Cisco & IBM Security SECURING THE THREATS OF TOMORROW, TODAY, TOGETHER

Similar documents
May the (IBM) X-Force Be With You

Cybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY

Integrated, Intelligence driven Cyber Threat Hunting

Be effective in protecting against the cybercrime

The New Era of Cognitive Security

Threat Intelligence to enhance Cyber Resiliency KEVIN ALBANO GLOBAL THREAT INTELLIGENCE LEAD IBM X-FORCE INCIDENT RESPONSE AND INTELLIGENCE SERVICES

Le sfide di oggi, l evoluzione e le nuove opportunità: il punto di vista e la strategia IBM per la Sicurezza

Fabrizio Patriarca. Come creare valore dalla GDPR

Notice on Names and Logos Used in This Presentation

Detect Fraud & Financial Crime

IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT

IBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

IBM Security Vaš digitalni imuni sistem. Dejan Vuković Security BU Leader South East Europe IBM Security

Securing global enterprise with innovation

IBM Security Network Protection Solutions

RSA NetWitness Suite Respond in Minutes, Not Months

SIEM Solutions from McAfee

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Integrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries

Best Practices in Securing a Multicloud World

Threat Containment and Operations. Yong Kwang Kek, Director of Presales SE, APJ

ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK

Compare Security Analytics Solutions

MITIGATE CYBER ATTACK RISK

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

Cisco Advanced Malware Protection against WannaCry

CloudSOC and Security.cloud for Microsoft Office 365

Automated Response in Cyber Security SOC with Actionable Threat Intelligence

align security instill confidence

Healthcare Cognitive Security

GDPR: An Opportunity to Transform Your Security Operations

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM

AKAMAI CLOUD SECURITY SOLUTIONS

Ponemon Institute s 2018 Cost of a Data Breach Study

SYMANTEC DATA CENTER SECURITY

Aligning with HIPAA mandates in healthcare

IBM Future of Work Forum

ForeScout ControlFabric TM Architecture

Let s Talk About Threat Intelligence

Cybersecurity Roadmap: Global Healthcare Security Architecture

Designing and Building a Cybersecurity Program

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

How to Secure Your Cloud with...a Cloud?

Combatting advanced threats with endpoint security intelligence

How to Predict, Detect & Stop threats at the Edge and Behind the Perimeter even in encrypted traffic without decryption

THE ACCENTURE CYBER DEFENSE SOLUTION

Traditional Security Solutions Have Reached Their Limit

locuz.com SOC Services

Stop Threats Before They Stop You

IBM services and technology solutions for supporting GDPR program

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER

Incident Response Agility: Leverage the Past and Present into the Future

McAfee Endpoint Threat Defense and Response Family

Cisco Advanced Malware Protection for Endpoints

McAfee Advanced Threat Defense

RSA INCIDENT RESPONSE SERVICES

The Internet of Everything is changing Everything

Un SOC avanzato per una efficace risposta al cybercrime

Cisco Security Enterprise License Agreement

AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment

Aby se z toho bezpečnostní správci nezbláznili Cisco security integrace. Milan Habrcetl Cisco CyberSecurity Specialist Mikulov, 5. 9.

McAfee epolicy Orchestrator

INTELLIGENCE DRIVEN GRC FOR SECURITY

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

IBM Threat Protection System: XGS - QRadar Integration

SOLUTION BRIEF RSA NETWITNESS PLATFORM ACCELERATED THREAT DETECTION & AUTOMATED RESPONSE FROM THE ENDPOINT TO THE CLOUD

esendpoint Next-gen endpoint threat detection and response

An Investment Checklist

Cisco Firepower NGFW. Anticipate, block, and respond to threats

How Boards use the NIST Cybersecurity Framework as a Roadmap to oversee cybersecurity

AT&T Endpoint Security

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

The McGill University Health Centre (MUHC)

Security-as-a-Service: The Future of Security Management

RSA INCIDENT RESPONSE SERVICES

Security. Made Smarter.

with Advanced Protection

Cisco Ransomware Defense The Ransomware Threat Is Real

NEXT GENERATION SECURITY OPERATIONS CENTER

Cisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

Predators are lurking in the Dark Web - is your network vulnerable?

