Gadgets

Tivoli Security. Neel Kamal

Description
1 Tivoli Security Neel Kamal Charismatic Products and Companies Charisma of Tivoli Security Tivoli Security Agenda Market and Customer Challenges Solution Overview Target Customer / Buyer
Categories
Published
of 51
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Related Documents
Share
Transcript
1 Tivoli Security Neel Kamal Charismatic Products and Companies Charisma of Tivoli Security Tivoli Security Agenda Market and Customer Challenges Solution Overview Target Customer / Buyer Segments Success Stories Competition Overview IBM H C R U6 IBM Tivoli Security Focus Areas Trusting Identities Managing Access Securing Services Protecting Data Payroll Customers, partners, employees (known) IBM is #1 in this space ENFORCE POLICY Online banking Loan applications Retail sales Inventory Manage those you know. IBM H C R U6 IBM Tivoli Security Focus Areas Trusting Identities Managing Access Securing Services Protecting Data Payroll Customers, partners, employees (known) IBM is #1 in this space Criminals, competitors, hackers (unknown) IBM is #1 in this space ENFORCE POLICY Online banking Loan applications Retail sales Inventory Manage those you know. Protect against those you don t. IBM H C R U6 IBM Tivoli Security Focus Areas Trusting Identities Managing Access Securing Services Protecting Data Payroll Customers, partners, employees (known) IBM is #1 in this space Criminals, competitors, hackers (unknown) IBM is #1 in this space ENFORCE POLICY Online banking Loan applications Retail sales Inventory Manage those you know. Protect against those you don t. Prove that you re in control. COMPLIANCE Tivoli Security Focus Areas Key Security Business Drivers Lower IT Costs (While Enabling Innovation) Address Rising Incidents More than 12 incidents 20% Less than 3 10% Source: Customer Interviews Manage Insider Threat Between 3 and 12 70% Source: IBM; IT Policy Compliance Group Demonstrate Compliance Internal attacks cost 6% of gross annual revenue or $9 per employee per day. Sources: Forrester research, IdM Trends 2006; USSS/CERT Insider Threat Survey 2005/6; CSI/FBI Survey, 2005; National Fraud Survey; CERT, various documents. Example: Need to Meet the Requirements of the PCI Digital Dozen The IBM Security Opportunity is Significant and Growing Worldwide Security Products and Services Revenue, ($B) CAGR (%): Total (11.5%) Physical Security Managed services and systems integration (9.5%) Physical Security Equipment, Software, Appliances (10.2%) IT Security Services (17.1%) IT Security Hardware, Software, Appliances (12%) Security represents a large and fast growing opportunity Strong leadership in Identity and Access Management (IAM), Application Security and Intrusion Prevention Systems (IPS) Source: IDC, Dec Worldwide IT Security Software, Hardware, and Services Forecast : The Big Picture. Source: Lehman Brothers, Nov 2007 Security Industry Annual. (Physical Security segments tracked by Lehman Bros but not included: guarding, armored transportation equipment and services, doors and fences, intelligence & investigation services) Agenda Market and Customer Challenges Solution Overview Target Customer / Buyer Segments Success Stories Competition Overview IBM Security Solutions Portfolio Delivers Comprehensive Security Risk & Compliance Management The only security vendor in the market with an end-to-end framework and solution coverage from both the business and IT security perspectives 15,000 researchers, developers and SMEs on security initiatives 3,000+ security & risk management patents 200+ security customer references and 50+ published case studies Managing over 10 billion security events per day for over 3,700 clients 40+ years of proven success securing the zseries environment $1.5 Billion security spend in 2008 Why being comprehensive is that such a big deal!! Reduce cost by reusing infrastructure Convenience in getting support as needed. Note: 1800 IBM Help world class support Bundle Pricing and discounts We know the destination!! Note: We have everything you need