Mobily and IBM Managed Security Solutions

Transcription

Mobily and IBM Managed Security Solutions
Mobily and IBM
Managed Security Solutions
Tamer Aboualy, Ph.D.
CTO, Security Services
GTS Middle East and Africa
IBM
Ahmed Abdel Hamid
Security Services
IBM Saudi Arabia
© 2013 IBM Corporation
Introduction: Dr. Tamer Aboualy
Qualifications
Tamer Aboualy, Ph.D
CTO, IBM Security Services
Africa & Middle East
[email protected]
2
Over 18 years of experience in IT and Security.
Previously was IBM Canada’s Security Services CTO.
Responsibilities included:
• Security executives managing security at Canada’s largest
governments, financial institutions, telecommunication
companies, and more.
• Canada’s security architecture, strategy, and vision.
• Implementations, transitions, & operations
• Innovation and applied security research.
• Security Operations Center (SOC) executive sponsor and
lead
Executive sponsor and lead for MEA Security Operations Center
(SOC)
Executive security sponsor for managed security services to
government, financial institutions, telecommunications, energy (Oil
and Gas) and others
Wealth of applied knowledge in information assurance, compliance,
security architectures and cryptography.
Various security patents (Intrusion protection, cloud security, others)
Expert speaker at security conferences (ISACA, GOVTECH, VISA,
CLOUD, IDC Canadian Bankers Association, and many others).
Education:
• Bachelors of Information Systems (Ryerson University
Toronto Canada)
• Masters of Science in Telecommunications and Networks
(Syracuse University, New York, USA)
• Ph.D. in Information Systems (Nova Southeaster University,
Florida, USA)
Current Focus: CTO for MEA Security Services
© 2013 IBM Corporation
Agenda
• The Evolving Threat Landscape
• Managed Security Solutions (MSS)
• MSS Offerings Portfolio
3
© 2013 IBM Corporation
Security Today
The Evolving Threat Landscape
4
© 2013 IBM Corporation
IT Security has become a routine Board Room discussion
Business
Results
5
Brand
Image
*Sources for all breaches shown in speaker notes
Systems
Availability
Legal
Exposure
Personal
Harm
Audit
Risk
© 2013 IBM Corporation
Motivations and sophistication are rapidly evolving
Motive
1995 – 2005
1st Decade of the
Commercial Internet
2005 – 2015
2nd Decade of the
Commercial Internet
Nation-state actors
National Security
Espionage,
Political Activism
Monetary Gain
Revenge
Curiosity
Competitors, hacktivists
Organized criminals with
sophisticated tools
Insiders, using inside information
Script-kiddies or hackers
6
© 2013 IBM Corporation
JK 2012-04-26
Adversary
The new security landscape - Sophisticated attackers are a primary concern
Potential Impact
Threat
Profile Type
Advanced
threat /
mercenary
National
governments
Terrorist cells
Crime Cartels
Malicious
Insiders
Employees
Contractors
Outsourcers
Hacktivist
Social Activists
Opportunist
Worm and virus
writers
“Script Kiddies”
Share
of Incidents
Attack Type
Espionage
Intellectual property theft
Systems disruption
Financial Crime
23%
15%
Financial Crime
Intellectual Property Theft
Unauthorized Access/
7%
Systems disruption
Web defacement
Information Disclosure
49%
Malware propagation
Unauthorized Access
Web defacement
Source: Government Accountability Office, Department of Homeland Security's Role in Critical Infrastructure
Protection Cybersecurity, GAO-05-434; IBM CyberSecurity Intelligence & Response Team, September 2012
7
© 2013 IBM Corporation
IBM Cyber Intelligence Update
Each Week The Average Company
Experiences 2.6M Security Attacks
Which Result in approximately
60 Security Incidents
Companies with Mature Cyber
Security Programs have 90% fewer
incidents and are better prepared
to respond to those that do occur
more effectively
8
2013Scorecard
IBM Corporation
IBM Cybersecurity Intelligence & Response Team, Q4’ ©
2012
IBM has tracked a massive rise in advanced and other attacks
2012 Sampling of Security Incidents by Attack Type, Time and Impact
Conjecture of relative breach impact is based on publicly disclosed information regarding leaked records and financial losses
Source: www.ibm.com/security
IBM X-Force Intelligence Report
9
© 2013 IBM Corporation
The year of the Security Breach
When was
the last time
you checked
your web
application?
