology_trendsOutlook emerging security_technology_trends
Outlook emerging security_technology_trends
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del Datacenter
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
Secura Security India Overview
Secura Security India OverviewSecura Security India Overview
Secura Security India Overview
 
Smau Bari 2012 Marco Soldi
Smau Bari 2012   Marco SoldiSmau Bari 2012   Marco Soldi
Smau Bari 2012 Marco Soldi
 
Day 3 p2 - security
Day 3   p2 - securityDay 3   p2 - security
Day 3 p2 - security
 

Similar to [Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux

Complexity of IT security
Complexity of IT securityComplexity of IT security
Complexity of IT security
Pons Dela Cruz
 
2012 10 cloud security architecture
2012 10 cloud security architecture2012 10 cloud security architecture
2012 10 cloud security architecture
Vladimir Jirasek
 
Mobile device management v5
Mobile device management v5Mobile device management v5
Mobile device management v5
RoyGerritse
 

Similar to [Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux (20)

Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By Design
 
Complexity of IT security
Complexity of IT securityComplexity of IT security
Complexity of IT security
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architecture
 
марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012
 
Complete Security
Complete SecurityComplete Security
Complete Security
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the Cloud
 
iCode Security Architecture Framework
iCode Security Architecture FrameworkiCode Security Architecture Framework
iCode Security Architecture Framework
 
2012 10 cloud security architecture
2012 10 cloud security architecture2012 10 cloud security architecture
2012 10 cloud security architecture
 
Security Patterns How To Make Security Arch Easy To Consume
Security Patterns   How To Make Security Arch Easy To ConsumeSecurity Patterns   How To Make Security Arch Easy To Consume
Security Patterns How To Make Security Arch Easy To Consume
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consulting
 
Nebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi VerzeNebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi Verze
 
Mobile device management v5
Mobile device management v5Mobile device management v5
Mobile device management v5
 
Symantec Solutions Working Together
Symantec Solutions Working TogetherSymantec Solutions Working Together
Symantec Solutions Working Together
 
Axxera Security Solutions
Axxera Security SolutionsAxxera Security Solutions
Axxera Security Solutions
 
Gainful Information Security 2012 services
Gainful Information Security 2012 servicesGainful Information Security 2012 services
Gainful Information Security 2012 services
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 
Axxera
AxxeraAxxera
Axxera
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
 
Axxera Ppt
Axxera PptAxxera Ppt
Axxera Ppt
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 

More from IBMSSA

Ibm chef watson
Ibm chef watsonIbm chef watson
Ibm chef watson
IBMSSA
 
Negocios en la nube Roberto Cruz Arcieri
Negocios en la nube   Roberto Cruz ArcieriNegocios en la nube   Roberto Cruz Arcieri
Negocios en la nube Roberto Cruz Arcieri
IBMSSA
 
La empresa dirigida por el cliente Diego Rinaldi
La empresa dirigida por el cliente Diego RinaldiLa empresa dirigida por el cliente Diego Rinaldi
La empresa dirigida por el cliente Diego Rinaldi
IBMSSA
 
[Chaco] Smart Cloud Enterprise - Cecilia Conci
[Chaco] Smart Cloud Enterprise - Cecilia Conci[Chaco] Smart Cloud Enterprise - Cecilia Conci
[Chaco] Smart Cloud Enterprise - Cecilia Conci
IBMSSA
 
[Chaco] Cognos: BI Planificación Financiera – Javier Stefan, SBI
[Chaco] Cognos: BI Planificación Financiera – Javier Stefan, SBI[Chaco] Cognos: BI Planificación Financiera – Javier Stefan, SBI
[Chaco] Cognos: BI Planificación Financiera – Javier Stefan, SBI
IBMSSA
 
[Chaco] Soluciones de Almacenamiento y Backup - Nicolás Goicoechea
[Chaco] Soluciones de Almacenamiento y Backup - Nicolás Goicoechea[Chaco] Soluciones de Almacenamiento y Backup - Nicolás Goicoechea
[Chaco] Soluciones de Almacenamiento y Backup - Nicolás Goicoechea
IBMSSA
 
