TechnicalPitch Cibersegurança. Rui Barata Ribeiro Security Software Sales da IBM Portugal

Size: px
Start display at page:

Download "TechnicalPitch Cibersegurança. Rui Barata Ribeiro Security Software Sales da IBM Portugal"

Transcription

1 TechnicalPitch Cibersegurança Rui Barata Ribeiro Security Software Sales da IBM Portugal

2 IBM SECURITY STRATEGY SECURING THE THREATS OF TOMORROW, TODAY Rui Barata Ribeiro IBM Security June 2018

3 We exist to protect the world, freeing you to thrive in the face of cyber uncertainty Largest enterprise cybersecurity provider Leader in 12 security market segments 3,700+ security patents 20+ security acquisitions 60B+ security events monitored per day IBM Corporation

4 Our unique approach will help transform your security Build a security immune system Deploy meaningful innovations Deploy meaningful innovations AI and Orchestration APPS DATA IDENTITY & ACCESS Cloud Security Collaboration MOBILE SECURITY ORCHESTRATION & ANALYTICS ADVANCED FRAUD Get help from the experts ENDPOINT NETWORK Industry Consultants Research & Development THREAT INTEL World Class Designers IBM 4 Corporation 2018 IBM Corporation

5 Build an integrated security immune system Data protection Data access control Application scanning Application security management APPS DATA Security analytics Vulnerability management Threat and anomaly detection IDENTITY & ACCESS Privileged user management Identity governance and administration Access management IDaaS Mainframe security Transaction protection Device management Content security MOBILE SECURITY ORCHESTRATION & ANALYTICS ADVANCED FRAUD Fraud protection Criminal detection Endpoint detection and Endpoint patching and management response Malware protection ENDPOINT Threat hunting and investigation User behavior analytics Incident response NETWORK Firewalls and intrusion prevention Network forensics and threat management Network visibility and segmentation THREAT INTEL Threat sharing IoCs IBM Corporation

6 Supported by hundreds of open integrations IBM Corporation

7 The future of security is AI and Orchestration What if you could augment your teams intelligence and response? Use AI to gain a head start Automatically investigate incidents and anomalies to identify the most likely threats Quickly gather insights from millions of external sources Apply cognitive reasoning to build relationships IBM QRadar Advisor with Watson Respond quickly with confidence Orchestrate a complete and dynamic response, enabling faster, more intelligent remediation Create dynamic playbooks built on NIST / CERT / SANS Deploy response procedures and expertise IBM Resilient IBM Corporation

8 The future of security is Cloud Can you confidently say yes to digital transformation? Protect Data IBM Multi-Cloud Data Encryption Gain Visibility IBM QRadar Cloud Security Analytics Manage Access IBM Cloud Identity Connect IBM Corporation Get Help from Experts IBM X-Force Cloud Security Service

9 The future of security is Collaboration Are you part of the bigger picture? Join an ecosystem of defenses Customize your security with 140+ apps on the IBM Security App Exchange Share real-time threat intelligence Interact with 41K+ users and 800+ TB of threat intelligence on the IBM X-Force Exchange IBM Corporation

10 We re investing in the skills of the future Research and Expertise Take advantage of 6,000+ in security R&D and consulting Daily threat briefings Backed by X-Force and IBM Research, three IBM Fellows X-Force Command Centers Test your skills in the world s 1 st commercial Cyber Range 9 global SOCs Monitors more than one trillion events monthly Design Innovation Engage with experts in IBM Design Thinking 42 design studios Major influence on dozens of security offerings IBM 10 Corporation 2018 IBM Corporation

11 IBM Security offers proven solutions Market Segment Analyst Rankings IBM Corporation IBM Security enables us to manage over 2.2 million events daily and still keep our heads above water. - Director of Strategic Initiatives, Top University The security intelligence from X-Force and the out-of-thebox analytics capabilities made QRadar stand out... - CTO, Large IT Consulting Firm in Europe IBM Security solutions help us to keep the trust of our patients, which makes our practice grow. - IT Director, Healthcare Company with 1.8 million active patients IBM provides us with long-term stability because of its well-planned product roadmaps, and scalability as its solutions easily scale as our business grows. - Operations Manager, South East Asian Industrial Company Security Analytics Endpoint: Client Management Tools Identity Governance Access Management Identity as a Service Identity Management Database Security Application Security Enterprise Mobility Management Web Fraud Detection Managed Security Information Security Consulting Services

12 OBRIGADO Rui Barata Ribeiro IBM Security FOLLOW US ON: ibm.com/security securityintelligence.com ibm.com/security/community youtube/user/ibmsecuritysolutions Copyright IBM Corporation All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.