-Pg 17. Anonymous and
Lulsec were major players
in the SQL tactics.
-Most activity from
automated scanners like
LizaMoon
10
- Pg 27. SQL Injection is specially formatted statements to
manipulate underlining web app.
-15 days after Sony announced fixed their breach, Lulsec
posted 150K customer account details!
- Typically used first to understand DB schema, then used to
retrieve data. 2008 we seen first newer attack. Attackers would
inject script and gain root access
© 2013 IBM Corporation
Saudi Arabia is the MOST SPAM’d Country!
11
© 2013 IBM Corporation
Security Landscape in the Kingdom
KSA double the global average of infected computers!
Source: www.microsoft.com/sir
Microsoft Regional Security Intelligence Report
12
© 2013 IBM Corporation
Catagories of Unwanted Software (malware) in Saudi Arabia
Source: www.microsoft.com/sir
13
Microsoft Regional Security Intelligence Report
© 2013 IBM Corporation
Security challenges are complex and require a high level of
expertise and innovation to protect against today’s threats
Employees
Hackers
People
Consultants
Nation
States
Outsourcers
& Terrorists
Suppliers
Customers
Outsourcers
Data
Structured
Structured
Unstructured
At rest
In motion
Applications
Systems
Systems
Applications
Applications
Web
Applications
Web 2.0
Mobile
Applications
Infrastructure
Datacenters
14
PCs
Laptops
Mobile
Cloud
Non-traditional
© 2013 IBM Corporation
The skills shortage for security practitioners leave clients seeking a
trusted partner to provide managed security solutions
are unable to
find people with
the right skills
complain of the
inability to measure
the effectiveness
of their current
security efforts
struggle with
an understaffed
IT team
81% of chief information security officer functions are re-organizing or
have been re-organized within the last six months.
Corporate Executive Board, IREC Study, July 2012
15
© 2013 IBM Corporation
Clients can be confident knowing that IBM Security Services are
backed by IBM’s strong market leadership and analyst recognition
IBM Managed Security Services
IBM Security Consulting Services
“IBM has the largest client base of the participants... Clients praised the flexibility, knowledge, and
responsiveness …while also noting the company’s excellent documentation. Organizations looking for a
high-quality vendor that can do it all and manage it afterwards should consider IBM.”
Source: Forrester Research Inc. “Forrester WaveTM”: Information Security Consulting Services, Q1 2013”. And Forester Wave:
Managed Security Services providers Q1, 2012
Full report can be accessed at http://www.ibm.com
16
© 2013 IBM Corporation
IBM has a broad base of consulting services to provide end to end
solutions. Partnered with Mobily we offer unparalleled Managed
Services and Security Intelligence.
Security Consulting &
Professional Services
Managed Services
•Globally available managed security
services platform
•Manage security operations, detect
and respond to emerging risk
Security Operations Optimization
Infrastructure
and Endpoint
Security
Identity and
Access
Management
Managed Security
Expertise
17
9
Intelligence
Data and
Application
Security
Cybersecurity Assessment and
Response
•6000+ Security Consultants &
Architects
•Assess security risk and
compliance, evolve security program
Security Strategy, Risk and Compliance
Integration
© 2013 IBM Corporation
IBM Managed Security Solutions provided through Mobily provide local
capability while benefiting from unmatched global security coverage
Experience & Expertise
• MSS business founded 1995
• Employee tenure average 4.5 yrs
• Embedded X-Force intelligence
Market Leadership
Riyadh, KSA
• Forrester Wave
• Gartner Magic Quadrant
• Frost & Sullivan
BCP/DRP & Compliance
MSS Global Facts and Figures
• 11 Security Operations Centers
• 3,700+ MSS clients worldwide
• 20,000+ security devices
• 15B+ security events daily
• Fully redundant services
• BC/DRP test performed annually
• SSAE-16, PCI, FFIEC, ITCS-104
• Recording over 30k incident daily
• Monitoring in 133 countries
• Using a grid of 725+ systems
• Maintaining 99.9+% availability
6,000 researchers, developers and subject matter experts
working security initiatives worldwide
18
© 2013 IBM Corporation
Protecting Our Clients
Managed Security Solutions
19
© 2013 IBM Corporation
IBM has a broad base of consulting services to provide end to end
solutions. Partnered with Mobily we offer unparalleled Managed
Services and Security Intelligence.
