You are on page 1of 9

2019: Cybersecurity is more

than just challenging…

What’s at stake…

things we need personal data lost to cybercrime


to secure records stolen over the next two
years

IBM Security / © 2019 IBM Corporation 1


2019: Cybersecurity is more
than just challenging…

What we face Compliance updates Skills shortage Inability to


respond quickly

Fines and new By 2022, CISOs Organizations


processes can cost will face are using

for companies of unfulfilled tools from too


all sizes cybersecurity jobs many vendors

CISO = chief information security officer

IBM Security / © 2019 IBM Corporation 2


Key SaaS drivers

Deliver rapid time to value Migrate to OPEX


Start small, meet compressed timelines, Expand business geographically without having
and still have the ability to grow over time. to commit and tie up capital assets.

Address skills shortages Move beyond compliance


Take immediate advantage of enterprise security Accelerate due diligence and have assurances
intelligence and analytics without diverting that control standards can be met using the
attention to monitoring and managing service.
infrastructure.

Stay in control
Increase the value of security investments
and provide the transparency, controls, and
dashboards required to effectively manage
threats.

IBM Security / © 2019 IBM Corporation 3


Security intelligence and analytics
Manage, mitigate and move on from cyberattacks through unified prevention, detection and response

Threat intelligence

User behavior Endpoint and the Internet


of Things (IoT)

Multicloud
IBM Unified Threat Management
Augmented and
advanced analytics

IBM Security / © 2019 IBM Corporation 4


IBM QRadar
Empowers you to address your most important security challenges

Complete Prioritized Automated Proactive


visibility threats investigations hunting

Insider threats

Endpoints
Network activity External threats
Vulnerabilities
Data activity
Users and identities
Threat intelligence
Configuration information
Vulnerabilities and threats
Application activity
Critical data Cloud risks
Cloud platforms

IBM Security / © 2019 IBM Corporation 5


QRadar on Cloud offering overview

IBM QRadar on Cloud Offering highlights


– Elastic upgrades; rapid time to value
– Dedicated DevOps
IBM X-Force
Exchange App Exchange
– 24x7 health monitoring
– System management: upgrades, patches
– Support for 450+ security and IT integrations
– Advanced threat detection
Threat indicator Extensions, add-ons

– Configurable security operations center (SOC)


and management dashboards


Security devices
Servers and cloud resources
– Global point-of-presence coverage
Network and virtual activity
Supports multitenant mode for service

– Data activity –
Application activity
providers

– Vulnerabilities and threats
– Users and identities

IBM Security / © 2019 IBM Corporation 6


QRadar on Cloud: A global footprint

– Globally-
distributed
– Resiliency and
redundancy by
default London
San Jose
– Built on security- Toronto
Frankfurt
rich IBM Cloud™
infrastructure Dallas Tokyo

Chennai

San Paulo
Sydney

IBM Security / © 2020 IBM Corporation 7


Comparing Service component On premises QRadar on Cloud

QRadar on Capital expense (CAPEX) budget item ✔

premises and
OPEX budget item ✔ ✔
IBM installation, deployment and upgrade ✔

on cloud IBM professionally managed infrastructure ✔


System health monitoring ✔
Configure data collection (DSMs) ✔ ✔
Compliance reporting ✔ ✔
Advanced attack detection ✔ ✔
Incident detection and management ✔ ✔
Asset modeling and vulnerability correlation ✔ ✔
QVM, QFlows ✔ ✔
QNI ✔ ✔
IBM QRadar® Advisor with Watson™ ✔ ✔
App Exchange ✔ ✔
Admin Access** Root SaaS Admin

** SaaS admin doesn’t include command-line interface (CLI)

DSM = device support module, QVM = QRadar Vulnerability Manager, QNI = QRadar Network Insights

IBM Security / © 2019 IBM Corporation 8


On premises versus on cloud: Cost compare
Critical to factor in tangible and intangible costs, including opportunity cost

On premise SaaS

Requires: Recurring costs: Requires:


– Customization – Ongoing IT costs – Customization
– Hardware – Ongoing maintenance – Implementation
– Implementation – Patches and fixes – Training
– IT staff – Upgrades Recurring costs:
– Lifecycle management – Subscription fee
– Maintenance
– Software licenses
– Training

IBM Security / © 2019 IBM Corporation 9

You might also like