13.07.2015 Views

Microsoft PowerPoint - [MNC]IBM Security_\300\316\274\342\272

Microsoft PowerPoint - [MNC]IBM Security_\300\316\274\342\272

Microsoft PowerPoint - [MNC]IBM Security_\300\316\274\342\272

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

보안 우리가 방심하면고객은 변심한다- 글로벌 기업의 보안관리2012.5<strong>IBM</strong> KoreaGlobal Technology ServicesNo part of it may be circulated, quoted, or reproducedfor distribution without prior approval from <strong>IBM</strong>© Copyright <strong>IBM</strong> Corporation 2012


The new security landscape<strong>IBM</strong> SECURITYemergence of mobile, cloud, BYOIT, and Web 2.0Embracing New Technologies,Adopting New Business ModelsExploding and InterconnectedDigital UniverseEmployees,customers,contractors,outsourcers30 billion RFID tags(products,passports,buildings,animals)1 billionworkers will beremote ormobileBring YourOwn ITSocial BusinessMobility1 trillion connectedobjects (cars,appliances,cameras) 1B Mobile Internetusers 30% growth of 3GdevicesCloud / Virtualization33% of all new business softwarespending will be Software as a Service2 page


Increasing Threats & Challenges<strong>IBM</strong> SECURITY기업의 정보보안 요건은 확대되고 있으나, 낮은 관심도와 제한적 투자, 전문성의 부족 등으로 인해 많은 기업들이 보안 리스크에 노출되어 있으며 적절한 대응 체계를 갖추지 못하고 있습니다“The Year of the <strong>Security</strong> Breach” – <strong>IBM</strong>’s X-Force® R&D3 page


글로벌 보안 관련 법/규제 현황<strong>IBM</strong> SECURITY글로벌 전역에서 정보보호 관련 다양한 법/규제를 시행하고 있습니다Privacy Information Protection Act (2011)4 page


<strong>IBM</strong>의 실천<strong>IBM</strong> SECURITY<strong>IBM</strong>은 내부적으로 10개 과제를 실천하고 있습니다5. Take a Hygienic Approach toManaging Infrastructure6. Control Network Access4. Secure Services, By Design7. Address New Complexity ofCloud and Virtualization3. Secure the Workplace ofthe Future (Endpoint)8. Assure Supply Chain <strong>Security</strong>Compliance2. Manage Incidents9. Protect Structured &Unstructured Data1. Build a Risk Aware Culture &Management System10. Manage the Identity Lifecycle5 page


보안거버넌스정립및마스터플랜기술적취약점점검1. Build a Risk Aware Culture & Management System<strong>IBM</strong> SECURITYAS-IS 진단및GAP 분석로드맵수립(예)6 page


2. Manage Incidents<strong>IBM</strong> SECURITYCustomer Sites/ SO AccountsSaaSMobile Device <strong>Security</strong> ServicesApplication <strong>Security</strong> On DemandVulnerability Management Services<strong>Security</strong> Event and Log ManagementEmail/Web Filtering ServicesX-ForceThreatAnalysisServiceCollect Meta data(logs, events)InternetMonitoringAlerting Reporting<strong>IBM</strong> <strong>Security</strong>Operations CenterSOCAtlanta - DetroitBackBoneCustomer IT-<strong>Security</strong> Manager• Real time systems health checking• Track threats, reduce risksSOCBrusselsSOCIndiaSOCBrisbaneSOCJapanCustomer CIO/VP executivereporting• Policy reporting• Audit reporting• Compliance dashboard 13 billion managed security events a day 9 SOCs globally Guaranteed 100% SLA’s offered Follow the sun services; 24x7x3657 page


3. Secure the Workplace of the Future (Endpoint)<strong>IBM</strong> SECURITYWiFiMobileappsDevelop anddeliver safeapplicationsInternetWebsitesSecure theendpointdeviceTelecomProviderBluetoothConnectionMobileDeviceCorporateGatewayCorporateIntranetDefend the network andprotect corporate systems8 page


개요기간고객의견5. Take a Hygienic Approach to Managing Infrastructure<strong>IBM</strong> SECURITY10 page


대상장비작업창 접속리스트사용자로그인사용자관리장비관리정책관리실시간모니터링 로그관리통계 자관리서버시스템6. Control Network Access<strong>IBM</strong> SECURITY(인터넷) 사용자11 page시스템 접근통제및감사