IBM BigFix Compliance

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

BUILDING AND MAINTAINING SOC

Infoblox as Part of the Ecosystem

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

Optimizing IBM QRadar Advisor with Watson

Cisco Security: Advanced Threat Defense for Microsoft Office 365

SOLUTION BRIEF ASSESSING DECEPTION TECHNOLOGY FOR A PROACTIVE DEFENSE

Prescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC

deep (i) the most advanced solution for managed security services

Transcription:

Cisco & IBM Security SECURING THE THREATS OF TOMORROW, TODAY, TOGETHER Nicky Choo Head, Routes to Market & Business Partners, Asia Pacific, IBM Security & Cloud Jul 2018

Disconnected security capabilities Security analytics Privileged user management Access management User behavior analytics Data access control Incident response Data protection Endpoint patching and management Fraud protection Identity governance and administration Network forensics and threat management Network visibility and segmentation Mainframe security Vulnerability management IDaaS Malware protection Application security management Firewalls Device management Sandboxing Virtual patching Transaction protection Application scanning Indicators of compromise Criminal detection Content security Endpoint detection and response Malware analysis Threat sharing Threat and anomaly detection Threat hunting and investigation 2 IBM Security

Traditional security practices are unsustainable How do I 45 vendors Improve real-time visibility across the diverse threat landscape and disparate technologies 85 security tools from Effectively detect and respond to malware and advanced threats MILLION unfilled security positions 1.8 by 2022 Integrate risk, compliance and security analytics to increase security efficiency PERCENT of CEOs are reluctant to share incident 68 information externally Streamline security operations against a backdrop of talent and funding shortage Focus on regulatory compliance 3 2018 IBM Corporation 3 2018 IBM Corporation

We exist to protect the world, freeing you to thrive in the face of cyber uncertainty Largest enterprise cybersecurity provider Leader in 12 security market segments 3,700+ security patents 20+ security acquisitions 60B+ security events monitored per day 4 2018 IBM Corporation

Disconnected security capabilities are failing us Security analytics Privileged user management Access management User behavior analytics Data access control Incident response Data protection Endpoint patching and management Fraud protection Vulnerability management Threat sharing Identity governance and administration Network visibility and segmentation Mainframe security Network forensics and threat management Application scanning Malware protection IDaaS Device management IoCs Endpoint detection and response Transaction protection Criminal detection Content security Firewalls and intrusion prevention Malware analysis Threat and anomaly detection Application security management Threat hunting and investigation 5 2018 IBM Corporation

Build an integrated security immune system Data protection Data access control Application scanning Application security management APPS DATA Security analytics Vulnerability management Threat and anomaly detection IDENTITY & ACCESS Privileged user management Identity governance and administration Access management IDaaS Mainframe security Transaction protection Device management Content security MOBILE SECURITY ORCHESTRATION & ANALYTICS ADVANCED FRAUD Fraud protection Criminal detection Endpoint detection and response Endpoint patching and management Malware protection ENDPOINT Threat hunting and investigation User behavior analytics Incident response NETWORK Firewalls and intrusion prevention Network forensics and threat management Network visibility and segmentation THREAT INTEL Threat sharing Malware analysis IoCs 6 2018 IBM Corporation

IBM Security Immune System ON PREM CLOUD HYBRID AppScan Application Security on Cloud o SDLC Consulting o X-Force Red Guardium Multi-cloud Encryption Key Manager o Critical Data Protection Services APPS QRadar Watson DATA Resilient i2 IDENTITY & ACCESS SECURITY ECOSYSTEM App Exchange o Hybrid Cloud Security Services Identity Governance & Access Cloud Identity zsecure o Identity Management Services MaaS360 o Mobile Device Management MOBILE SECURITY ORCHESTRATION & ANALYTICS ADVANCED FRAUD Trusteer o Financial Malware Research BigFix o Managed Detection & Response ENDPOINT o Security Operations Consulting o X-Force Command Centers o X-Force IRIS THREAT INTEL NETWORK QRadar Incident Forensics QRadar Network Insights o Managed Network Security o Secure SD-WAN 7 2018 IBM Corporation X-Force Exchange Malware Analysis o X-Force IRIS Products o Services

Why Are IBM Security & Cisco Partnering? Better serve the large number of mutual customers that both companies share Joint portfolio of industry leading, complementary solutions that leverage each organization s strength to deliver more effective security Market leaders in respective segments, industries with a 360 alliance Highest levels of executive sponsorship and engagement 8 IBM Security

Two Trusted Advisors: IBM Security & Cisco Simple Breakdown siloes and reduce complexity via a collaborative approach, self-deployed or turnkey via IBM services Open Feature rich extensions and integrations that deliver security outcomes across the diverse threat landscape Orchestrated Rapidly detect and respond to advanced threats via a drillable dashboard of key Cisco threat telemetry from a single pane of glass 9 IBM Security

0 Cisco Security and IBM Security Together Ingest Cisco threat and networks telemetry Apply IBM QRadar Security Analytics & Watson AI engine Identify & Prioritize Capture & classify threats for faster response Orchestrate & Respond To prioritized incidents with IBM Resilient Prioritized incidents Sense Analytics Watson QRadar supports over 25 Cisco product families out of the box Advanced analytics for threat prevention, detection, and response Orchestrate incident response across people, process and technology 10 IBM Security

