TechnicalPitch Cibersegurança · “The security intelligence from X-Force and the out-of-the- aa...

12
TechnicalPitch Cibersegurança Rui Barata Ribeiro Security Software Sales da IBM Portugal

Transcript of TechnicalPitch Cibersegurança · “The security intelligence from X-Force and the out-of-the- aa...

Page 1: TechnicalPitch Cibersegurança · “The security intelligence from X-Force and the out-of-the- aa aa a 12aa a ...” - CTO, Large IT Consulting Firm in Europe “IBM Security solutions

TechnicalPitch

Cibersegurança

Rui Barata RibeiroSecurity Software Sales da IBM Portugal

Page 2: TechnicalPitch Cibersegurança · “The security intelligence from X-Force and the out-of-the- aa aa a 12aa a ...” - CTO, Large IT Consulting Firm in Europe “IBM Security solutions

IBM SECURITY STRATEGYSECURING THE THREATS OF TOMORROW, TODAY

Rui Barata Ribeiro

June 2018

IBM Security

Page 3: TechnicalPitch Cibersegurança · “The security intelligence from X-Force and the out-of-the- aa aa a 12aa a ...” - CTO, Large IT Consulting Firm in Europe “IBM Security solutions

3 © 2018 IBM Corporation

We exist to protect the world, freeing you to thrive in the face of cyber uncertainty

Largest enterprise cybersecurity provider

Leader in 12 security market segments

3,700+ security patents

20+ security acquisitions

60B+ security events monitored per day

Page 4: TechnicalPitch Cibersegurança · “The security intelligence from X-Force and the out-of-the- aa aa a 12aa a ...” - CTO, Large IT Consulting Firm in Europe “IBM Security solutions

4 © 2018 IBM Corporation

Build a security immune system

Get help from the experts

Deploy meaningful innovations

Our unique approach will help transform your security

SECURITYORCHESTRATION

& ANALYTICS

APPS

MOBILE

ENDPOINT

THREATINTEL

NETWORK

ADVANCEDFRAUD

IDENTITY& ACCESS

DATA

Deploy meaningful innovations

AI and Orchestration

Cloud Security

Collaboration

Industry Consultants

Research & Development

World Class Designers

4 © 2018 IBM Corporation

Page 5: TechnicalPitch Cibersegurança · “The security intelligence from X-Force and the out-of-the- aa aa a 12aa a ...” - CTO, Large IT Consulting Firm in Europe “IBM Security solutions

5 © 2018 IBM Corporation

SECURITYORCHESTRATION

& ANALYTICS

THREATINTEL

ENDPOINT NETWORK

MOBILEADVANCED

FRAUD

DATA

APPSIDENTITY& ACCESS

Build an integrated security immune system

Criminal detection

Fraud protection

Data access control

Application security managementApplication scanning

Data protection

Device management

Transaction protection

Content security

Malware protection

Endpoint detection and responseEndpoint patching and management Network forensics and threat management

Firewalls and intrusion prevention

Network visibility and segmentation

Access management

Identity governance and administration

Privileged user management

IDaaS

Mainframe security

Threat sharing

Vulnerability managementSecurity analytics

Threat and anomaly detection

Incident responseUser behavior analytics

Threat hunting and investigation

IoCs

|

|

Page 6: TechnicalPitch Cibersegurança · “The security intelligence from X-Force and the out-of-the- aa aa a 12aa a ...” - CTO, Large IT Consulting Firm in Europe “IBM Security solutions

6 © 2018 IBM Corporation

Supported by hundreds of open integrations

… …

Page 7: TechnicalPitch Cibersegurança · “The security intelligence from X-Force and the out-of-the- aa aa a 12aa a ...” - CTO, Large IT Consulting Firm in Europe “IBM Security solutions

7 © 2018 IBM Corporation

The future of security is AI and OrchestrationWhat if you could augment your teams’ intelligence and response?

Respond quickly with confidenceOrchestrate a complete and dynamic response, enabling faster, more intelligent remediation

– Create dynamic playbooks built on NIST / CERT / SANS

– Deploy response procedures and expertise

Use AI to gain a head startAutomatically investigate incidents and anomalies to identify the most likely threats

– Quickly gather insights from millions of external sources

– Apply cognitive reasoning to build relationships

IBM QRadar Advisor with Watson IBM Resilient

Page 8: TechnicalPitch Cibersegurança · “The security intelligence from X-Force and the out-of-the- aa aa a 12aa a ...” - CTO, Large IT Consulting Firm in Europe “IBM Security solutions

8 © 2018 IBM Corporation

The future of security is CloudCan you confidently say yes to digital transformation?

Gain VisibilityIBM QRadar Cloud Security Analytics

Manage AccessIBM Cloud Identity Connect

Protect DataIBM Multi-Cloud Data Encryption

Get Help from Experts | IBM X-Force Cloud Security Service8 © 2018 IBM Corporation

Page 9: TechnicalPitch Cibersegurança · “The security intelligence from X-Force and the out-of-the- aa aa a 12aa a ...” - CTO, Large IT Consulting Firm in Europe “IBM Security solutions

9 © 2018 IBM Corporation

The future of security is CollaborationAre you part of the bigger picture?

Share real-time threat intelligenceInteract with 41K+ users and 800+ TB of threat intelligence on the IBM X-Force Exchange

Join an ecosystem of defensesCustomize your security with 140+ apps on the IBM Security App Exchange

Page 10: TechnicalPitch Cibersegurança · “The security intelligence from X-Force and the out-of-the- aa aa a 12aa a ...” - CTO, Large IT Consulting Firm in Europe “IBM Security solutions

10 © 2018 IBM Corporation

We’re investing in the skillsof the future

10 © 2018 IBM Corporation

Design Innovation

Engage with experts in IBM Design Thinking

– 42 design studios

– Major influence on dozens of security offerings

X-Force Command Centers

Test your skills in the world’s 1st commercial Cyber Range

– 9 global SOCs

– Monitors more than one trillion events monthly

Research and Expertise

Take advantage of 6,000+ in security R&D and consulting

– Daily threat briefings

– Backed by X-Force and IBM Research, three IBM Fellows

Page 11: TechnicalPitch Cibersegurança · “The security intelligence from X-Force and the out-of-the- aa aa a 12aa a ...” - CTO, Large IT Consulting Firm in Europe “IBM Security solutions

11 © 2018 IBM Corporation

IBM Security offers proven solutions

“IBM provides us with long-term stability because of its well-planned product roadmaps, and scalability as its solutions easily scale as our business grows.”

- Operations Manager, South East Asian Industrial Company

“IBM Security enables us to manage over 2.2 million events daily and still keep our heads above water.”

- Director of Strategic Initiatives, Top University

“The security intelligence from X-Force and the out-of-the-box analytics capabilities made QRadar stand out...”

- CTO, Large IT Consulting Firm in Europe

“IBM Security solutions help us to keep the trust of our patients, which makes our practice grow.”

- IT Director, Healthcare Company with 1.8 million active patients

Market Segment Analyst Rankings

Security Analytics LEADER

Endpoint: Client Management Tools

LEADER

Identity Governance LEADER

Access Management LEADER

Identity as a Service LEADER

Identity Management LEADER

Database Security LEADER

Application Security LEADER

Enterprise Mobility Management

LEADER

Web Fraud Detection LEADER

Managed Security LEADER

Information Security Consulting Services

LEADER

Page 12: TechnicalPitch Cibersegurança · “The security intelligence from X-Force and the out-of-the- aa aa a 12aa a ...” - CTO, Large IT Consulting Firm in Europe “IBM Security solutions

© Copyright IBM Corporation 2018. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.

OBRIGADOibm.com/security

securityintelligence.com

xforce.ibmcloud.com

@ibmsecurity

youtube/user/ibmsecuritysolutions

FOLLOW US ON:

ibm.com/security/community

Rui Barata Ribeiro

IBM Security

[email protected]+351916380571