[Chaco] Optimización del área de TI con Servidores POWER y System x – Gabriel...
[Chaco] Optimización del área de TI con Servidores POWER y System x – Gabriel...[Chaco] Optimización del área de TI con Servidores POWER y System x – Gabriel...
[Chaco] Optimización del área de TI con Servidores POWER y System x – Gabriel...
IBMSSA
 
[Chaco] Cloud Computing – Cecilia Conci
[Chaco] Cloud Computing – Cecilia Conci[Chaco] Cloud Computing – Cecilia Conci
[Chaco] Cloud Computing – Cecilia Conci
IBMSSA
 
[Chaco] Facilitando la Innovación en un mundo complejo | Portafolio Software ...
[Chaco] Facilitando la Innovación en un mundo complejo | Portafolio Software ...[Chaco] Facilitando la Innovación en un mundo complejo | Portafolio Software ...
[Chaco] Facilitando la Innovación en un mundo complejo | Portafolio Software ...
IBMSSA
 
[Salta] Cognos: Aplicación práctica en la Inteligencia de Negocios.
[Salta] Cognos: Aplicación práctica en la Inteligencia de Negocios.[Salta] Cognos: Aplicación práctica en la Inteligencia de Negocios.
[Salta] Cognos: Aplicación práctica en la Inteligencia de Negocios.
IBMSSA
 
[Salta] Control absoluto. Manejo de identidades.
[Salta] Control absoluto. Manejo de identidades.[Salta] Control absoluto. Manejo de identidades.
[Salta] Control absoluto. Manejo de identidades.
IBMSSA
 
[Salta] Smart Cloud Enterprise - Cecilia Conci
[Salta] Smart Cloud Enterprise - Cecilia Conci[Salta] Smart Cloud Enterprise - Cecilia Conci
[Salta] Smart Cloud Enterprise - Cecilia Conci
IBMSSA
 

More from IBMSSA (20)

10 Recetas de chef watson
10 Recetas de chef watson10 Recetas de chef watson
10 Recetas de chef watson
 
Ibm chef watson
Ibm chef watsonIbm chef watson
Ibm chef watson
 
Soluciones de seguridad para Cloud
Soluciones de seguridad para CloudSoluciones de seguridad para Cloud
Soluciones de seguridad para Cloud
 
La adopción de saaS
La adopción de saaSLa adopción de saaS
La adopción de saaS
 
Encarrera hacia la excelencia
Encarrera hacia la excelenciaEncarrera hacia la excelencia
Encarrera hacia la excelencia
 
Analytics el uso de big data en el mundo real aplicado a las telecomunicaciones
Analytics el uso de big data en el mundo real aplicado a las telecomunicacionesAnalytics el uso de big data en el mundo real aplicado a las telecomunicaciones
Analytics el uso de big data en el mundo real aplicado a las telecomunicaciones
 
Infraestructuras Service
Infraestructuras ServiceInfraestructuras Service
Infraestructuras Service
 
Como Cloud Computing puede ayudar a su negocio a incrementar el retorno de la...
Como Cloud Computing puede ayudar a su negocio a incrementar el retorno de la...Como Cloud Computing puede ayudar a su negocio a incrementar el retorno de la...
Como Cloud Computing puede ayudar a su negocio a incrementar el retorno de la...
 
Siete Maneras de resolver sus problemas de negocio con Cloud
Siete Maneras de resolver sus problemas de negocio con CloudSiete Maneras de resolver sus problemas de negocio con Cloud
Siete Maneras de resolver sus problemas de negocio con Cloud
 
Negocios en la nube Roberto Cruz Arcieri
Negocios en la nube   Roberto Cruz ArcieriNegocios en la nube   Roberto Cruz Arcieri
Negocios en la nube Roberto Cruz Arcieri
 
La empresa dirigida por el cliente Diego Rinaldi
La empresa dirigida por el cliente Diego RinaldiLa empresa dirigida por el cliente Diego Rinaldi
La empresa dirigida por el cliente Diego Rinaldi
 