IBM X-Force Threat Management & Cisco Partnership IBM X-Force Threat Management & Cisco Partnership A Smarter Security Solution to Manage the 360 degree Threat Lifecycle, Aligned to the NIST Framework Insight Prevention Detection Response Recovery Cisco Firepower (Network Discovery), AMP for Endpoints, Security Online Visibility Assessment (SOVA) Cisco AMP IR Package and Umbrella Cisco Stealth Watch & Firepower Cisco Talos Threat Intelligence Cisco StealthWatch Cloud, CloudLock, AMP, Umbrella, FirePower, ISE, ESA, WSA, AnyConnect Cisco ISE and FirePower Cisco Umbrella Investigate, AMP Visibility, Threat Grid, Talos Cisco Security Services (augmentation & special domain expertise) Cisco Rapid Threat Containment Cisco AMP IR Package, Umbrella, Talos Cisco FirePower Mgmt Console Cisco, Security Online Visibility Assessment (SOVA) Cisco Security BU engineering, Dedicated Security Consulting Engineer Metrics & Reporting Issue Management Change Management Enhancements Governance Programmatic Framework Maturity Approach SOC Use Case Library Response Playbooks X-Force Expertise Security Testing 24x7 Command Centers Incident Response Smarter Platform QRadar analytics and Watson AI Resilient intelligence orchestration Mobile App 11 IBM Security

Security Hub Zero Trust Security Cisco Firepower is the heart of the IBM Security Architecture Zero Trust Security Secure Application Access to Simplify the Network and Enable Virtualized Cloud & Data Center Services Strong Security for users Secure Multi-Cloud Application Protection Software-Defined Security Benefits Programmable Security End-to-End Segmentation Agile Security Services SECURE INTERNET BREAKOUT IBM Security Hub MULTI CLOUDS PRIVATE DATA CENTERS SECURE SD-WAN MPLS WIRELESS SITE EDGE SITE EDGE IBM Security Hubs High Feature Security Services Maximized Network Availability with Any Network Transport. Secure and resilient high availability Network with Strong Encrypted Zero Trust Security Integrated Security Network and Security Integrated together Proactive Analytics Secure Guest Access Any Person, Anywhere, Any Department, Any Device Strong Security for all locations: Firewall, IDS, IAP, DDoS, Malware-AV, DNS Firewall, Ransomware, Anti-Spam, URL Filtering, SSL VPN, IPSec, User FW Machine ID 12 IBM Security

IBM Security and Cisco Join Forces to Tackle Cybercrime Offering integrated technologies, services and threat intelligence collaboration Products Security Analytics Incident Response Threat Intelligence Managed and Consulting Services IBM QRadar SIEM, UBA & Watson for Cyber Security IBM Resilient IBM X-Force X-Force Threat Management Security Hub Cisco Firepower, Cisco Cloud (Umbrella, Cloudlock), Stealthwatch Cisco Threat Grid, ASA, ESA, WSA, Netflow, Routers, Switches, IOS Cisco Identity Services Engine (ISE) Cisco Threat Grid, Cisco Umbrella Enforcement & Investigate Cisco TALOS Services above based on wide variety of Cisco Security products 13 IBM Security

Talos and X-Force Collaboration WannaCry Ransomware Leverages known exploits Infiltrates endpoints, encrypts all files, demanding a $300 USD ransom in bitcoin Exploits a known Windows vulnerability that enables remote code execution (patch available since March) Crippled at least 100K organizations across multiple industries in over 150 countries 300k+ infected endpoints Cisco TALOS and IBM X-Force IRIS teams collaborated in support of our mutual customers, and continue to work 1 together on leading threats X-Force Exchange integrates with Cisco Threat Grid 14 IBM Security

Ecosystem of Collaborative Defenses: IBM Security App Exchange IBM Security App Exchange Share and download apps based on IBM security technologies 175+ IBM and partner Apps 100K+ app downloads 15 IBM Security

Cisco Apps for IBM Security p Better and deeper integrations via out-of-the-box extensions and apps between Cisco, QRadar and Resilient that remove integration costs from your business Detect and respond to threats faster via deep visibility and actionable insights into the most critical threats (based off of Cisco s threat telemetry) from a single dashboard Improve SOC effectiveness via simple and streamlined operations including drillable dashboards and workflows direct from from QRadar and Resilient vs toggling between disparate views 16 IBM Security

Stop Threats at the Edge with Cisco Firepower and IBM QRadar Before the App Firepower sends large volumes of event types to QRadar in most environments, and customers need to tune their SIEM accordingly. QRadar SIEM prioritizes threats, but didn t always deliver full depth of Firepower insights After the App The Firepower App for QRadar streamlines investigations into critical security event information. The App provides a new drillable QRadar dashboard that delivers a consolidated view of key Firepower metrics and easy, direct access to underlying data. Prioritizes information about intrusion activity through easy to understand graphs and metrics. 17 IBM Security

