IBM Security Systems Smarter Security per MSP Giovanni Todaro IBM Security Systems Leader Le tecnologie Innovative stanno cambiando tutto attorno a noi… 2 1.000 miliardi di oggetti collegati 1 Miliardo di lavoratori mobile Social business Bring your own IT Cloud e virtualizzazione © 2013 IBM Corporation Attacchi: Motivazioni e raffinatezza sono in rapida evoluzione Nazioni – Stati Cyberwar Stuxnet Sicurezza Nazionale Spionaggio, Attivismo Guadagno Finaziario Vendetta, Curiosità 3 Competitors e Hacktivists Aurora Criminalità Organizzata Zeus Insiders and Script-kiddies Code Red © 2013 IBM Corporation Il mondo sta diventando più digitalizzato ed interconnesso, aprendo la porta alle minacce emergenti e le perdite di dati… IBM Security Solutions Focus DATA EXPLOSION CONSUMERIZATION OF IT 4 Le organizzazioni continuano a muoversi a nuove piattaforme compresi cloud, virtualizzazione, mobile, social business e molto altro ancora SECURITY INTELLIGENCE Con l'avvento di Enterprise 2.0 e di social business, la linea tra le ore di uso personale e professionale, i dispositivi e dei dati è scomparso MOBILE SECURITY EVERYTHING IS EVERYWHERE L'età dei Big Data - l'esplosione di informazioni digitali - è arrivata ed è facilitata dalla pervasività delle applicazioni accessibili da ovunque ATTACK SOPHISTICATION La velocità e la destrezza degli attacchi è aumentata accoppiata con nuove motivazioni della criminalità informatica CLOUD SECURITY ADVANCED THREAT © 2013 IBM Corporation IBM Vi porta nell’Era della Security Intelligence IBM Security Solutions Le organizzazioni hanno bisogno di un nuovo approccio alla sicurezza che sfrutta l'intelligenza per stare al passo con l'innovazione. IBM Security Intelligence guida il cambiamento da una strategia "point-product" ad un framework integrato di sicurezza aziendale: La traduzione dei dati di Security in conoscenze fruibili: •Riduce i rischi ed i costi commerciali •Innovazione con agilità e sicurezza • Migliora la continuità operativa 13 Miliardi di eventi di Security gestiti giornalmente 5 1,000 Security Patents 9 Security Operations Centers 600 Security Sales Professionals 11 Laboratori di sviluppo per Soluzioni di Security © 2013 IBM Corporation IBM Security: Fornire l'intelligenza, l'integrazione e le competenze in un Framework completo Incrementa Incrementa la la Accuratezza Accuratezza ee la la consapevolezza consapevolezza nella nella Security Security Individuare Individuare ee prevenire prevenire minacce minacce avanzate avanzate Una Una maggiore maggiore visibilità visibilità ee consapevolezza consapevolezza della della situazione situazione Condurre Condurre indagini indagini complete complete sugli sugli incidenti incidenti Semplicità Semplicità di di Gestione Gestione Semplificare Semplificare la la gestione gestione del del rischio rischio ee ilil processo processo decisionale decisionale Migliorare Migliorare le le capacità capacità di di controllo controllo ee di di accesso accesso Riduzione Riduzione dei dei costi costi ee complessità complessità Fornire Fornire una una rapida rapida installazione, installazione, un un minore minore TCO TCO lavorando con un unico partner strategico, con lavorando con un unico partner strategico, con un un ampio ampio portafoglio portafoglio integrato integrato Intelligence Intelligence ●● Integration Integration ●● Expertise Expertise 6 © 2013 IBM Corporation Fattori chiave che influenzano il business del sw di sicurezza Non è più sufficiente proteggere il perimetro - attacchi sofisticati stanno aggirando le difese tradizionali, le risorse IT sono in movimento al di fuori del firewall, e le applicazioni aziendali ed i dati sono sempre più distribuite su diversi dispositivi 1. Advanced Threats 2. Cloud Computing La sicurezza è una delle preoccupazioni principali del cloud, in quanto i clienti drasticamente ripensano il modo in cui sono state progettate, distribuite e consumate le risorse IT. Sofisticati, attacchi mirati, volti a ottenere l'accesso continuo alle informazioni critiche, sono in aumento nella severità e nella ricorrenza. Advanced Persistent Threats Stealth Bots Designer Malware Targeted Attacks Zero-days 3. Mobile Computing Come gestire dispositivi di proprietà dei dipendenti e garantire connettività alle applicazioni aziendali sono esigenze da indirizzare per i CIO ampliando il supporto per dispositivi mobili. 