[Chaco] Smart Cloud Enterprise - Cecilia Conci
[Chaco] Smart Cloud Enterprise - Cecilia Conci[Chaco] Smart Cloud Enterprise - Cecilia Conci
[Chaco] Smart Cloud Enterprise - Cecilia Conci
 
[Chaco] Cognos: BI Planificación Financiera – Javier Stefan, SBI
[Chaco] Cognos: BI Planificación Financiera – Javier Stefan, SBI[Chaco] Cognos: BI Planificación Financiera – Javier Stefan, SBI
[Chaco] Cognos: BI Planificación Financiera – Javier Stefan, SBI
 
[Chaco] Soluciones de Almacenamiento y Backup - Nicolás Goicoechea
[Chaco] Soluciones de Almacenamiento y Backup - Nicolás Goicoechea[Chaco] Soluciones de Almacenamiento y Backup - Nicolás Goicoechea
[Chaco] Soluciones de Almacenamiento y Backup - Nicolás Goicoechea
 
[Chaco] Optimización del área de TI con Servidores POWER y System x – Gabriel...
[Chaco] Optimización del área de TI con Servidores POWER y System x – Gabriel...[Chaco] Optimización del área de TI con Servidores POWER y System x – Gabriel...
[Chaco] Optimización del área de TI con Servidores POWER y System x – Gabriel...
 
[Chaco] Cloud Computing – Cecilia Conci
[Chaco] Cloud Computing – Cecilia Conci[Chaco] Cloud Computing – Cecilia Conci
[Chaco] Cloud Computing – Cecilia Conci
 
[Chaco] Facilitando la Innovación en un mundo complejo | Portafolio Software ...
[Chaco] Facilitando la Innovación en un mundo complejo | Portafolio Software ...[Chaco] Facilitando la Innovación en un mundo complejo | Portafolio Software ...
[Chaco] Facilitando la Innovación en un mundo complejo | Portafolio Software ...
 
[Salta] Cognos: Aplicación práctica en la Inteligencia de Negocios.
[Salta] Cognos: Aplicación práctica en la Inteligencia de Negocios.[Salta] Cognos: Aplicación práctica en la Inteligencia de Negocios.
[Salta] Cognos: Aplicación práctica en la Inteligencia de Negocios.
 
[Salta] Control absoluto. Manejo de identidades.
[Salta] Control absoluto. Manejo de identidades.[Salta] Control absoluto. Manejo de identidades.
[Salta] Control absoluto. Manejo de identidades.
 
[Salta] Smart Cloud Enterprise - Cecilia Conci
[Salta] Smart Cloud Enterprise - Cecilia Conci[Salta] Smart Cloud Enterprise - Cecilia Conci
[Salta] Smart Cloud Enterprise - Cecilia Conci
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux

  • 1. Título presentación Soluciones de Seguridad Nicolás Pérez de Arenaza Nombre y Apellido
  • 2. Agenda • Algunas definiciones • IBM Security Framework & Portfolio • Personas - Enterprise Single Sign On. • Network – VSAFE • Storage – FastBack 2 © 2012 IBM Corporation
  • 3. Activos Digitales • Activo es un bien tangible o intangible que tiene una persona o empresa, mediante el cual se obtienen beneficios económicos. • En todas las organizaciones, en mayor o medida de acuerdo a su actividad, los datos son un activo (activo digital). • La Seguridad Informática y la Seguridad de la Información tienen la misión de proteger este tipo de activos intangibles, a la vez que los mantienen accesibles para quienes deben utilizarlos. 3 © 2012 IBM Corporation
  • 4. Para pensar .… • Clasificar los datos (en fx continuidad del negocio). • Amenazas y Vulnerabilidades. • Gestión de Riesgos: – Evitar (no instalar una fábrica en zona sísmica). – Reducir (construcciones antisísmicas, instalaciones ignífugas, planes de contingencia, generadores de energía). – Retener (muy común – aceptar las consecuencias del riesgo –en gral. por falta de alternativas, o por inconciencia => involuntario). – Transferir (contratar un seguro). • La seguridad es Proceso Continuo. • Los errores se miden por sus consecuencias. 4 © 2012 IBM Corporation
  • 5. IBM Security Framework 5 © 2012 IBM Corporation
  • 6. IBM Security Framework Security Governance, Security Governance, SIEM (Security Intelligence, SIEM (Security Intelligence, Risk & Compliance Risk & Compliance Enterprise Compliance) Enterprise Compliance) Identity and Identity and Identity Management Identity Management Access Management Access Management Access Management Access Management Data Data Loss Prevention Data Loss Prevention Data Security Security Encryption and Key Encryption and Key Messaging Security Messaging Security Lifecycle Management Lifecycle Management E-mail E-mail Database Monitoring and Database Monitoring and Security Security Data Masking Data Masking Protection Protection App Vulnerability Scanning App Vulnerability Scanning Application Security Application Security Web Application Firewall Web Application Firewall App Source Code Scanning App Source Code Scanning Web // URL Web URL Access and Entitlement Access and Entitlement SOA Security SOA Security Filtering Filtering Management Management Vulnerability Vulnerability Infrastructure Security Infrastructure Security Mainframe Security Mainframe Security Assessment Assessment Intrusion Prevention Intrusion Prevention Threat Assessment Threat Assessment Web/URL Filtering Web/URL Filtering System System Note: Unlike the IBM heterogeneous security Firewall, IDS/IPS, Security Event Security Event Virtual System Security Virtual System Security framework, Oracle focuses on MFS, End Point Mgmt. Management Management the people level and (partially) the compliance, data, and  IBM Kassel content security team application levels only.  Managed Security Services  2,000+ security engineers in 11 centers 6 © 2012 IBM Corporation
  • 7. IBM's security portfolio… Enterprise Governance, Risk and Compliance Management IBM OpenPages Algorithmics (recent acquisition) i2 Corporation (recent acquisition) IBM Security Portfolio IBM Security Portfolio IT Security / Compliance Analytics & Reporting QRadar QRadar Log QRadar Risk IBM Privacy, Audit and SIEM Manager Manager Compliance Assessment Services IT Infrastructure – Operational Security Domains Security Consulting People Data Applications Network Infrastructure Endpoint Identity & Access Guardium AppScan Network Endpoint Management Suite Database Security Source Edition Intrusion Prevention Manager (BigFix) Managed zSecure, Server and Federated Optim AppScan DataPower Services Virtualization Identity Manager Data Masking Standard Edition Security Gateway Security Native Server Enterprise Key Lifecycle Security QRadar Anomaly Security (RACF, IBM Single Sign-On Manager Policy Manager Detection / QFlow Systems) X-Force Data Security Application and IBM Identity Assessment, Assessment Service Assessment Service Managed Firewall, Research Unified Threat and Penetration Deployment and AppScan OnDemand Intrusion Prevention Testing Services Hosting Services Encryption and Software as a Services DLP Deployment Service 7 © 2012 IBM Corporation