Cisco Firepower App for QRadar: Stop Threats at the Edge INCIDENT ALERT Firepower intrusion, advanced threat, or IoC event happens against high profile asset Firepower Impact Assessment determines asset is vulnerable to this attack and sends a Severity 1 event to QRadar Network analytics detects abnormal behavior Firepower detects outbound connection to a known bad site based on IP, URL or DNS threat intelligence Watson reveals wider campaign, Malware other IOCs Asset Database Fully Qualified Event Network Behavior Analytics IP/URL/DNS Threat Intelligence Cognitive Analysis 18 IBM Security

Expedite Threat Investigation with Cisco Threat Grid and IBM QRadar Before the App Threat Grid provides automated malware analysis and integrated threat intelligence, from samples submitted by Cisco and 3 rd party security products, including IBM Resilient and X-Force Exchange. Time consuming to investigate threats and understand the full scope and veracity in context. Alert fatigue with the potential of missing alerts in the noise of event data. After the App Streamlines investigations into critical security event information, identified by submitting source. Reduce time to detect and respond to threats on a single interface. Understand the scope and veracity of threats with right click functionality from QRadar to Threat Grid for deeper malware analysis (ex. hash values, IPs) 19 IBM Security

Cisco Threat Grid App for QRadar: Expedite Threat Investigation INCIDENT ALERT QRadar generates a security offense, including a suspicious file File is submitted to Threat Grid for dynamic and static malware analysis Threat Grid analyses the behavior of the sample and determines a threat score, 70+ displayed in QRadar App Analyst alerted to samples with high threat to network, and single click to view analysis report in Threat Grid Threat Grid provides integrated behaviour and threat intelligence to take incident response action with Resilient or other remediation Unknown Threat Submit Sample to Threat Grid Automated Malware Analysis Alert and Pivot to Report Intelligence and Response 21 IBM Security

Prevent & Contain Threats: Cisco ISE App for QRadar Address these concerns: Unmanaged or unknown users on the network Limited contextual awareness of users & devices Non-compliant devices with expired or invalid antivirus software Unable to enforce consistent security policies inside the network Inability to segment and contain threats on the network 22 IBM Security

The App Now Accelerates Policy enforcement everywhere in complex security deployments from the network to the endpoint and cloud. Streamlining threat containment by invoking quarantine actions on ISE pxgrid from the QRadar console. Time to identify unknown or unmanaged devices roaming on the network, including Internet of Things devices. Understanding the scope and veracity of at-risk users and devices through a single, aggregated QRadar dashboard, drilling down into targeted endpoints. 23 IBM Security

Incident Response: How Can Organizations Address these concerns: Understand step by step what happened in a security incident and breach Respond quickly and effectively to a security incidents Maintain compliance with breach and security incident response requirements Understand what threats the organization is experiencing and the effectiveness and cost of response and management Be ready to respond to a breach or the next major zero day 24 IBM Security

Orchestration Goes Beyond Incident Response ORCHESTRATION is the coordination of activities, both human and automated (people, process, technology) AUTOMATION is taking action without human intervention. 25 IBM Security

Resilient Intelligent Orchestration 26 IBM Security

Cisco Threat Grid & Resilient: Orchestrate Incident Response RESPONSE SPEED Incident analysis and root cause Orchestrated response with best practice playbooks and automated response Endpoint activity visibility and action Network data forensics gathering additional evidence Coordinated response across Sec Ops, IT, Legal and Comms Cognitive Analytics Orchestration & Playbooks Endpoint Integration Network Insights & PCAP Built-in Compliance Intel 27 IBM Security

What Makes Cisco & IBM Security A Better Option. Eliminate blind spots created by unknown or unmanaged devices roaming on the network, including Internet of Things devices Gain full visibility of all users, devices, network activity and see authentication and remediation data in a single dashboard vs toggling between disparate tools Prioritized set of alerts based on QRadar advanced analytics applied to Cisco event/threat data including offense chaining that correlates malicious activities around asset, user, domain. into a single incident Enforce policies and contain threats everywhere from the network to the endpoint to users and cloud Simplify and expedite incident response by taking immediate remediation actions (ex. quarantine) directly from the QRadar interface and orchestrating incident response directly from Resilient based on Cisco threat telemetry 29 IBM Security

30 8/3/2018 30 IBM Security

Integrated Solutions At-a-Glance Applications Cisco integrated security portfolio with IBM QRadar and Resilient for rapid analysis and remediation Threat Intelligence Facilitate collaboration between two leading threat research teams: IBM X-Force and Cisco Talos Services IBM Consulting and Managed Security Services team collaborating with Cisco to deliver new services to further reduce complexity for customers 31 IBM Security

THANK YOU FOLLOW US ON: ibm.com/security securityintelligence.com ibm.com/security/community xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions Copyright IBM Corporation 2018. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.