to get their safely and quickly The business Visibility Control Automation Reduce Cost The business Visibility Control Automation Manage Risks Compliance / Governance Enable innovation Reduce Cost The business Visibility Control Automation Manage Risks Compliance / Governance Enable innovation Employees and admins people Customers and Bus. partners Reduce Cost The business Visibility Control Automation Manage Risks Compliance / Governance Enable innovation Employees and admins people Customers and Bus. partners Data Reduce Cost The business Visibility Control Automation Manage Risks Compliance / Governance Enable innovation Employees and admins people Customers and Bus. partners CRM Data Application ERP Reduce Cost The business Visibility Control Automation Manage Risks Compliance / Governance Enable innovation Employees and admins people Customers and Bus. partners CRM Data Application infrastructure ERP Reduce Cost The business Visibility Control Automation Manage Risks Compliance / Governance mitigate Enable innovation assess manage Employees and admins people Customers and Bus. partners CRM Data Application infrastructure ERP Reduce Cost The business Visibility Control Automation Manage Risks Compliance / Governance mitigate Enable innovation assess manage people hackers Employees and admins Customers and Bus. partners Cyber security Data Application development CRM Application infrastructure ERP cloud Reduce Cost The business Visibility Control Automation Manage Risks Compliance / Governance mitigate Enable innovation assess manage people hackers Employees and admins Customers and Bus. partners Cyber security Data Application development CRM Application infrastructure ERP cloud Agenda Market and Customer Challenges Solution Overview Target Customer / Buyer Segments Success Stories Competition Overview To successfully sell security, you must include the right stakeholders during the sales cycle: LOB owners SOA/App Architects Security Admin Network / Operations Application/Db Authorization Federation Identity and Access Management Web Security User Account Provisioning Compliance Key Management Threat Mitigation (The solution categories shown typically move right over time (For ex. - Federation and Web Security both started more in the SOA/Application Architects domain)) Agenda Market and Customer Challenges Solution Overview Target Customer / Buyer Segments Success Stories Competition Overview Major Grocery Business Adopts ISS Technology Across Its Retail Locations to Achieve PCI Compliance Industry: Retail / Distribution Food Lion : one of the largest supermarket chains in the United States, operating 1,300 supermarkets TSV: $1.2 million Client Challenge 1300 Retail Stores upgraded to use New Internet Technologies Had to Remain PCI Compliant Concerned about Internet Threats to the store networks. Client wanted an inexpensive design. IBM Response ISS sales team positioned the IBM Proventia Network MFS (MX1004) as the device of choice for Food Lion. The ISS sales team engaged the MFS product team and was able to beat rival CISCO for the business. IBM Solution IBM Proventia Network Multi-Function Security (MFS) units IBM ISS helps Shearman & Sterling, LLP secure its network and data within 20 days. Industry: Legal TCV: $330,000 - New IBM security white space client! Client challenge When a key security employee unexpectedly left the company, the client needed to act quickly to secure its highly private and global business data. The organization s network was exposed, requiring immediate support Client needed an immediate solution to monitor and manage these devices. IBM Response On Site Executive Discussion. Once the employee left IBM responded immediately to have the solution in place This deal closed in its entirety in only 20 days, including a targeted review of IBM offerings a thorough scoping of the client requirements identification of necessary solutions and final receipt of the signed contract. IBM Security Solution Contract to monitor and manage Cisco products: (8) firewalls and (2) IPS