  • 8. TAM ESSO • > Seguridad • > Cumplimiento • < Costos operativos • > Productividad 8 © 2012 IBM Corporation
  • 9. VMware IPS 9 9 © 2012 IBM Corporation
  • 10. Escenario de Red Firewall/VP N IDS/IP S 10 © 2012 IBM Corporation
  • 11. Convergencia Servidores y Redes 11 © 2012 IBM Corporation
  • 12. Nuevas Amenazas/Riesgos a partir de la Virtualización Amenazas Tradicionales Las Amenazas tradicionales pueden atacar VMs del mismo Nuevas Amenazas a modo que en los sistemas físicos entornos Virtuales Dispersión de VMs —————————— Dynamic relocation —————————— Management Robo de VMs Vulnerabilities —————————— Secure storage of VMs and the management DATA —————————— Recursos Compartidos Requires new —————————— skill sets Punto único de falla Stealth rootkits in hardware now possible —————————— Virtual NICs & Virtual Hardware are targets MAS COMPONENTES = MAYOR EXPOSICION 1212 © 2012 IBM Corporation
  • 13. Desafíos de la Seguridad para Entornos Virtuales Nuevas Vulnerabilidades 259 new virtualization vulnerabilities over the last 5 years New attack types (e.g. Hyperjacking, hypervisor escape, VM attacks) Mayor Superficie de Ataque Virtual endpoints have same security challenges as their physical counterparts Virtualization management systems provide new attack vector Hypervisor itself is an attack vector La mayor flexibilidad puede aumentar los riesgos de seguridad Migration of VMs for load balancing can make them more difficult to secure Ease of addition of VMs increases likelihood that insecure systems will go online Malicious insiders can inflict massive damage very quickly 13 © 2012 IBM Corporation
  • 14. Desafío: Proteger el Hypervisor Vuln Vuln vCenter Admin clients vCenter Admin clients Vuln Vuln Vul Vul vCenter vCenter n servers servers Vuln Vuln Service Service Console Console Unprotected VM Vul Vul Virtual Virtual Privileged n n Devices Devices Privileged Access Access Vuln Vuln 14 © 2012 IBM Corporation
  • 15. Desafío: Pérdida de visibilidad en la red virtual Unauthorized communication Attacks through authorized communication channels. 15 © 2012 IBM Corporation
  • 16. Desafío: Seguridad Contínua luego de Migraciones de VM Physical Host Physical Host VM VM VM VM VM VM VM VM VM VM vSwitch vSwitch vSwitch vSwitch vSwitch vSwitch vSwitch vSwitch 16 © 2012 IBM Corporation
  • 17. Desafío: Dispersión de Virtual Machines • Dispersión de VMs: VMs obsoletas o maliciosas, proliferan en los ambientes virtualizados. • Controlar la dispersión de VMs a través de auto-discovery • Detectar nuevas VMs en el momento en que pretender ser activadas VM VM mal VM VM descono- intencio- Conocida Conocida cida nada Hypervisor Hypervisor 17 © 2012 IBM Corporation
  • 18. IBM Security Virtual Server Protection for VMware Helps customers to be more secure, compliant and cost-effective by delivering integrated and optimized security for virtual data centers.  VMsafe Integration  Firewall and Intrusion Prevention  Rootkit Detection/Prevention  Inter-VM Traffic Analysis  Automated Protection for Mobile VMs (VMotion)  Virtual Network Segment Protection  Virtual Network-Level Protection  Virtual Infrastructure Auditing (Privileged User)  Virtual Network Access Control 18 © 2012 IBM Corporation
  • 19. Desafío: Proteger el Hypervisor Hypervisor-Integrated Security Traditional Agent-based Security Vuln Vuln vCenter Admin clients vCenter Admin clients Vuln Vuln Vul Vul VM Mgmt VM Mgmt n n Servers Servers Vuln Vuln Service Service Unprotected VM Console Console Effectively Protect Virtual Virtual Vul Vul Devices n n the Platform by Privileged Privileged Access Access Devices Securing Common Vul Entry-Points Against Vul n n Attackers: – Combination of traditional software and physical devices – Central management provides single pane-of- glass for maximum Vul Vul situational awareness n n – Coverage for vulnerabilities arising from software bugs and mis-configuration Network Security 19 © 2012 IBM Corporation Appliance
  • 20. Desafío: Pérdida de visibilidad en la red virtual Unauthorized communication between is prevented Security Virtual Machine – Integrated with the Hypervisor Attacks through authorized communication channels are stopped. 20 © 2012 IBM Corporation
