SlideShare a Scribd company logo
© 2015 IBM Corporation
IBM Security
1© 2015 IBM Corporation
IBM IAM Security and Trends
Intelligence, Integration and Expertise
January 29, 2015
© 2015 IBM Corporation
IBM Security
2
Sophisticated attackers break through safeguards every day
SQL
injection
Watering
hole
Physical
access
MalwareThird-party
software
DDoSSpear
phishing
XSS Undisclosed
Attack types
Note: Size of circle estimates relative impact of incident in terms of cost to business Source: IBM X-Force Threat Intelligence Quarterly – 1Q 2014
2011
Year of the breach
2012
40% increase
2013
500,000,000+ records breached
61% of organizations say
data theft and cybercrime
are their greatest threats
2012 IBM Global Reputational Risk & IT Study
$3.5M+ average cost
of a data breach
2014 Cost of Data Breach, Ponemon Institute
© 2015 IBM Corporation
IBM Security
3
New technologies introduce new risks…
83%
of enterprises have difficulty
finding the security skills they need
2012 ESG Research
85 security tools from
45 vendors
IBM client example
…and traditional security practices are unsustainable
of security executives have
cloud and mobile concerns
2013 IBM CISO Survey
70%
Mobile malware growth
in just one year
2012-2013 Juniper Mobile Threat Report
614%
© 2015 IBM Corporation
IBM Security
4
Security leaders are more accountable than ever before
Source: Discussions with more than 13,000 C-suite executives as part of the IBM C-suite Study Series
Loss of market
share and
reputation
Legal exposure
Audit failure
Fines and
criminal charges
Financial loss
Loss of data
confidentiality,
integrity and/or
availability
Violation of
employee privacy
Loss of
customer trust
Loss of brand
reputation
CEO CFO/COO CIO CHRO CMO
Your board and CEO demand a strategy
© 2015 IBM Corporation
IBM Security
55
© 2015 IBM Corporation
IBM Security
6
More than half a billion records of PII were leaked in 2013
© 2015 IBM Corporation
IBM Security
7
Enterprise Security is only as strong as its weakest link – Identity
of scam and phishing incidents
are campaigns enticing users
to click on malicious links
55%
Criminals are
selling stolen or
fabricated accounts
Social media is fertile
ground for pre-attack
intelligence gathering
Source: IBM X-Force® Research 2013 Trend and Risk Report
Mobile and Cloud breaking
down the traditional
perimeter
IAM becomes fist line of
defense with Threat and
Context awareness
© 2015 IBM Corporation8
IBM is positioned
to help
© 2015 IBM Corporation
IBM Security
9
Applications
SYSTEMS
APPLICATIONS
WEB
APPLICATIONS
WEB 2.0
MOBILE
APPLICATIONS
DATACENTERS PCs LAPTOPS
Infrastructure
CLOUDMOBILE NON-TRADITIONALMOBILE
Enterprise Security will need to focus on Identity and Interactions
People
EMPLOYEES ATTACKERS OUTSOURCERS SUPPLIERS
CONSULTANTS PARTNES CONSUMERS
Data STRUCTURED UNSTRUCTURED AT REST IN MOTION
…a holistic approach is needed
CONSUMERS
IN MOTION
MOBILE
APPLICATIONS
MOBILE
EMPLOYEES
UNSTRUCTURED
WEB 2.0
CLOUDPCs
OUTSOURCERS
STRUCTURED
SYSTEMS
APPLICATIONS
© 2015 IBM Corporation
IBM Security
10
IBM Security strategy
Delivering intelligence, integration and expertise across a comprehensive framework
Advanced threats
Cloud
Mobile
Compliance
Skills shortage
Key Security TrendsCISO’s Changing Role
The IBM Security Framework
© 2015 IBM Corporation
IBM Security
11
IBM Security has global reach
monitored countries (MSS)
service delivery experts
devices under contract
+
endpoints protected
+
events managed per day
+
IBM Security by the Numbers
+
+
© 2015 IBM Corporation
IBM Security
12
Client Side Attacks
Botnets
Buffer Overflow Attacks
Distributed Denial of Service (DDoS)
SQL Injection
Backdoors
Cross-site Scripting (XSS)
Malicious Content
Protocol Tunneling
Reconnaissance
Trojans
Worms
Exploit Toolkits
Peer-to-Peer Networks
IBM X-Force delivers expert analysis and threat intelligence
 Cataloging, analyzing and researching vulnerabilities since 1997
 Providing zero-day threat alerts and exploit triage to IBM customers worldwide
 Building threat intelligence from collaborative data sharing across thousands of clients
 Analyzing malware and fraud activity from 270M+ Trusteer-protected endpoints
X-Force Keeps Customers Ahead of the Threat
IBM Security Operations Centers
and Security Products
Sharing real-time and
anonymized threat intelligence
© 2015 IBM Corporation13
Threat aware
Identity and Access
© 2015 IBM Corporation
IBM Security
14
1. Identity is a key security control for a multi-perimeter world
• Operational management
• Compliance driven
• Static, Trust-based
• Security risk management
• Business driven
• Dynamic, context-based
Today: Administration
Tomorrow: Assurance
IAM is centralized and internal
Enterprise
IAM
Cloud IAM
BYO-IDs
SaaS
Device-IDs
App IDs
IAM is decentralized and external
Enterprise
IAM
IaaS,
PaaS
© 2015 IBM Corporation
IBM Security
15
3. Evolving business –driven Identity Governance and Analytics
Wave 1: Administration
 Cost savings
 Automation
 User lifecycle
 Key on premise
applications and
employees
Wave 3: Analytics
 Application usage
 Privileged activity
 Risk-based control
 Baseline normal behavior
 Employees, partners,
consumers – anywhere
Wave 2: Governance
 Role management
 Access certification
 Extended enterprise
and business partners
 On and off-premise
applications
Identity Intelligence – Collect and Analyze Identity Data
Improved visibility
into how access
being utilized
Risk-based insights
for prioritized
compliance actions
Clear actionable
dashboards for better
business decision making
Identity and Governance Evolution
© 2015 IBM Corporation
IBM Security
16
IBM Security
Intelligence
Integration
Expertise
The IBM Security Framework
© 2015 IBM Corporation
IBM Security
17
www.ibm.com/security
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes
only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use
of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any
warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement
governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in
all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole
discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any
way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United
States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and
response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed,
misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product
should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use
or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily
involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT
THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE
MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