devices. Monitor s Globally in Hong Knong, Bejing, the UK, and the US Tivoli Security Sales Success Stories Tivoli Security Sales Success Stories Full set of Tivoli Security WinWires available in Sales Kits IBM Security Solutions Combined Portfolio: Sum is Greater Than its Parts Wave: ISS Managed Security Services Leader Wave: User Account Provisioning and Enterprise Security Information Management MQ: ISS Network Security, Firewalls and Managed Services MQ: Web Access Management MQ: Security Information & Event Management MQ: User Provisioning ( TIM ) Leader Leader Leader Challenger Leader #1 #1 Marketshare: Web Access Management, Worldwide, ( FIM, TAM ) Ranked #1 ( Rational AppScan ) #1 ISS Managed Security Services and Vulnerability Assessment Ranked #1 #1 Marketshare : Application Security Vulnerability Scanning, Identity Management ( TIM, TAM, FIM, TDI, TDS) Ranked #1 Ranked #1 #1 Marketshare: Identity and Access Management Ranked #1 #1 #1 Marketshare: Application Vulnerability Assessment (Rational AppScan) Ranked #1 Intrusion Prevention System Ranked #1 Why IBM? - Analysts recognize IBM leadership Gartner Leadership Web Access Management Magic Quadrant (November 2009) User Provisioning Magic Quadrant (September 2009) Enterprise Single Sign-On Marketscope Strong Positive (September 2009) Security Information & Event Management Magic Quadrant (May 2009) Managed Security Services Providers, North America Magic Quadrant (April 2009) Forrester Leadership Managed Security Services Market Overview (January 2010) Identity & Access Management Wave (November 2009) Information Security and IT Risk Consulting Wave (March 2009) FOR IBM INTERNAL AND BP USE ONLY IDC Market Share Leadership #1 Identity & Access Management (2009) #1 Application Vulnerability Assessment (2009) #1 Vulnerability Assessment (2009) #1 Intrusion Prevention Systems (IPS) Market Leader for $100,000+ Systems (2009) Frost & Sullivan Leadership Managed Security Services (2009) Latin American Managed Security Services Market Study (2009) North American Network Security Infrastructure Protection Company of the Year (2009) North American Video Surveillance Software Developer Company of the Year (2009) EMA Leadership Website Vulnerability Assessment Value Leader (2009) Agenda Market and Customer Challenges Solution Overview Target Customer / Buyer Segments Success Stories Competition Overview Competitive Landscape IAM Competitive Landscape Questions? 35 36 BACKUP SLIDES IBM Network Intrusion Prevention System Protecting the network ahead of the threat Features: Modular product architecture drives security convergence by adding entirely new modules of protection as threats evolve; from worms to botnets to data security to Web applications, Proventia Network IPS delivers the protection demanded for business continuity, data security & compliance. With a variety of models and solutions ranging in speeds from 10 Mbps to 40 Gbps, Proventia Network IPS offers a model sized specifically for clients differing needs, from remote office deployments to core network applications. Benefits: Stops threats before impact without sacrificing high-speed network performance. Protects networks, servers, desktops and revenue-generating applications from malicious threats. Evolves with network security needs to reduce the cost of managing dozens of different point products. Flexible management options address each client s unique needs. 37 Why IBM? Delivers pre-emptive protection backed by the IBM Internet Security Systems X-Force research and development team Preserves network performance and availability Offers ease of installation, configuration and management 38 IBM Management SiteProtector System Enhancing the effectiveness of security operations through a central point of management Features : Offers a centralized interface to control and manage diverse network and host security devices Incorporates advanced event analytics and flexible, customizable reporting Integrates within existing systems and expands to support additional types and functions of security offerings