7 Enterprise Customers 4. Regulations and Compliance Le pressioni normative e le conformità continuano ad aumentare insieme alla necessità di memorizzare i dati sensibili e le aziende diventano suscettibili ai fallimenti di audit. © 2013 IBM Corporation Fattori chiave che influenzano il business del sw di sicurezza Non è più sufficiente proteggere il perimetro - attacchi sofisticati stanno aggirando le difese tradizionali, le risorse IT sono in movimento al di fuori del firewall, e le applicazioni aziendali ed i dati sono sempre più distribuite su diversi dispositivi 1. Advanced Threats 2. Cloud Computing La sicurezza è una delle preoccupazioni principali del cloud, in quanto i clienti drasticamente ripensano il modo in cui sono state progettate, distribuite e consumate le risorse IT. Sofisticati, attacchi mirati, volti a ottenere l'accesso continuo alle informazioni critiche, sono in aumento nella severità e nella ricorrenza. BIG DATA Advanced Persistent Threats Stealth Bots Designer Malware Targeted Attacks Zero-days 3. Mobile Computing Come gestire dispositivi di proprietà dei dipendenti e garantire connettività alle applicazioni aziendali sono esigenze da indirizzare per i CIO ampliando il supporto per dispositivi mobili. 8 Enterprise Customers 4. Regulations and Compliance Le pressioni normative e le conformità continuano ad aumentare insieme alla necessità di memorizzare i dati sensibili e le aziende diventano suscettibili ai fallimenti di audit. © 2013 IBM Corporation Una migliore protezione contro gli attacchi più sofisticati Misconfigured Firewall 0day Exploit Malicious PDF Phishing Campaign Vulnerable Server Spammer Infected Website SQL Injection Botnet Communication On the Network 9 IBM Advanced Threat Protection Across the Enterprise IBM QRadar Security Intelligence Brute Force Malicious Insider Across the World IBM X-Force® Threat Intelligence © 2013 IBM Corporation IBM offre Soluzioni di Security in tutte le aree della Cloud Security IBM protegge contro i rischi di cloud comuni con un ampio portafoglio di soluzioni flessibili e di livelli di sicurezza IBM Security Federated Identity Manager 10 IBM Security Key Lifecycle Manager Protezione contro le minacce, riconquistare visibilità e dimostrare la compliance con il monitoraggio delle attività, il rilevamento delle anomalie e la Security Intelligence © 2013 IBM Corporation Mettere in sicurezza il Mobile Enterprise con le soluzioni IBM 11 © 2013 IBM Corporation La strategia IBM per la Data Security Data Security • Proteggere i dati in qualsiasi forma, in qualsiasi luogo, da minacce interne o esterne • Semplificare i processi di Compliance • Ridurre i costi operativi circa la protezione dei dati Governance, Governance, Security Security Intelligence, Intelligence, Analytics Analytics Audit, Audit, Reporting, Reporting, and and Monitoring Monitoring 12 integrate integrate Security Solutions Solutions Security Data Data Discovery Discovery and and Classification Classification Stored over Network at Endpoint (Databases, File Servers, Big Data, Data Warehouses, Application Servers, Cloud/Virtual ..) (SQL, HTTP, SSH, FTP, email,. …) (workstations, laptops, mobile,…) IT & & Business Business Process Process IT Policy-based Policy-based Access Access and and Entitlements Entitlements © 2013 IBM Corporation Un Portfolio completo in tutti i domini di sicurezza Security Ecosystem Partner Partner Programs Programs rd (3 (3rd party) party) Standards 13 © 2013 IBM Corporation IBM Identity and Access Management - Visione e Strategia Temi Chiave… Standardized IAM and Compliance Management Expand IAM vertically to provide identity and access intelligence to the business; Integrate horizontally to enforce user access to data, app, and infrastructure 14 Secure Cloud, Mobile, Social Interaction Enhance context-based access control for cloud, mobile and SaaS access, as well as integration with proofing, validation and authentication solutions Insider Threat and IAM Governance Continue to develop Privileged Identity Management (PIM) capabilities and enhanced Identity and Role management © 2013 IBM Corporation Data Security Vision QRadar Integration Across Multiple Deployment Models Temi Chiave… Reduced Total Cost of Ownership Expanded support for databases and unstructured data, automation, handling and analysis of large volumes of audit records, and new preventive capabilities 15 Enhanced Compliance Management Enhanced Database Vulnerability Assessment (VA) and Database Protection Subscription Service (DPS) with improved update frequency, labels for specific regulations, and product integrations Dynamic Data Protection Data masking capabilities for databases (row level, role level) and for applications (pattern based, form based) to safeguard sensitive and confidential data © 2013 IBM Corporation Application Security Vision Temi Chiave… Coverage for Mobile applications and new threats Continue to identify and reduce risk by expanding scanning capabilities to new platforms such as mobile, as well as introducing next generation dynamic analysis scanning and glass box testing 16 