More Related Content

PDF
IBM Security Identity and Access Management - Portfolio
PPTX
5 reasons your iam solution will fail
PPTX
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
PPT
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
PDF
Privileged Access Manager Product Q&A
PPTX
IBM Security Portfolio - 2015
PPTX
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
PPTX
Intel IT's Identity and Access Management Journey
IBM Security Identity and Access Management - Portfolio
5 reasons your iam solution will fail
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
Privileged Access Manager Product Q&A
IBM Security Portfolio - 2015
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
Intel IT's Identity and Access Management Journey

What's hot (20)

PDF
Identity Governance: Not Just For Compliance
PDF
Hitachi ID Suite 9.0 Features and Technology
PPTX
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
PDF
IDENTITY ACCESS MANAGEMENT
PPTX
Tuebora Self Driven IAM
PPTX
Identity & access management
PDF
IBM Security - 2015 - Client References Guide
PDF
Identity & Access Management by K. K. Mookhey
PPTX
Identity and Access Management Introduction
PDF
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
PDF
Cloud computing identity management summary
PDF
Secure Identity: The Future is Now
PDF
IBM MaaS360 with watson
PDF
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
PPTX
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
PDF
The Year the Internet Fell Apart
PPTX
Identity and Access Management Playbook CISO Platform 2016
PPTX
Identity and Access Management (IAM): Benefits and Best Practices 
PPTX
Privileged Access Management (PAM)
PDF
Identity and Access Management 101
Identity Governance: Not Just For Compliance
Hitachi ID Suite 9.0 Features and Technology
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
IDENTITY ACCESS MANAGEMENT
Tuebora Self Driven IAM
Identity & access management
IBM Security - 2015 - Client References Guide
Identity & Access Management by K. K. Mookhey
Identity and Access Management Introduction
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
Cloud computing identity management summary
Secure Identity: The Future is Now
IBM MaaS360 with watson
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
The Year the Internet Fell Apart
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management (IAM): Benefits and Best Practices 
Privileged Access Management (PAM)
Identity and Access Management 101
Ad

Viewers also liked (13)

PDF
IBM Security Identity & Access Manager
PPTX
Identity and Access Management (IAM)
PPT
The Gartner IAM Program Maturity Model
PPTX
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
PPTX
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges
PDF
Overview of Identity and Access Management Product Line
PPTX
SCIM 2.0 - Choose your own identity adventure
PDF
Identity Management for the 21st Century IT Mission
PDF
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
PPTX
IBM Security Strategy
PDF
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
PPTX
Identity Access Management 101
PDF
GraphTalks Rome - Identity and Access Management
IBM Security Identity & Access Manager
Identity and Access Management (IAM)
The Gartner IAM Program Maturity Model
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges
Overview of Identity and Access Management Product Line
SCIM 2.0 - Choose your own identity adventure
Identity Management for the 21st Century IT Mission
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
IBM Security Strategy
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
Identity Access Management 101
GraphTalks Rome - Identity and Access Management
Ad

Similar to IBM - IAM Security and Trends (20)

PDF
IBM Security Services Overview
PPTX
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
PPTX
Bordless Breaches and Migrating Malware
PPTX
Security in the Cognitive Era: Why it matters more than ever
PDF
Rochester Security Event
PPTX
Take your SOC Beyond SIEM
PDF
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
PDF
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
PPT
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
PDF
Kista watson summit final public version
PDF
A New Remedy for the Cyber Storm Approaching
PPT
Ibm security overview 2012 jan-18 sellers deck
PDF
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
PDF
IBM Security 2017 Lunch and Learn Series
PDF
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
PPSX
IBM: Cognitive Security Transformation for the Enrgy Sector
PDF
Ibm security products portfolio
PPTX
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
PPT
IBM security systems overview v1.0 - rohit nagarajan
PPT
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
IBM Security Services Overview
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Bordless Breaches and Migrating Malware
Security in the Cognitive Era: Why it matters more than ever
Rochester Security Event
Take your SOC Beyond SIEM
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
Kista watson summit final public version
A New Remedy for the Cyber Storm Approaching
Ibm security overview 2012 jan-18 sellers deck
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IBM Security 2017 Lunch and Learn Series
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM: Cognitive Security Transformation for the Enrgy Sector
Ibm security products portfolio
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
IBM security systems overview v1.0 - rohit nagarajan
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9

More from IBM Sverige (20)

PDF
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
PDF
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
PDF
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

PDF
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
PDF
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
PDF
Multiresursplanering - Karolinska Universitetssjukhuset
PPTX
Solving Challenges With 'Huge Data'
PPTX
Blockchain explored
PPTX
Blockchain architected
PPTX
Blockchain explained
PDF
Grow smarter project kista watson summit 2018_tommy auoja-1
PDF
Bemanningsplanering axfood och houston final
PDF
Power ai nordics dcm
PDF
Nvidia and ibm presentation feb18
PDF
Hwx introduction to_ibm_ai
PPTX
Ac922 watson 180208 v1
PDF
Watson kista summit 2018 box
PDF
Watson kista summit 2018 en bättre arbetsdag för de många människorna
PDF
Iwcs and cisco watson kista summit 2018 v2
PDF
Ibm intro (watson summit) bkacke
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
Multiresursplanering - Karolinska Universitetssjukhuset
Solving Challenges With 'Huge Data'
Blockchain explored
Blockchain architected
Blockchain explained
Grow smarter project kista watson summit 2018_tommy auoja-1
Bemanningsplanering axfood och houston final
Power ai nordics dcm
Nvidia and ibm presentation feb18
Hwx introduction to_ibm_ai
Ac922 watson 180208 v1
Watson kista summit 2018 box
Watson kista summit 2018 en bättre arbetsdag för de många människorna
Iwcs and cisco watson kista summit 2018 v2
Ibm intro (watson summit) bkacke

Recently uploaded (20)

PDF
Machine learning based COVID-19 study performance prediction
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPT
Teaching material agriculture food technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
KodekX | Application Modernization Development
PDF
Network Security Unit 5.pdf for BCA BBA.
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Encapsulation theory and applications.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
Machine learning based COVID-19 study performance prediction
Diabetes mellitus diagnosis method based random forest with bat algorithm
Dropbox Q2 2025 Financial Results & Investor Presentation
Teaching material agriculture food technology
Understanding_Digital_Forensics_Presentation.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
A Presentation on Artificial Intelligence
NewMind AI Monthly Chronicles - July 2025
Agricultural_Statistics_at_a_Glance_2022_0.pdf
KodekX | Application Modernization Development
Network Security Unit 5.pdf for BCA BBA.
The AUB Centre for AI in Media Proposal.docx
Encapsulation theory and applications.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Mobile App Security Testing_ A Comprehensive Guide.pdf

IBM - IAM Security and Trends

  • 1. © 2015 IBM Corporation IBM Security 1© 2015 IBM Corporation IBM IAM Security and Trends Intelligence, Integration and Expertise January 29, 2015
  • 2. © 2015 IBM Corporation IBM Security 2 Sophisticated attackers break through safeguards every day SQL injection Watering hole Physical access MalwareThird-party software DDoSSpear phishing XSS Undisclosed Attack types Note: Size of circle estimates relative impact of incident in terms of cost to business Source: IBM X-Force Threat Intelligence Quarterly – 1Q 2014 2011 Year of the breach 2012 40% increase 2013 500,000,000+ records breached 61% of organizations say data theft and cybercrime are their greatest threats 2012 IBM Global Reputational Risk & IT Study $3.5M+ average cost of a data breach 2014 Cost of Data Breach, Ponemon Institute
  • 3. © 2015 IBM Corporation IBM Security 3 New technologies introduce new risks… 83% of enterprises have difficulty finding the security skills they need 2012 ESG Research 85 security tools from 45 vendors IBM client example …and traditional security practices are unsustainable of security executives have cloud and mobile concerns 2013 IBM CISO Survey 70% Mobile malware growth in just one year 2012-2013 Juniper Mobile Threat Report 614%
  • 4. © 2015 IBM Corporation IBM Security 4 Security leaders are more accountable than ever before Source: Discussions with more than 13,000 C-suite executives as part of the IBM C-suite Study Series Loss of market share and reputation Legal exposure Audit failure Fines and criminal charges Financial loss Loss of data confidentiality, integrity and/or availability Violation of employee privacy Loss of customer trust Loss of brand reputation CEO CFO/COO CIO CHRO CMO Your board and CEO demand a strategy
  • 5. © 2015 IBM Corporation IBM Security 55
  • 6. © 2015 IBM Corporation IBM Security 6 More than half a billion records of PII were leaked in 2013
  • 7. © 2015 IBM Corporation IBM Security 7 Enterprise Security is only as strong as its weakest link – Identity of scam and phishing incidents are campaigns enticing users to click on malicious links 55% Criminals are selling stolen or fabricated accounts Social media is fertile ground for pre-attack intelligence gathering Source: IBM X-Force® Research 2013 Trend and Risk Report Mobile and Cloud breaking down the traditional perimeter IAM becomes fist line of defense with Threat and Context awareness
  • 8. © 2015 IBM Corporation8 IBM is positioned to help
  • 9. © 2015 IBM Corporation IBM Security 9 Applications SYSTEMS APPLICATIONS WEB APPLICATIONS WEB 2.0 MOBILE APPLICATIONS DATACENTERS PCs LAPTOPS Infrastructure CLOUDMOBILE NON-TRADITIONALMOBILE Enterprise Security will need to focus on Identity and Interactions People EMPLOYEES ATTACKERS OUTSOURCERS SUPPLIERS CONSULTANTS PARTNES CONSUMERS Data STRUCTURED UNSTRUCTURED AT REST IN MOTION …a holistic approach is needed CONSUMERS IN MOTION MOBILE APPLICATIONS MOBILE EMPLOYEES UNSTRUCTURED WEB 2.0 CLOUDPCs OUTSOURCERS STRUCTURED SYSTEMS APPLICATIONS
  • 10. © 2015 IBM Corporation IBM Security 10 IBM Security strategy Delivering intelligence, integration and expertise across a comprehensive framework Advanced threats Cloud Mobile Compliance Skills shortage Key Security TrendsCISO’s Changing Role The IBM Security Framework
  • 11. © 2015 IBM Corporation IBM Security 11 IBM Security has global reach monitored countries (MSS) service delivery experts devices under contract + endpoints protected + events managed per day + IBM Security by the Numbers + +
  • 12. © 2015 IBM Corporation IBM Security 12 Client Side Attacks Botnets Buffer Overflow Attacks Distributed Denial of Service (DDoS) SQL Injection Backdoors Cross-site Scripting (XSS) Malicious Content Protocol Tunneling Reconnaissance Trojans Worms Exploit Toolkits Peer-to-Peer Networks IBM X-Force delivers expert analysis and threat intelligence  Cataloging, analyzing and researching vulnerabilities since 1997  Providing zero-day threat alerts and exploit triage to IBM customers worldwide  Building threat intelligence from collaborative data sharing across thousands of clients  Analyzing malware and fraud activity from 270M+ Trusteer-protected endpoints X-Force Keeps Customers Ahead of the Threat IBM Security Operations Centers and Security Products Sharing real-time and anonymized threat intelligence
  • 13. © 2015 IBM Corporation13 Threat aware Identity and Access
  • 14. © 2015 IBM Corporation IBM Security 14 1. Identity is a key security control for a multi-perimeter world • Operational management • Compliance driven • Static, Trust-based • Security risk management • Business driven • Dynamic, context-based Today: Administration Tomorrow: Assurance IAM is centralized and internal Enterprise IAM Cloud IAM BYO-IDs SaaS Device-IDs App IDs IAM is decentralized and external Enterprise IAM IaaS, PaaS
  • 15. © 2015 IBM Corporation IBM Security 15 3. Evolving business –driven Identity Governance and Analytics Wave 1: Administration  Cost savings  Automation  User lifecycle  Key on premise applications and employees Wave 3: Analytics  Application usage  Privileged activity  Risk-based control  Baseline normal behavior  Employees, partners, consumers – anywhere Wave 2: Governance  Role management  Access certification  Extended enterprise and business partners  On and off-premise applications Identity Intelligence – Collect and Analyze Identity Data Improved visibility into how access being utilized Risk-based insights for prioritized compliance actions Clear actionable dashboards for better business decision making Identity and Governance Evolution
  • 16. © 2015 IBM Corporation IBM Security 16 IBM Security Intelligence Integration Expertise The IBM Security Framework
  • 17. © 2015 IBM Corporation IBM Security 17 www.ibm.com/security © Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.