Why IBM? Benefits : Helps reduce the costs and complexity of security management Enables you to better understand and communicate your enterprisewide security posture of risk Leverages existing investments and skill sets while easing deployment of additional capabilities Provides single management tool that supports broad range of security products and allows cost-effective incremental growth Incorporates time-tested IBM practices and methods as well as industry-leading research from the X-Force team 39 IBM Proventia server protection IBM ISS Threat Mitigation Services endpoint system protection server protection Features: An intrusion prevention system that utilizes multiple layers of defense IBM Virtual Patch technology, buffer overflow exploit prevention (BOEP), application black and white listing and the ability to inspect secure Web transactions before they re delivered to the Web application A firewall to help decrease exposure to malicious activity Why IBM? Benefits: Backed by IBM ISS X-Force research and development team Supported by IBM Managed Protection Services (MPS) Combines multiple inspection technologies to offer superior protection at the deepest network levels Helps ensure data confidentiality and ease regulatory compliance through extensive monitoring Aids in reducing cost and complexity through centralized security management and extensive support for multiple operating systems 40 IBM Proventia Virtual Server Security for VMware Helps customers to be more cost-effective, compliant and secure by delivering integrated and optimized security for virtual data centers Features: Intrusion prevention and Firewall Automatic VM discovery VM rootkit detection and Inter-VM traffic analysis Virtual infrastructure auditing and reporting Virtual network access control IBM Virtual Patch technology Benefits: Enforces dynamic security wherever virtual machines (VMs) are deployed Helps to accelerate and simplify your Payment Card Industry Data Security Standard (PCI DSS) audit, and achieve compliance with security and reporting functionality customized for the virtual infrastructure Increases the ROI of the virtual infrastructure with automatic protection, discovery and assessment features Why IBM? Provides a complete solution for physical and virtual security backed by the worldrenowned security research Enables clients to manage virtual security and existing protection from the same console Example: IBM Solutions for Total PCI Compliance The products outlined in this chart highlight IBM capabilities. Please call your local IBM executive for a full listing of all products and services that map to PCI requirements IBM & BP PROFESSIONAL SERVICES IBM ISS Products & Services Tivoli Security Compliance Manager IBM Global Services IBM Rational AppScan IBM Tivoli Compliance Insight Manager IBM Tivoli Security Operations Manager IBM Proventia Server IPS IBM Global Services IBM Digital Video Surveillance IBM Biometric Access Control IBM Global Services TEST SECURITY SYSTEMS AND PROCESS 11 MONITOR ACCESS 10 RESTRICT PHYSICAL ACCESS 9 UNIQUE IDs IBM Tivoli Identity Manager IBM Tivoli Federated Identity Manager IBM Global Services 8 12 SECURITY POLICY FOR EMPLOYEES & CONTRACTORS IBM Global Services Tivoli Console Insight Manager SECURE & PROTECT CARDHOLDER DATA 6 1 IBM ProventiaServer Intrusion Prevention System (IPS) IBM Proventia Network (IPS) IBM Global Services 4 FIREWALL TO PROTECT CARDHOLDER DATA 2 IBM SOFTWARE SOLUTIONS IBM Tivoli Access Manager IBM ProventiaNetwork Multi-Function Security (MFS) IBM Global Services 3 NO DEFAULT PASSWORDS OR SECURITY PARAMETERS PROTECT STORED CARDHOLDER DATA IBM Storage Manager IBM Proventia Server IPS IBM PKI Services IBM Global Services ENCRYPT TRANSMISSION IBM Data Encryption of IMS and DB2 IBM Websphere Proventia Network Intrusion Prevention System DataPower XML Security Gateway IBM MANAGED SERVICES RESTRICT ACCESS IBM Tivoli Access Manager IBM Tivoli zsecure Admin IBM Tivoli Compliance Insight Manager IBM Global Services 7 SECURE SYSTEMS & APPLICATIONS IBM Software