Simplified interface and accelerated ROI New capabilities to improve customer time to value and consumability with out-of-the-box scanning, static analysis templates and ease of use features Security Intelligence Integration Automatically adjust threat levels based on knowledge of application vulnerabilities by integrating and analyzing scan results with SiteProtector and the QRadar Security Intelligence Platform © 2013 IBM Corporation Infrastructure Protection – Endpoint Vision Temi Chiave… Security for Mobile Devices Provide security for and manage traditional endpoints alongside mobile devices such as Apple iOS, Google Android, Symbian, and Microsoft Windows Phone - using a single platform 17 Expansion of Security Content Continued expansion of security configuration and vulnerability content to increase coverage for applications, operating systems, and industry best practices Security Intelligence Integration Improved usage of analytics providing valuable insights to meet compliance and IT security objectives, as well as further integration with SiteProtector and the QRadar Security Intelligence Platform © 2013 IBM Corporation Threat Protection Vision Security Intelligence Platform Threat Intelligence and Research Advanced Threat Protection Log Manager SIEM Network Activity Monitor Risk Manager Future Vulnerability Data Malicious Websites Malware Information IP Reputation Future Intrusion Prevention Content and Data Security Web Application Protection Network Anomaly Detection Application Control Future IBM Network Security Temi Chiave… Advanced Threat Protection Platform Helps to prevent sophisticated threats and detect abnormal network behavior by using an extensible set of network security capabilities - in conjunction with real-time threat information and Security Intelligence 18 Expanded X-Force Threat Intelligence Increased coverage of world-wide threat intelligence harvested by XForce and the consumption of this data to make smarter and more accurate security decisions Security Intelligence Integration Tight integration between the Advanced Threat Protection Platform and QRadar Security Intelligence platform to provide unique and meaningful ways to detect, investigate and remediate threats © 2013 IBM Corporation X-Force Threat Intelligence: The IBM Differentiator X-Force database – il più esteso catalogo di vulnerabilità Web filter database – il DB relativo a Siti infetti o malevoli IP Reputation – botnets, anonymous proxies, bad actors Application Identification – web application information X-Force Threat Intelligence Cloud 19 Vulnerability Research – le + aggiornate vulnerabilità e protezioni Security Services – gestiscono IPS più di 3000 Clienti © 2013 IBM Corporation Security Intelligence: L'integrazione tra silos IT Security Devices Servers & Hosts Network & Virtual Activity Event Correlation Database Activity Offense Activity Baselining & Identification Anomaly Detection Application Activity Configuration Info Vulnerability Info User Activity Extensive Data Sources High Priority Offenses + Deep Intelligence = Exceptionally Accurate and Actionable Insight JK 2012-04-26 20 © 2013 IBM Corporation Tutti i domini alimentano la Security Intelligence Correlate new threats based on X-Force IP reputation feeds Hundreds of 3rd party information sources Guardium Identity and Access Management Database assets, rule logic and database activity information Identity context for all security domains w/ QRadar as the dashboard Tivoli Endpoint Manager Endpoint Management vulnerabilities enrich QRadar’s vulnerability database 21 IBM Security Network Intrusion Prevention System Flow data into QRadar turns NIPS devices into activity sensors AppScan Enterprise AppScan vulnerability results feed QRadar SIEM for improved asset risk assessment © 2013 IBM Corporation IBM Qradar La Security Intelligence per la protezione dei Data Center Luigi Perrone IBM SWG - Security Systems & z/OS Security Agenda Qradar overview Demo Considerazioni finali 23 © 2013 IBM Corporation Perché una Security Intelligence ? • Risposta alle esigenze di auditing • Automazione e snellimento dei processi di raccolta eventi • Collezionamento eventi multi-sorgente • Gestione e archiviazione sicura dei dati di log (conformità alle normative) • Aggregazione dati e correlazione eventi • Monitor ed analisi dati per: - identificazione scoperture/anomalie di sicurezza - attivazione allarmi - avvio processi investigativi - report di conformità 24 © 2013 IBM Corporation Le fasi che riguardano il ciclo di vita degli eventi 25 © 2013 IBM Corporation 1 - Un efficiente gestione degli eventi Forte acquisizione, profonda analisi, elevata reattività MONITOR & ASSET DISCOVERY • Registrazione in tempo reale • Facilità