Security Consulting &
Professional Services
Managed Services
•Globally available managed security
services platform
•Manage security operations, detect
and respond to emerging risk
Security Operations Optimization
Infrastructure
and Endpoint
Security
Identity and
Access
Management
Data and
Application
Security
Managed Security
Mobily Standard Security Portfolio
Expertise
20
9
Intelligence
Cybersecurity Assessment and
Response
•6000+ Security Consultants &
Architects
•Assess security risk and
compliance, evolve security program
Security Strategy, Risk and Compliance
Integration
© 2013 IBM Corporation
Our capabilities cover the wide range of specialized security functions
Security Analysis
Key Functions
•Threat Intelligence Gathering
•Event and Vulnerability Analysis
•Impact Analysis
•Incident Management
•Investigations
•Enforcement Optimization
•Risk Assessments, Briefings,
and Advisories
Security Operations
Key Functions
•Security Monitoring
•Incident Monitoring & Escalation
•Security Application Management
•Configuration Management
•Policy Management
Security Intelligence Platform
Key Functions
•Aggregate Security Event/Log Data
21
•Correlation, Rules & Feeds
© 2013 IBM Corporation
Managed Security Solutions portfolio can address a wide variety of
challenges and business requirements
Managed Security
Services (CPE)
Managed Security
Services (Cloud)
Hosted security event and log
management services
Managed firewall services
Managed and monitored IPS
and IDS services
Security
Requirements
Managed and monitored
UTM services
Hosted vulnerability
management services
Hosted IBM X-Force threat
analysis service
Multiple device types and
vendors supported
Intrusion Protection System
Intrusion Detection System
UTM: Unified Threat Management
IPS:
IDS:
22
© 2013 IBM Corporation
Managed Network Security Services: Firewall, IDPS, UTM
Solution Overview
IBM’s Managed Security Services for Firewall, IPS and
UTM are designed to reduce the operational overhead
associated with the day to day management of core
security technologies that provide the foundational
elements for an organization’s overall security posture.
These offerings combine management, monitoring, and
maintenance across a variety of leading technologies
and service levels.
Customer Pain Points
Multiple technologies create a challenge for skills management
Proper security administration requires round the clock support,
Compliance mandates competency beyond that of many organizations
Security teams are needed for more strategic activities but security
technologies remain complex and cumbersome to implement.
Faster time to deploy and reduced operational overhead within multivendor environments.
Provides 24x7 support for round the clock monitoring, response, and
management.
23
Key Features
Support for market leading technologies
Checkpoint, Cisco, IBM, Juniper, McAfee, Tipping
Point, Sourcefire, Palo Alto, etc.
Support for comprehensive product features
Most major product features are supported:
Virtualization, multiple policies, traffic shaping,
content security, custom signatures, etc.
Industry leading service level agreements
Service level agreements that set the benchmark for
the industry including incident response, change
management, system monitoring, portal availability,
content updates, etc.
Two offering packages to ensure flexibility
The offerings are designed to meet the needs of less
demanding to the most mission critical of
environments.
Integrated service views via the IBM Virtual SOC
IBM’s proprietary web based interface ensures realtime on-demand access to the latest service
information including alerts, advisories, system
configuration, and comprehensive workflow and
reporting capability.
© 2013 IBM Corporation
Cloud Security Services: IBM X-Force Threat Analysis Service
Solution Overview
IBM Security Services' X-FORCE Threat Analysis Service (XFTAS)
is a security intelligence service that delivers customized
information about a wide array of threats that could affect your
network security. XFTAS helps you proactively protect your
networks with detailed analyses of global online threat conditions.
A single source for up-to-the minute, customized security
information
Expert analysis and correlation of global security threats
Actionable data and recommendations that help you maintain
your network security
Easily accessed 24x7x365 through the VSOC Portal
Partner with a trusted security advisor
Unique
Value
24
The IBM X-FORCE Threat Analysis Service combines high-quality, real-time threat
information from an international network of Security Operations Centers with security
intelligence from the X-Force research and development team to develop
comprehensive evaluations and recommendations suited to your business.
© 2013 IBM Corporation
Cloud Security Services: Security Event and Log Management
Solution Overview
The Security Event and Log Management Service (SELM)
enables compilation of the event and log files from network
applications, operating systems, and security technologies into
one seamless platform. The SELM offering allows for
automated analysis of IPS data as well as robust query and
research capabilities against a variety of disparate log types.
Customer Pain Points
Information and event management solutions can be overly complex
SIM implementation can take months and hundreds of thousands of dollars
Many solutions struggle to scale when real-time analysis is required
Reporting requirements are often not met by off-the-shelf solutions
Improved time to value by leveraging an on-demand cloud- based
platform versus cumbersome CPE deployment options.
Quickly analyze data from multiple geographies and technologies via
a single web-accessible interface.
Cloud-based deployment allows for seamless off-site storage of critical
log data.
Optional outsourcing of event monitoring activity to IBM experts on a
shift-by-shift basis!
Key Features
Two tiers of service
SELM is available in Standard and Select service
levels, allowing for varying degrees of analysis and
analytics to be applied to varying data types.
Integrated workflow and analysis capabilities
With SELM’s integrated workflow and analysis
capabilities, security issues can be investigated,
escalated, and recorded using IBM’s web-based
tools.
Seamless blending of MSS and non-MSS data
SELM allows for data of managed and unmanaged
devices to be stored in the same systems and
seamlessly interacted with as though all data is part
of a common data set.
Custom log parser and correlation engine
Easily use regular expressions to add support for
custom log sources and correlation rules. Unique IBM
functionality!
Forensically sound storage and archival
SELM employs best practice processes for data in
motion and at rest as suggested by IBM’s own
Emergency Response Services team.
25
© 2013 IBM Corporation
Cloud Security Services– Hosted Vulnerability Management overview
Solution Overview
Offers network-based vulnerability assessment from the cloud
via the VSOC web portal. Scans can be configured and
scheduled via the web, with scanning performed from the cloud
or via IBM managed scanners at the customer premises.
Results are archived in the cloud and accompanied by
reporting, workflow, and remediation capabilities.
Customer Pain Points
Vulnerabilities allowing hackers easy access to client systems
Proper assessment and remediation are required for compliance initiatives
Today’s solutions are difficult to use and manage
Customers can’t prioritize remediation efforts for identified vulnerabilities
Faster time to deploy and more accurate detection of vulnerabilities,
helping customers identify risks and ultimately improve their security
posture
More efficient end-to-end process for remediating vulnerabilities, and
better tracking for compliance purposes
Streamlined SaaS delivery model gives customers full control without the
expense and distraction of owning and managing scanning infrastructure
Core Capabilities
Vulnerability management
Agentless scanning from both inside and outside the
firewall to find exposures.
Remediation guidance and workflow
Fix vulnerabilities quickly and easily with the
information provided in remediation reports.
PCI compliance assistance
IBM can serve as an approved scanning vendor
(ASV) in support of PCI compliance initiatives.
Intelligent scanning
Delivers accurate scanning results in less time with a
system that follows an assessment process similar to
that used by ethical hackers. Fewer false positives
mean less time spent tracking down “potential”
vulnerabilities.
Web application vulnerability detection
Identifies SQL injection, cross-site scripting, and
other high-risk vulnerabilities in web applications.
Database vulnerability detection
Identifies vulnerabilities in common databases and
database configurations.
26
© 2013 IBM Corporation
Mobily clients have full visibility into work being performed through
the Virtual Security Operations Center portal (V-SOC)
Virtual-SOC technology platform
Anti Virus and
filtering
Normalize
Aggregate
Correlate
Vulnerability
Archival
Security
Operations
Center (SOC)
Aggregation
Networking
devices
Internet
Correlation
Workflow
Aggregation
Archive
Escalate
Remediate
Applications
Firewalls and IDS
and IPS1
27
Reporting
Virtual-SOC
portal
Virtual Security Operations
Center (V-SOC)
© 2013 IBM Corporation
Mobily-IBM Managed Security Services Customer Portal
28
© 2013 IBM Corporation
Tack
ευχαριστώ
Greek
Hindi
Swedish
Спасибо
Russian
Thai
Asante sana
Gracias
Swahili
Spanish
Thank You
Arabic
Portuguese
Danke
Dankie
Grazie
Obrigado
Merci
German
Afrikaans
Italian
French
Hvala
Slovenian
Simplified Chinese
Korean
Köszönöm
Hungarian
Japanese