IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Similar documents
IBM Internet Security Systems Proventia Management SiteProtector

IBM Security Services Overview

Preemptive security products and services

Symantec Security Monitoring Services

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

align security instill confidence

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

CA Security Management

CYBER RESILIENCE & INCIDENT RESPONSE

Escaping PCI purgatory.

Total Protection for Compliance: Unified IT Policy Auditing

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SIEMLESS THREAT DETECTION FOR AWS

TRUE SECURITY-AS-A-SERVICE

Comprehensive Database Security

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions

Security-as-a-Service: The Future of Security Management

AKAMAI CLOUD SECURITY SOLUTIONS

locuz.com SOC Services

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

White Paper April McAfee Protection-in-Depth. The Risk Management Lifecycle Protecting Critical Business Assets.

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

IBM Proventia Network Multi-Function Security MX0804 and MX1004

Continuous protection to reduce risk and maintain production availability

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Symantec Protection Suite Add-On for Hosted Security

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

IBM Proventia Network Multi-Function Security MX1004

Position Title: IT Security Specialist

Security and Compliance Powered by the Cloud. Ben Friedman / Strategic Accounts Director /

Protecting Your Digital World

INSIDE. Integrated Security: Creating the Secure Enterprise. Symantec Enterprise Security

Grow Your Services Business

to Enhance Your Cyber Security Needs

Cloud for Government: A Transformative Digital Tool to Better Serve Communities

CA Host-Based Intrusion Prevention System r8

SECURITY SERVICES SECURITY

CCISO Blueprint v1. EC-Council

IBM Europe, Middle East, and Africa Services Announcement ZS , dated October 6, 2009

Exam : Title : ASAM Advanced Security for Account Managers Exam. Version : Demo

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

NEXT GENERATION SECURITY OPERATIONS CENTER

AUTOMATED PENETRATION TESTING PRODUCTS Justification and Return on Investment (ROI)

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

RSA INCIDENT RESPONSE SERVICES

Cisco Security: Advanced Threat Defense for Microsoft Office 365

SECURE SYSTEMS, NETWORKS AND DEVICES SAFEGUARDING CRITICAL INFRASTRUCTURE OPERATIONS

What is Penetration Testing?

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

A Survival Guide to Continuity of Operations. David B. Little Senior Principal Product Specialist

Cyber Security Program

SIEM: Five Requirements that Solve the Bigger Business Issues

HP Fortify Software Security Center

Cybersecurity The Evolving Landscape

IBM Proventia Network Enterprise Scanner

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

IBM Internet Security Systems October Market Intelligence Brief

Accelerate Your Enterprise Private Cloud Initiative

DIGITAL TRUST Making digital work by making digital secure

Vulnerability Assessments and Penetration Testing

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

RSA INCIDENT RESPONSE SERVICES

BUILDING AND MAINTAINING SOC

Management Information Systems. B15. Managing Information Resources and IT Security

Protecting your data. EY s approach to data privacy and information security

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

SIEMLESS THREAT MANAGEMENT

THE ACCENTURE CYBER DEFENSE SOLUTION

Combatting advanced threats with endpoint security intelligence

PORTFOLIO OVERVIEW. Security. A Comprehensive Set of Security Services for Today s Complex Cyber Security Needs. Portfolio Overview.

ALERT LOGIC LOG MANAGER & LOG REVIEW

Establish and Maintain Secure Cardholder Data with IBM Payment Card Industry Solutions

Eight important criteria for selecting a managed security services provider

McAfee Total Protection for Data Loss Prevention

IT Consulting and Implementation Services

IBM Proventia Management SiteProtector Sample Reports

IT-CNP, Inc. Capability Statement

Security by Default: Enabling Transformation Through Cyber Resilience

Total Cost of Ownership: Benefits of the OpenText Cloud

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Background FAST FACTS

A Practical Guide to Efficient Security Response

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

Managed Protection Service for Desktop Firewalls Standard

The case for cloud-based data backup

CoreMax Consulting s Cyber Security Roadmap

Maximizing IT Security with Configuration Management WHITE PAPER

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

University of Pittsburgh Security Assessment Questionnaire (v1.7)

A (sample) computerized system for publishing the daily currency exchange rates

Go Cloud. VMware vcloud Datacenter Services by BIOS

Cloud-based data backup: a buyer s guide

CYBER SOLUTIONS & THREAT INTELLIGENCE

Securing Your Digital Transformation

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud

Managed IT Services Eliminating technology pains for SMBs

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Transcription:

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity

Keeping up with quickly evolving ` Internet threats The problem is simple. Organizations simply don t have the resources to keep pace with ever-changing Internet threats. Corporate operations and profits are at risk. Enterprise security is a 24x7 proposition that includes escalating patch management requirements, device management over a diverse IT landscape, and the enforcement of security policies that can affect employees, vendors and customers. At times, these demands can be more than an enterprise can bear but now there is an answer.