di configurazione • Modalità agent-less • Integrazione standard di molteplici dispositivi • • • • • Auto-discovery of log sources Auto-discovery of applications Auto-discovery of assets Auto-grouping of assets Centralized log management VA Scanner syslog nflow sflow wmi odbc jdbc qflow wincollect ftp/sftp jflow snmp Log Event Event Flows IDS-IPS Switch-Router 26 snare Firewall Server Applications Database © 2013 IBM Corporation 2 - Un potente motore di elaborazione e correlazione Un potente motore di correlazione analisi investigativa e reportistica avanzata per l’identificazione di eventi critici e loro immediata risoluzione Advanced security analytics Auto-tuning Auto-detect threats 27 Easy-to-use event filtering ANALYSYS Thousands of pre-defined rules © 2013 IBM Corporation 3 - Allarmi in tempo reale e profondità investigativa • Controllo chiaro e completo di tutte le attività di rete con monitoraggio in tempo reale • Avvisi ed individuazione di eventi insoliti rispetto alla condizione di normalità • Analisi investigativa e reportistica avanzata • Report di sicurezza standard integrati e di facile personalizzazione ACTIONS & REPORTS • • • • • 28 Thousands of predefined reports Asset-based prioritization Auto-update of threats Auto-response Directed remediation © 2013 IBM Corporation Qradar: le componenti Log Management Risk Management • Turnkey log management • Predictive threat modeling & simulation • Upgradeable to enterprise SIEM • Scalable configuration monitoring & audit SIEM Scale • Sophisticated event analytics • Event processors • Asset profiling and flow analytics • Network activity processors Network Activity and Anomaly Detection 29 Visibility • Network analytics • Layer 7 application monitoring • Behavioral and anomaly detection • Content capture © 2013 IBM Corporation 30 © 2013 IBM Corporation 31 © 2013 IBM Corporation Next Generation IPS Salvatore Sollami IBM Security Systems Technical Sales and Solutions The challenging state of network security Stealth Bots • Targeted Attacks Worms • Trojans • Designer Malware URL Filtering • IDS / IPS IM / P2P • Web App Protection Vulnerability Management 33 SOPHISTICATED ATTACKS Increasingly sophisticated attacks are using multiple attack vectors and increasing risk exposure STREAMING MEDIA Streaming media sites are consuming large amounts of bandwidth SOCIAL NETWORKING Social media sites present productivity, privacy and security risks including new threat vectors POINT SOLUTIONS Point solutions are siloed with minimal integration or data sharing © 2013 IBM Corporation Network Defense: Traditional solutions not up to today’s challenges Current Limitations Threats continue to evolve and standard methods of detection are not enough Streaming media sites and Web applications introduce new security challenges Internet Stealth Bots Worms, Trojans Targeted Attacks Designer Malware Basic “Block Only” mode limits innovative use of streaming and new Web apps Firewall/VPN – port and protocol filtering Poorly integrated solutions create “security sprawl”, lower overall levels of security, and raise cost and complexity Requirement: Multi-faceted Protection 0-day threat protection tightly integrated with other technologies i.e. network anomaly detection Ability to reduce costs associated with nonbusiness use of applications Controls to restrict access to social media sites by a user’s role and business need Email Gateway – message and attachment security only Web Gateway – securing web traffic only, port 80 / 443 Everything Else Multi-faceted Network Protection – security for all traffic, applications and users Augment point solutions to reduce overall cost and complexity 34 © 2013 IBM Corporation The Need to Understand the Who, What, and When Web Category Protection Server Access Control Protocol Aware Intrusion Protection Network Geography Web Applications Non-web Applications Client-Side Protection Reputation Botnet Protection User or Group Network Awareness Web Protection Reputation Who 35 172.29.230.15, Bob, Alice Allow marketing and sales teams to access social networking sites What 80, 443, 21, webmail, social networks Block attachments on all outgoing emails and chats A more strict security policy is applied to traffic from countries where I do not do business Advanced inspection of web application traffic destined to my web servers Block known botnet servers and phishing sites Allow, but don’t inspect, traffic to financial and medical sites Traffic Controls Policy © 2013 IBM Corporation July The Advanced Threat Protection Platform Security Intelligence Platform Threat Intelligence and Research Advanced Threat Protection Platform Log Manager Vulnerability Data Intrusion Prevention SIEM Network Activity Monitor