Securing a Dynamic Infrastructure. IT Virtualization new challenges

Similar documents
Everyday Security: Simple Solutions to Complex Security Problems

Securing a Dynamic Infrastructure. Avinash Pandey CISA CISSP ITIL-F PMP IBM Internet Security Systems, ASEAN

Handling Economic Uncertainty While moving forward to a Smarter Planet

Cisco Start. IT solutions designed to propel your business

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Securing Digital Transformation

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

IBM Security Services Overview

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

Best Practices in Securing a Multicloud World

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Accelerate Your Enterprise Private Cloud Initiative

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

align security instill confidence

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

Application Security at Scale

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

New Zealand Government IbM Infrastructure as a service

Run the business. Not the risks.

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23

Securing Your Most Sensitive Data

Go Cloud. VMware vcloud Datacenter Services by BIOS

locuz.com SOC Services

Redefining IT distribution. The Portfolio. The Nuvias vendor portfolio

accelerate your ambition Chris Jenkins

Simplify Your Network Security with All-In-One Unified Threat Management

Reinvent Your 2013 Security Management Strategy

CIO Forum Maximize the value of IT in today s economy

Enabling Security Controls, Supporting Business Results

Cyber Resilience. Think18. Felicity March IBM Corporation

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

CISO View: Top 4 Major Imperatives for Enterprise Defense

SECURITY SERVICES SECURITY

Where are you with your Cloud or Clouds? Simon Kaye Dr Cloud

Smart Data Center Solutions

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

Evolving the Security Strategy for Growth. Eric Schlesinger Global Director and CISO Polaris Alpha

Continuous protection to reduce risk and maintain production availability

Service Provider Consulting

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

TSC Business Continuity & Disaster Recovery Session

Certified Information Systems Auditor (CISA)

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Security-as-a-Service: The Future of Security Management

Policy-Based Security, Compliance, and Risk Management

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

Accelerating the Business Value of Virtualization

Architektura bezpieczeństwa dla otwartych zintegrowanych systemów administracji publicznej

CCISO Blueprint v1. EC-Council

WHITE PAPER. Applying Software-Defined Security to the Branch Office

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY

What It Takes to be a CISO in 2017

Improving Data Governance in Your Organization. Faire Co Regional Manger, Information Management Software, ASEAN

New Zealand Government IBM Infrastructure as a Service

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES:

Cloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION

Leading our discussion today

Green Governance Growth

Better skilled workforce

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Securing Your Digital Transformation

RiskSense Attack Surface Validation for IoT Systems

INTELLIGENCE DRIVEN GRC FOR SECURITY

To Audit Your IAM Program

NEXT GENERATION SECURITY OPERATIONS CENTER

Copyright 2016 EMC Corporation. All rights reserved.

MAXIMIZE SOFTWARE INVESTMENTS

Cyber Security Maturity Model

AT&T Endpoint Security

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

Implementing ITIL v3 Service Lifecycle

Modern Database Architectures Demand Modern Data Security Measures

Building a Resilient Security Posture for Effective Breach Prevention

IT Consulting and Implementation Services

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Cybersecurity. Securely enabling transformation and change

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Planning and Implementing ITIL in ICT Organisations

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Think Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe

Symantec Data Center Transformation

The Road to a Secure, Compliant Cloud

Strengthen hybrid cloud operations and controls with Liquid Sky. Singtel Business

SIEMLESS THREAT DETECTION FOR AWS

Computing as a Service

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

OPTIMIZATION MAXIMIZING TELECOM AND NETWORK. The current state of enterprise optimization, best practices and considerations for improvement

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

New Digital Business Models Driving the Softwarization of the Network

Practical Guide to Platform as a Service.