Consider the challenges. Sophisticated security requires highly skilled personnel, who are expensive to recruit, hire and retain a proposition that is often impossible for firms with limited IT budgets. Security management diverts scarce IT resources from core-mission activities essential to company productivity and growth. For many companies, patch management alone consumes hundreds of hours a month. Not only that, but security is also a critical component of new government regulations that put executives at risk. For example, the Sarbanes-Oxley Act requires executives to periodically disclose the status of internal controls on corporate financial systems. If improperly managed, enterprise security can inadvertently block legitimate traffic, causing lost or delayed transactions, and can negatively affect revenues and customer satisfaction. The spiraling cost of security makes it more difficult for companies to conduct proper financial planning and resource optimization. Offering true preemptive protection Many providers can monitor the security of a few network devices. But supplying the kind of reliable, comprehensive protection that businesses require to defend their online assets is another matter altogether. IBM Managed Security Services can help. We can deliver the infrastructure, knowledge resources and on demand expertise that can help you safeguard your systems from Internet attacks all at a fraction of the cost of typical in-house security resources. Below are some of the features of our services. Performance-based service level agreements (SLAs) With traditional vendors, SLAs usually offer clients only a day of free service if a violation occurs modest compensation, considering the financial damage hacker attacks can cause. Managed Security Services offers a higher standard of protection through performance-based SLAs that guarantee response times and countermeasures for security events. If the guarantee is not met, you can receive up to a free month of Managed Security Services, not just a single day. For example, when IBM Internet Security Systems (ISS) publishes software updates for the latest threats circulating the Internet, we will apply that intelligence to your systems within 48 hours. If this or any other goal listed in the SLA is not met, you can receive up to a free month of Managed Security Services. Money-back payment Offering a unique preemptive protection, IBM ISS offers performance-based SLAs with a cash-back payment of US$50,000 for any security breach resulting from a successful attack listed on the IBM ISS X-Force Certified Attack List. As a result, our clients can rest assured that their security provider has a vested interest in protecting their infrastructure.* Managed Security Services offers a higher standard of protection through performance-based SLAs.

By offloading security operations to IBM ISS, you gain the advantage of leading-edge tools, skills, processes and experience. The X Factor The IBM ISS X-Force team is a world-class security research organization. It performs industry-leading, proactive research on software vulnerabilities and the attacks targeting them, monitoring and gathering security intelligence from more than 5,000 sources around the globe. The X-Force Certified Attack List includes what we believe are the most critical security threats and is updated regularly. Since 1996, we believe the X-Force team has discovered more major software vulnerabilities than all other commercial organizations combined, in close cooperation with other research labs and government agencies. Because the expertise of the X-Force team drives the management and delivery of IBM Managed Security Services, your organization is firmly positioned to deal with Internet threats yet to come. Strategic effect and value CIOs typically have a difficult time quantifying just how the Internet threatens information resources. Managed Security Services helps by providing a Web-based management portal that integrates service-level data from devices across client networks with early-warning security intelligence gathered by the X-Force team, which it displays in easy-toread, business-focused reports. This enables executives to see the ongoing status of security operations, including attempts to gain unauthorized access, how those attempts were stopped and recommendations on how to prevent similar attacks. Equipped with this information, CIOs can document real threats facing the business, refine and deploy security policies and support efforts to meet compliance requirements. IBM Virtual-Security Operations Center (Virtual-SOC) The Virtual-SOC serves as the engine enabling all Managed Security Services and the delivery of protection on demand. The Virtual- SOC combines the capabilities of five global security operations centers with advanced analysis and correlation, artificial intelligence, industry-leading security expertise and a high-impact Web-based management portal in a single unified system. The Virtual-SOC is designed to reduce the complexity and burden of manual data analysis and improve the accuracy of security event identification, incident escalation and remediation. The result is a