Malicious Websites Content and Data Security Vulnerability Manager Malware Information Web Application Protection Network Anomaly Detection Risk Manager IP Reputation Application Control IBM Network Security NEW Advanced Threat Protection Platform Ability to prevent sophisticated threats and detect abnormal network behavior by leveraging an extensible set of network security capabilities - in conjunction with real-time threat information and Security 36Intelligence Expanded X-Force Threat Intelligence Increased coverage of world-wide threat intelligence harvested by X-Force and the consumption of this data to make smarter and more accurate security decisions across the IBM portfolio Security Intelligence Integration Tight integration between the Advanced Threat Protection Platform and QRadar Security Intelligence platform to provide unique and meaningful ways to detect, investigate and remediate threats © 2013 IBM Corporation Next Generation Network IPS 37 © 2013 IBM Corporation Understanding who, what, and when Immediately discover which applications and web sites are being accessed Quickly Identify misuse by application, website, user, and group Understand who and what are consuming bandwidth on the network Superior detection of advanced threats through integration with QRadar for network anomaly and event details Network flows can be sent to QRadar for enhanced analysis, correlation and anomaly detection Increase Security 38 Identity context ties users and groups with their network activity going beyond IP address only policies Reduce Costs Application context fully classifies network traffic, regardless of port, protocol or evasion techniques Enable Innovation © 2013 IBM Corporation Next Gen IPS: IBM Security Network Protection XGS 5100 NEW WITH XGS NEW WITH XGS PROVEN SECURITY ULTIMATE VISIBILITY COMPLETE CONTROL Extensible, 0-Day protection powered by X-Force® Understand the Who, What and When for all network activity Ensure appropriate application and network use IBM Security Network Protection XGS 5100 builds on the proven security of IBM intrusion prevention solutions by delivering the addition of next generation visibility and control to help balance security and business requirements 39 © 2013 IBM Corporation Proven Security: Extensible, 0-Day Protection Powered by X-Force® Next Generation IPS powered by X-Force® Research protects weeks or even months “ahead of the threat” Full protocol, content and application aware protection goes beyond signatures Expandable protection modules defend against emerging threats such as malicious file attachments and Web application attacks IBM Security Network Protection XGS 5000 IBM Security Threat Protection – Backed by X-Force® – 15 years+ of vulnerability research and development – Trusted by the world’s largest enterprises and government agencies – True protocol-aware intrusion prevention, not reliant on signatures – Specialized engines • Exploit Payload Detection • Web Application Protection • Content and File Inspection Ability to protect against the threats of today and tomorrow 40 © 2013 IBM Corporation QRadar Network Anomaly Detection QRadar Network Anomaly Detection is a purpose built version of QRadar for IBM’s intrusion prevention portfolio The addition of QRadar’s behavioral analytics and real-time correlation helps better detect and prioritize stealthy attacks Supplements visibility provided by IBM Security Network Protection’s Local Management (LMI) Integration with IBM Security Network Protection including the ability to send network flow data from XGS to QRadar 41 © 2013 IBM Corporation IBM X-Force® Threat Information Center Identity and User Context 42 Real-time Security Overview w/ IP Reputation Correlation Real-time Network Visualization and Application Statistics Inbound Security Events © 2013 IBM Corporation The XGS 5100: The Best Solution for Threat Prevention Internet Better Network Control Natural complement to current Firewall and VPN Stealth Bots Worms, Trojans Targeted Attacks Designer Malware Not rip-and-replace – works with your existing network and security infrastructure More flexibility and depth in security and control over users, groups, networks and applications Firewall/VPN – port and protocol filtering Better Threat Protection True Protocol aware Network IPS Higher level of overall security and protection Email Gateway – message and attachment security only More effective against 0-day attacks Best of both worlds – true protocol and heuristicbased protection with customized signature support Web Gateway – securing web traffic only, port 80 / 443 Everything Else IBM Security Network Protection XGS 5100 Proven Security 43 Ultimate Visibility Complete Control © 2013 IBM Corporation