7. Address New Complexity of Cloud and Virtualization<strong>IBM</strong> SECURITYIdentityFederationWeb ApplicationScanningVirtualization<strong>Security</strong>Network<strong>Security</strong>Image & PatchManagementDatabaseMonitoring<strong>IBM</strong> <strong>Security</strong> Intelligence12 page


8. Assure Supply Chain <strong>Security</strong> Compliance<strong>IBM</strong> SECURITY발주사:고객 정보 및 DM 컨텐츠 제공DM 아웃소싱:DM 컨텐츠 제작, 프린팅, 배송, 반송 관리고객 DB본사마케터지점영업개인 자료(고객정보)• 고객명• 주소• 사용내역컨텐츠 제작 (청구서)- 고객명- 주소- 사용내역개인정보보호법이슈본사마케터+Campaign Message 1전송(웹 하드, email, USB 등)MSG 1 MSG 2지점영업Campaign Message 2개인정보보호법이슈상담직원communication고객13 page


9. Protect Structured & Unstructured Data<strong>IBM</strong> SECURITYMiddle ware 단의log 파일과backup DATA암호화Log FilesPassword filesConfiguration filesIIS Apache WebLogicDB tablespacefile & raw device암호화Raw partitionsData filesTransactionlogsExportsBackupERP CRM Payments CMS LegacyDB2 Oracle SQL Sybase Legacy다양한 backupdata에 대한암호화 보관 관리File sharesArchiveContentrepositoriesMulti-mediaFileServersFTPServersEmailServersDAS SAN NAS VMOther14 page


10. Manage the Identity Lifecycle<strong>IBM</strong> SECURITY15 page


글로벌 기업 사례<strong>IBM</strong> SECURITYVodafone, India – Application <strong>Security</strong> andVulnerability AssessmentWal-Mart, working with <strong>IBM</strong> consultants,performs secure code reviews of preproductioncode. These reviews identifyvulnerabilities in the code and providerecommended steps for remediation.Hilton to Achieve PCI Compliancy with ACost-Effective <strong>Security</strong> Solution from <strong>IBM</strong>Fidelity Information Systems Partners with<strong>IBM</strong> to Tackle a Complex GovernmentInitiativeExxonMobil to Improve <strong>Security</strong> Protectionwith a Cloud <strong>Security</strong> Solution from <strong>IBM</strong>16 page


<strong>IBM</strong>’s <strong>Security</strong><strong>IBM</strong> SECURITY<strong>IBM</strong> Portfolio includes a wide array of security offerings across all IT domains<strong>Security</strong> governance, risk andcompliance<strong>Security</strong> Information and eventmanagement (SIEM) and logmanagement<strong>IBM</strong> <strong>Security</strong> FrameworkIdentity and accessmanagementIdentity managementAccess management<strong>Security</strong> governance, riskmanagement and compliancePeople and identityData securityData loss preventionData entitlementmanagementData and informationEncryption and keylifecycle managementMessaging securityApplication and processE-mail <strong>Security</strong>Database monitoringand protectionData maskingNetwork, servers and endpointsPhysical infrastructureCommon policy, event handling and reportingApplication securityApplication vulnerabilityscanningWeb applicationfirewallProfessionalservicesManagedservicesHardware andsoftwareWeb and URL filteringAccess and entitlementmanagementSOA 1 securityProfessional servicesManaged servicesInfrastructuresecurityThreatanalysisVulnerabilityassessment<strong>Security</strong> eventmanagementVirtual systemsecurityManagedmobility svcs.Endpoint protectionIntrusion preventionsystemProductsCloud deliveredFirewall, IDS/IPS 2MFS 3 managementMainframe security audit,administration and compliance<strong>Security</strong> configurationand patch management1Service oriented architecture (SOA), 2 Intrusiondetection system and intrusion prevention system(IDS/IPS, 3 Managed firewall service (MFS)Physical security17 page


DNA to secure a Smarter Planet<strong>IBM</strong> SECURITY<strong>Security</strong>Intelligence,Analytics & GRCPeopleDataApplicationsInfrastructure18 page


19 page<strong>IBM</strong> SECURITY


<strong>IBM</strong> SECURITYEnd of Document20 page

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!