The Oracle Trust Fabric Securing the Cloud Journey

Services for Smart Solutions: Delivering Innovations & Efficiency Surendran Vangadasalam

DIGITAL TRUST AT THE CORE

Transcription:

Christian Fahlke GMT Channel Leader Internet Security Systems IBM Central & Eastern Europe, Middle East and Africa (CEEMEA) May 20th, 2009 Securing a Dynamic Infrastructure IT Virtualization new challenges

Global market forces are impacting us all Reality of living in a globally integrated world Widespread impact of economic downturn and uncertainty Energy shortfalls and erratic commodity prices New customer demands and business models Information explosion and risk/opportunity growth Businesses are under increasing pressure to effectively: Manage operational cost and complexity Deliver continuous and high-quality service Address security risks intensified by innovation, emerging technologies, data/information explosion, etc. We have seen more change in the last 10 years than in the previous 90. Ad J. Scheepbouwer, CEO, KPN Telecom The planet is getting instrumented, interconnected and intelligent. 2

Welcome to the smart planet and a smarter infrastructure Globalization and Globally Available Resources Billions of mobile devices accessing the Web Access to streams of information in the Real Time New Forms of Collaboration New possibilities. New complexities. New risks. 3

Managing risks introduced by new opportunities Emerging technology Virtualization and cloud computing increase infrastructure complexity and can reduce visibility to overall risk posture. Web 2.0 and SOA style composite applications introduce new challenges with the applications being a vulnerable point for breaches and attack. Data and information explosion Data volumes are doubling every 18 months.* Storage, security, and discovery around information context is becoming increasingly important. Wireless world Mobile platforms are developing as new means of identification. Mobile security technology is less mature than the security used to protect PCs. Supply chain The chain is only as strong as the weakest link partners need to shoulder their fair share of the load for compliance and the responsibility for failure. Clients expect privacy An assumption or expectation now exists to integrate security into the infrastructure, processes and applications to maintain privacy. Compliance fatigue Organizations are trying to maintain a balance between investing in both the security and compliance postures. *Source: Pyramid Research, October 2007 4

Not all risks are created equal Frequency of Occurrences Per Year Virus Data Corruption Data driven frequent infrequent 1,000 100 10 1 1/10 1/100 1/1,000 1/10,000 Worms System Availability Failures Disk Failure Network Problem Data Leakage Application Outage Failure to meet Compliance Mandates Lack of governance Business driven Failure to meet Industry standards Workplace inaccessibility Terrorism/Civil Unrest Regional Power Failures Building Fire Natural Disaster Pandemic Event driven 1/100,000 $1 $10 $100 $1,000 $10k $100k $1M $10M $100M Consequences (Single Occurrence Loss) in Dollars per Occurrence low high 5

neither are all Security solutions Find a balance between effective security and cost The axiom never spend $100 dollars on a fence to protect a $10 horse Studies show the Pareto Principle (the 80-20 rule) applies to IT security* 87% of breaches were considered avoidable through reasonable controls Small set of security controls provide a disproportionately high amount of coverage Critical controls address risk at every layer of the enterprise Organizations that use security controls have significantly higher performance* Pressure Cost Complexity Effectiveness Agility Time *Sources: W.H. Baker, C.D. Hylender, J.A. Valentine, 2008 Data Breach Investigations Report, Verizon Business, June 2008 ITPI: IT Process Institute, EMA December 2008 6

IBM Security Solutions why do our customers invest into virtualisation Reduce Costs Mitigate Risks Increase Productivity Provide immediate savings and lower total cost of ownership Ensure business continuity Enable innovation 7

Basics: Virtualization Architecture After Virtualization Before Virtualization Applications Applications Applications Operating System Operating System Operating System M or Hypervisor Hardware 8 8

What does Virtualization Change? Everything Dynamic, fluid data-center Resource pools Commoditization of everything Increased efficiency Nothing Virtual IT is still IT Security Management Complexity heterogeneity 9

Virtualization and Enterprise Security Virtualization!= Security Standard servers are as secure as standard s Partitioning divides s, but does not secure them Same principles apply Defense in depth Network design and segmentation Unified security management 10

Threat Landscape New Swath of Availability Attacks Owning a single guest Breaking out of the guest Compromise of Virtual Console/Management Provision my own evil guest(s) Adjust resource quotas Shut OFF guest(s) Compromise of the M/Hypervisor IsGameOver() 11