state-of-the-art, expert system that helps organizations optimize resources, reduce the complexity of managing security, enforce security policy and improve the overall security posture. Performance and productivity gains Consider offloading security operations to IBM ISS. You can gain the advantage of leading-edge tools, skills, processes and experience. You can realize an improvement in system uptime and performance as well as a reduction in capital investment technology and resources. Plus, when freed from day-to-day security monitoring and management, organizations can enhance productivity by reallocating in-house IT resources to more strategic initiatives. Multiple vendor support Don t take our word for it. Managed Security Services supports other security solutions that have received significant recognition and acceptance in the marketplace. In addition to managing IBM products, we also support intrusion prevention systems (IPSs), intrusion detection systems (IDSs), firewalls and other technologies from vendors such as 3Com (IPS), Check Point (firewall), Cisco (IDS/firewall), Juniper (firewall) and McAfee (IPS). So, virtually regardless of your vendor mix, IBM Managed Security Services can incorporate event identification, incident escalation and remediation, firewall, intrusion prevention, anti-virus, anti-spam, content security, and virtual private network (VPN) capabilities found in the marketplace-leading IBM Proventia suite of protection solutions. The result is a state-of-the-art, expert system that can help organizations optimize resources, reduce the complexity of managing security, enforce security policy and improve the overall security posture. Performance and productivity gains By offloading security operations to IBM ISS, you gain the advantage of leading-edge tools, skills, processes and experience. You can realize an improvement in system uptime and performance as well as a reduction in capital investment technology and resources. Plus, when freed from day-to-day security monitoring and management, you can enhance productivity by reallocating in-house IT resources to more strategic initiatives. When freed from day-to-day security monitoring and management, organizations can enhance productivity by reallocating inhouse IT resources to more strategic initiatives.

IBM ISS services command the extensive knowledge, innovative research methods and complex technologies required to achieve preemptive security.

IBM Managed Protection Services for servers Real-time, 24x7 guaranteed protection and expert management, monitoring and escalation for critical server devices across a variety of platforms and operating systems, with up to one month of free service if we fail to meet the guarantee. IBM Managed Protection Services for desktops Real-time, 24x7 guaranteed protection and expert management for desktop environments using our marketplace-leading desktop firewall, intrusion prevention, anti-virus compliance, virus prevention system (VPS) and buffer overflow exploit prevention technologies, with up to one month of free service if we fail to meet the guarantee. IBM Managed & Monitored Firewall Services Comprehensive 24x7 expert monitoring, management and analysis of firewall data to aid in the detection, prevention and response to the evolving threat spectrum. IBM Managed IDS & IPS Services for networks and servers 24x7 expert monitoring, management and analysis of intrusion-detection events, designed to allow for real-time response, investigation and recovery to effectively help minimize risk and prevent downtime from attacks stemming from points inside and outside the network perimeter. IBM Vulnerability Management Service Real-time management and analysis of servers, firewalls, switches and other devices; comprehensive, on demand security audits that identify, analyze and report on network security vulnerabilities; and real-time communication with IBM ISS vulnerability experts. IBM Express Managed Security Services for e-mail security a variety of services to enhance your existing security posture that can help prevent viruses and spam and control unwanted content in e-mail. IBM Express Managed Security Services for Web security protection for your company from Internet threats with 24x7 scanning that can help stop viruses and spyware before they can compromise the network; simple to deploy and easy to manage, it protects with robust anti-virus, anti-spyware and URL-filtering technologies. Why IBM? Preemptive security is a requirement for today s business. It requires marketplace-leading research, an expert eye for attack trends and techniques, and a streamlined and affordable platform for delivering advanced security solutions that are knowledge based. IBM ISS services command the extensive knowledge, innovative research methods and complex technologies required to achieve preemptive security. Our experienced consultants, architects, project managers and subject matter experts are prepared to provide your organization with a comprehensive platform of preemptive security solutions designed to protect your entire IT infrastructure, from the network gateway to the desktop.

For more information To learn more about IBM Managed Security Services, contact your IBM ISS representative to schedule a consultation. Call 1 800 776-2362, send an e-mail to consulting@iss.net or visit: ibm.com/services/us/iss Copyright IBM Corporation 2007 IBM Global Services Route 100 Somers, NY 10589 U.S.A. Produced in the United States of America 07-07 All Rights Reserved IBM, the IBM logo, Internet Security Systems, Proventia and X-Force are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. Other company, product and service names may be trademarks or service marks of others. References in this publication to IBM products or services do not imply that IBM intends to make them available in all countries in which IBM operates. * Money-back payment (for IBM Managed Protection Services Premium Level only): If IBM Internet Security Systems fails to meet the Security Incidents Prevention Guarantee, client shall be paid US$50,000 for each instance this guarantee has not been met. Please see IBM Internet Security Systems SLAs for more details. GTB01476-USEN-00