  • 21. Desafío: Seguridad Contínua luego de Migraciones de VM  Maintain security posture  Abstraction from underlying regardless of the VM’s physical physical servers provides host dynamic security optimized for Security Admin Console mobility Physical Host Physical Host SVM SVM VM VM VM VM VM SVM SVM VM VM VM VM VM Network Network Introspection Introspection Network Network API API vSwitch vSwitch vSwitch vSwitch vSwitch vSwitch vSwitch vSwitch Introspection Introspection API API 21 © 2012 IBM Corporation
  • 22. Desafío: Dispersión de Virtual Machines • VM Sprawl: Obsolete or rogue VMs proliferating in the virtualized environment • Control VM sprawl through Automatically quarantine auto-discovery of assets from network • Detect new VMs as they 1.Detect VMs automatically come on-line 2.Assess security posture Apply relevant security policy Known Known Known Unknown Rogue Rogue SVM Guest Guest SVM Guest Guest VM VM VM VM VM VM Hypervisor Hypervisor • Assess security posture • Ensure only approved VMs gain network access 22 © 2012 IBM Corporation
  • 23. Tres razonables para proteger infraestructuras virtualizadas Necesidad Cómo ayuda IBM Virtual Server Protection for VMware® Mitigar los nuevos Provee protección riesgos y complejidades dinámica para cada capa introducidas a partir de de la infraestructura virtual la Virtualización Mantener cumplimiento Ayuda a mantener cumplimiento de regulaciones y aportando seguridad y reportes estándares propios de la infraestructura virtual Aumenta el Retorno de la Ediciencia Operativa Inversión (ROI) de la infraestructura virtual 23 © 2012 IBM Corporation
  • 24. Aumento del ROI de la infraestructura virtualizada • Automated Protection as each • Less management overhead eliminates VM comes online redundant processing tasks – Automatic Discovery – One Security Virtual Machine (SVM) per – Automated vulnerability assessment physical server – IBM Virtual Patch® technology – 1:many protection-to-VM ratio • Non-intrusive – CPU-intensive processing removed from – No reconfiguration of the virtual network the guest OS and consolidated in SVM • Centralized Management – No presence in the guest OS • Improved stability – IBM Proventia® Management SiteProtector™ system • More CPU/memory available – IBM Tivoli Endpoint Manager for workloads • Decreased attack surface • Protection for any guest OS – Reduction in security agents for multiple OSs 24 © 2012 IBM Corporation 24
  • 25. VSP vs Host Based virtualizadas Host-Based Agent Virtual Server Protection Firewall functions only in the Firewall functions only in the Firewall enforces virtual Firewall enforces virtual Isolation Isolation context of the VM Isolation Isolation network-wide policy context of the VM network-wide policy Secures all virtual machines Secures all virtual machines Attack Prevention Attack Prevention Requires agent to be present Requires agent to be present Attack Prevention Attack Prevention automatically automatically Security is impacted by VM Security is impacted by VM Security is not impacted by Security is not impacted by VM State VM State state change VM State VM State VM state change state change VM state change Policy is enforced outside of Policy is enforced outside of Policy is enforced only within Policy is enforced only within Security Policies Security Policies the VM Security Policies Security Policies the VM and irrespective of the the VM and irrespective of the the VM VMs location VMs location 25 © 2012 IBM Corporation
  • 26. Novedades en Copias de Seguridad (Backup) 2626 © 2012 IBM Corporation
  • 27. Ventanas de Backup 27 © 2012 IBM Corporation
  • 28. Sitio de Contingencia Rapid / Disaster Recovery 28 © 2012 IBM Corporation
  • 29. Respaldo de Oficinas Remotas 29 © 2012 IBM Corporation
  • 30. TSM 6.3 Node Replication 30 © 2012 IBM Corporation
  • 31. TSM Suite for Unified Recovery 31 © 2012 IBM Corporation
  • 32. “Generating Higher Value at IBM” includes selected references to certain non-GAAP financial measures that are made to facilitate a comparative view of the company's ongoing operational performance. For information about the company's financial results related to (i) free cash flow excluding Global Financing Receivables and (ii) operating (non-GAAP) earnings, which are in each case non-GAAP measures, see the company's Form 8-K submitted to the SEC on January 18, 2011(Attachment II-Non-GAAP Supplementary Materials).