Securing a Dynamic Infrastructure Organizational Ownership? Who owns the Virtual [Fill in the Blank]? Network Admin? Server Admin Application Owners Data Custodians Traditional Security Who s Watching? Physical NICs Service Process Service Service Process Process Management Physical Network 12 12 Service Process Service Process Service Process Service Service Process Process Service Process Virtual Network

New Operational Challenges Find the Server Live Migration makes servers harder to track Configuration/Patch Management Pause/Offline features impact: Audits Scanning Patching Image Management Storage Version Control 13 13

What Can I Do? 14 14

The IBM Security Framework From Reactive Security to a Risk-Aware Enterprise Security Risk Measurement Strategy The The IBM IBM Security Security Framework Framework Security Security Governance, Governance, Risk Risk Management Management and Compliance and Compliance People and Identity Data and Information Security Information and Event Management Identity and Access Management Change and Configuration Management Threat and Vulnerability Management Managed Firewall Anti-Virus and Reactive Compliant Consolidated Risk Aware Application and Process Network, Server, and End-point Physical Infrastructure Common Policy, Event Handling and Reporting Common Policy, Event Handling and Reporting Tactics Automation Control Visibility Intelligence 15

The Security Optimization Approach Redefine and Simplify Risk Management Re-evaluating priorities to balance risk in light of evolving challenges Establish a Total Security Framework and Solutions Portfolio Leveraging innovation and integration in consideration of holistic security and IT infrastructure Simplify the Security Risk Lifecycle Aligning with business processes to ensure continuous improvement Join with a Transformative Security Partner to Achieve these New World Imperatives Adding world-class expertise for success today and in the future 16

Security Optimization Process Overview A proven integrated lifecycle methodology that improves the enterprise s ability to control and manage risk Phase 5. Educate Action: Education and knowledge transfer of security best practices Phase 1. Assess Action: Assess current level of security effectiveness and strengthen network and security posture by identifying vulnerabilities and weakness against best-practices Result: Improved employee understanding and skills related to security Phase 4. Manage and Support Action: Management of security infrastructure/program to meet defined business objectives Result: Insures gaps remain closed and new gaps are not opened by providing improved protection, lowering TCO, and demonstrating compliance Phase 3. Deploy Result: Gap analysis and resolution recommendations between current state and requirements. Phase 2. Design Action: Design and documentation of policies, procedures, and architecture/solutions to ensure protection and extension of business capabilities Results: Creation of gap closure plan for short and long-term resolution to ensure optimization of security infrastructure Action: Expert deployment, implementation, tuning, and change support 17 Results: Helps client execute gap closure plan, improve performance and cost savings

Only IBM Security is backed by the IBM X-Force research team Research Technology Solutions Original Vulnerability Research Public Vulnerability Analysis Malware Analysis Threat Landscape Forecasting Protection Technology Research X-Force Protection Engines Extensions to existing engines New protection engine creation X-Force XPU s Security Content Update Development Security Content Update QA X-Force Intelligence X-Force Database Feed Monitoring and Collection Intelligence Sharing The X-Force team delivers reduced operational complexity helping to build integrated technologies that feature baked-in simplification 18

IBM global security reach 8 Security Operations Centers 9 Security Research Centers 133 Monitored Countries 20,000+ Devices under Contract 3,700+ MSS Clients Worldwide 2.5 Billion+ Events Per Day IBM has the unmatched global and local expertise to deliver complete solutions and manage the cost and complexity of security 19

Next steps To learn more about security from IBM, visit: ibm.com/security In-depth briefings on security solutions that map to your needs Collaborative workshop or assessment from IBM or our Certified Business Partners Proof of technology / concept 20

Securing IBM a Dynamic Infrastructure Christian Fahlke Channel Leader IBM Internet Security Systems Central-, Eastern Europe, Middle East & Africa fahl@ch.ibm.com Thank you 21