Development Platform IBM Tivoli CCMBD IBM Global Services IBM Rational AppScan 5 USE & UPDATE ANTI-VIRUS SOFTWARE IBM Proventia Desktop Endpoint Security IBM Proventia Network Enterprise Scanner IBM Global Services IBM HARDWARE 41 AP Organizational Resources to Assist AP Sales AP Tivoli Security Leader, ISS Leader Tim Birdsall SPL ITS Sales Leader Ramon Jocson SPL ISS Leader Justine Milne Japan Sales Japan Tivoli Security Leader Keiko Nagatani Japan ISS Leader T Arakawa Japan SPL ITS and ISS Sales Leader Muneyuki Watanabe AP Technical Services-Tivoli James Darwin AP SWAT-Tivoli Chris Hockings AP Technical Pre-sales- Tivoli/ISS Scott Henley Internal Use Only Tivoli WW Security Contacts Overview January 2010 To activate links, view these slides in Screenshow mode. 1 of 5 Product Product/Market Manager Enablement Manager GTM Manager Tivoli (ISS) IBM Proventia Network IPS Eric York Scott Paisley Brian Moran IBM Proventia server protection David Abercrombie Kent Browne Dori White IBM Proventia SiteProtector Charles Arnett Kent Browne Wangui McKelvey IBM Network Multi-function Security (MFS- UTM) Matt Ward Kent Browne Wangui McKelvey IBM Virtual Server Security for VMware David Abercrombie Scott Paisley Dori White Tivoli (IAM/Risk/Compliance Bundles) Identity & Access Assurance Rick Weinberg / Ravi Srinivasan Neel Kamal / Mike Campbell Perry Swenson Data & App Security Rich Telljohan Ray Neucom Kelly Schupp Security Mgmt. for z/os Glinda Cummings Ted Ralston Anne Lescher / Barbara Kennedy Tivoli (IAM/Risk/Compliance Individual Products) TIM Rick Weinberg Neel Kamal Perry Swenson TSPM Ravi Srinivasan Ray Neucom / Mike Campbell Kelly Schupp TAMeb Ravi Srinivasan Ray Neucom / Mike Campbell Perry Swenson TAM E-SSO (Encentuate) E. K. Koh Neel Kamal / Mike Campbell Perry Swenson TAMOS Russ Warren Mike Campbell Perry Swenson TFIM (SOA / F-SSO) Ravi Srinivasan Ray Neucom Perry Swenson TFIM BG Ravi Srinivasan Ray Neucom Perry Swenson TDI Jason Todoroff (Release/Development Manager) Perry Swenson TDS Amit Kapil (Test Management) Perry Swenson TCIM/TSIEM Nick Briers / Luis Casco-Arias TSIEM Collectors) Neel Kamal Kelly Schupp zsecure Suite Glinda Cummings Ted Ralston Anne Lescher / Barbara Kennedy TSOM Luis Casco-Arias Ted Ralston Kelly Schupp TSCM Open Ted Ralston Kelly Schupp TKLM Gordon Arnold Open Kelly Schupp Unified SSO E. K. Koh Neel Kamal Perry Swenson Internal Use Only Tivoli WW Security Contacts Overview January of 5 Tivoli Security Development Venkat Raghavan Director Security Development Other Key Tivoli Security Contacts For information about... Contact... Advanced Tech Group (Manager) Claire Rankin Jim Bowerman - Director, Compliance Products Michael Pintus - TSOM Development Eric van der Schilden TCIM Development Bob Gilliam - Director, Tivoli Security Development Rudy Coward - WW Support (Level 3) Mark Gould Tivoli Security/Directory Development Business Development Channels Competition Education Customer Education - Internal Education/Enablement Technical Enablement Sales IBM VP Security Strategy IGS Security, Risk & Compliance Prod. Mgmt. Jack Desjardins Jocelyn Urdahl (Manager) & Lisa Jensen Blair Drenner Lanny Heidenfelder Steve Criswell Stefan Mueller Joe Carusillo Kristin Lovejoy Randy Orr Greg Adams (Director) Craig Love TIM Development Hans Schoone zsecure Development - Joe Anthony (Program Director Identity/Application Security Product Mgmt. - Chris Bauserman (Mgr. Data Security / Compliance Product Mgmt. * Partial view. For a complete view of the development organization, check BluePages. Pricing Program Manager Security Portfolio Manager Support Planning Tiger Team Rob Spash Sonia Kobdish Jeanette Fetzer Jane Becker Kent Blossom Internal Use Only Tivoli WW Security Contacts Overview January of 5 Service Product Line (SPL) ISS Functional Leadership Matrix Marc van Zadelhoff Dir., WW Sales & Offering Mgt Geo Sales Leaders WW Sales Latha Miripuri PSS Offering Mgmt Jason Hilling & team MSS Offering Mgmt Enablement & Alliances teams Ramon Jocson AP I
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks