IBM Security
IBM Security Intelligence
© 2013 IBM Corporation© 2014 IBM Corporation
Speaker: Alfonso Ponticelli
Security QRadar Technical Sales, Italy
IBM Security Systems
What is Security Intelligence?
Security Intelligence
--noun
1. the real-time collection, normalization and
analytics of the data generated by users,
applications and infrastructure that impacts the
IT security and risk posture of an enterprise
Security Intelligence
© 2014 IBM Corporation2
IT security and risk posture of an enterprise
Security Intelligence provides actionable and comprehensive
insight for managing risks and threats from protection and
detection through remediation
IBM Security Systems
Solutions for the full Security Intelligence timeline
IBM Security Intelligence
© 2014 IBM Corporation3
IBM Security Systems
Built upon common foundation of QRadar SIOS
Reporting
Engine
Workflow Rules Engine
Real-Time
Viewer
Security
Intelligence
Solutions
IBM QRadar SIEM Platform
QRadar SIEM
QRadar
Risk
Manager
QRadar
QFlow and
VFlow
QRadar
Vulnerability
Manager
© 2014 IBM Corporation4
Analytics Engine
Warehouse Archival
Security
Intelligence
Operating
System
(SIOS)
Normalization
IBM Security Systems
Servers and mainframes
Network and virtual activity
Data activity
Security devices
Structured & Unstructured Data …Suspected Incidents
• Automated data collection,
asset discovery and profiling
• Automated, real-time,
and integrated analytics
Embedded Intelligence
Highly
Prioritized
Security and
Operational
Incidents
Highly
Prioritized
Security and
Operational
Incidents
Automated
Dynamic Threat Environment Requires Security Intelligence
IBM QRadar SIEM Platform
© 2014 IBM Corporation5
Application activity
Configuration information
Vulnerabilities and threats
Users and identities
Global threat intelligence
• Massive data reduction
• Activity baselining
and anomaly detection
• Out-of-the box rules
and templates
Automated
Offense
Identification
Visibility across organizational security systems to improve response times and
incorporate adaptability/flexibility required for early detection of threats or risky
behaviors
IBM Security Systems
And continually adding context for increased accuracy
Security Intelligence Feeds
Internet ThreatsGeo Location Vulnerabilities
IBM QRadar SIEM Platform
© 2014 IBM Corporation6
IBM Security Systems
Using fully integrated architecture and interface
IBM QRadar Platform
© 2014 IBM Corporation7
IBM Security Systems
Continued journey towards Total Security Intelligence
IBM QRadar Security Intelligence
© 2014 IBM Corporation8
IBM Security Systems
Network traffic doesn’t lie. Attackers can stop logging and
erase their tracks, but can’t cut off the network (flow data)
• Deep packet inspection for Layer 7 flow data
• Pivoting, drill-down and data mining on flow sources for
advanced detection and forensics
Helps detect anomalies that might otherwise get missed
Enables visibility into attacker communications
Differentiated by network flow analytics
IBM QRadar Platform
© 2014 IBM Corporation9
Enables visibility into attacker communications
IBM Security Systems
QRadar Risk Manager: Visualize network, configurations and risks
Depicts network topology
views and helps visualize
current and alternative
network traffic patterns
Identifies active attack
paths and assets at risk of
exploit
IBM QRadar Risk Manager
© 2014 IBM Corporation10
Collects network device
configuration data to
assess vulnerabilities and
facilitate analysis and
reportingDiscovers firewall configuration errors and improves
performance by eliminating ineffective rules
Analyzes policy compliance for network traffic,
topology and vulnerability exposures
IBM Security Systems
Investigating offense attack path
Clicking ‘attack path’ button for an offense performs search showing precise
path (and all permutations) between involved source and destination IPs
Firewall rules enabling the attack path can then be quickly analyzed to
understand the exposure
IBM QRadar Risk Manager
© 2014 IBM Corporation11
understand the exposure
Allows “virtual patch” to be applied by quickly showing which firewall rules may
be changed to immediately shut down attack path—before patching or other
configuration changes can typically be implemented
IBM Security Systems
Strengthened by integrated vulnerability insights
IBM QRadar Vulnerability Manager
© 2014 IBM Corporation12
IBM Security Systems
QVM enables customers to interpret ‘sea’ of vulnerabilities
IBM QRadar Vulnerability Manager
© 2014 IBM Corporation13
IBM Security Systems
QRadar Security Intelligence easily grows with your needs
Add QRadar Risk Manager
• Enables pre-exploit configuration investigations
• Simplifies security policy reviews for compliance tests
Implement QRadar Vulnerability Manager
• Extends pre-exploit analysis - adds integrated,
vulnerability insights
• Reduces magnitude of pre-exploit conditions as QRadar
SIEM does for post-exploit conditions
• Helps identify and measure exposures to external threats
IBM QRadar Security Intelligence
© 2014 IBM Corporation14
Inject IBM X-Force Threat Research Intelligence
- Provides intelligence feed to QRadar
- Includes vulnerabilities, IP reputations, malware reports
• Simplifies security policy reviews for compliance tests
• Provides network topology depictions and permits
attack simulations
QRadar SIEM
• Additional security telemetry data
• Rules-based correlation analysis engine
• Data overload reduction ‘magic’ compressing millions or
even billions of daily raw events to manageable list of issues
IBM Security Systems
QRadar Incident Forensics Module Overview
Seamlessly integrated
with Security
Intelligence incident
detection and workflow
processes
Full packet capture for
complete insight and
incident forensics
IBM QRadar Incident Forensics
© 2014 IBM Corporation15
Deep packet
inspection, analytics
and searching enabling
powerful and intuitive
forensics
Providing unified view
of all flow, user, event,
and forensic
information
IBM Security Systems
Offering Overview
Family Product Appliance Virtual
Appliance
Software
SIEM All-in-One 2100 Light3 / 2100 / 3105
/ 3124
3190 21XX Light3 /
21XX / 31XX
Console 3105 / 3124 3190 31XX
Event Processor 1605 / 1624 1690 16XX
Flow Processor 1705 / 1724 1790 17XX
Como Event/Flow Processor 1805 18XX
Event Collector5 1501 1590 15XX2
QFlow Collector 1201 / 1202 / 1301 / 1310 VFlow / 1290 12XX
© 2014 IBM Corporation16
QFlow Collector 1201 / 1202 / 1301 / 1310 VFlow / 1290 12XX
Log Manager All-in-1 2100 / 3105 / 3124 3190 21XX / 31XX1
Console 3105 / 3124 3190 31XX1
Event Processor 1605 / 1624 1690 16XX1
QNAD QNAD QNAD
Risk Manager QRM QRM / QRM Light4 QRM VM3 / QRM
Light VM4
QRM SW3 / QRM
Light SW4
Vulnerability
Manager
QVM QVM3 QVM VM3 QVM SW3

More Related Content

PDF
Whitepaper IBM Qradar Security Intelligence
PDF
IBM QRadar Security Intelligence Overview
PPTX
IBM Security QRadar
PDF
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
PDF
IBM Qradar-Advisor
PDF
How to Choose the Right Security Information and Event Management (SIEM) Solu...
PDF
IBM QRadar Security Intelligence Overview
PDF
Qradar ibm partner_enablement_220212_final
Whitepaper IBM Qradar Security Intelligence
IBM QRadar Security Intelligence Overview
IBM Security QRadar
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
IBM Qradar-Advisor
How to Choose the Right Security Information and Event Management (SIEM) Solu...
IBM QRadar Security Intelligence Overview
Qradar ibm partner_enablement_220212_final

What's hot (19)

PPT
Extend Your Market Reach with IBM Security QRadar for MSPs
PDF
IBM Security QFlow & Vflow
PPTX
IBM QRadar Xforce
PDF
IBM Qradar
PPTX
IBM Q-radar security intelligence roadmap
PDF
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
PDF
IBM-QRadar-Corporate-Online-Training.
PPTX
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
PPTX
IBM QRadar UBA
PPTX
Security Information Event Management - nullhyd
PDF
Top Cybersecurity Threats and How SIEM Protects Against Them
PDF
IBM Security Immune System
PDF
From SIEM to SA: The Path Forward
 
PPTX
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
PDF
IBM Security Software Solutions - Powerpoint
PDF
SIEM evolution
PPTX
Security Analytics for Data Discovery - Closing the SIEM Gap
PDF
2012-12-12 Seminar McAfee ESM
Extend Your Market Reach with IBM Security QRadar for MSPs
IBM Security QFlow & Vflow
IBM QRadar Xforce
IBM Qradar
IBM Q-radar security intelligence roadmap
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
IBM-QRadar-Corporate-Online-Training.
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
IBM QRadar UBA
Security Information Event Management - nullhyd
Top Cybersecurity Threats and How SIEM Protects Against Them
IBM Security Immune System
From SIEM to SA: The Path Forward
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
IBM Security Software Solutions - Powerpoint
SIEM evolution
Security Analytics for Data Discovery - Closing the SIEM Gap
2012-12-12 Seminar McAfee ESM
Ad

Similar to IBM Security Intelligence (20)

PDF
Introduction to QRadar
PPTX
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
PPTX
Detect and Respond to Threats Better with IBM Security App Exchange Partners
PDF
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
PPTX
Sqrrl and IBM: Threat Hunting for QRadar Users
PPTX
QRadar Architecture Overview - Presentation.PPTX
PPTX
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
PPTX
IBM - Security Intelligence para PYMES
PPTX
Fernando Imperiale - Security Intelligence para PYMES
PDF
IBM Qradar & resilient
PPT
Five critical conditions to maximizing security intelligence investments
PDF
Big Data - Amplifying Security Intelligence
PPTX
IBM QRadar’s DomainTools Application.pptx
PPTX
IBM QRadar’s DomainTools Application.pptx
PPT
Avoiding data breach using security intelligence and big data to stay out of ...
PDF
Leverage Big Data for Security Intelligence
PDF
5.2 QRadar_Architecture_-_General123.pdf
PPTX
QRadar Security Intelligence Overview.pptx
PPTX
QRadar_on_Cloud_client_presentation.PPTX
PDF
Presentation data security solutions certified ibm business partner for ibm...
Introduction to QRadar
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Detect and Respond to Threats Better with IBM Security App Exchange Partners
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
Sqrrl and IBM: Threat Hunting for QRadar Users
QRadar Architecture Overview - Presentation.PPTX
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
IBM - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMES
IBM Qradar & resilient
Five critical conditions to maximizing security intelligence investments
Big Data - Amplifying Security Intelligence
IBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptx
Avoiding data breach using security intelligence and big data to stay out of ...
Leverage Big Data for Security Intelligence
5.2 QRadar_Architecture_-_General123.pdf
QRadar Security Intelligence Overview.pptx
QRadar_on_Cloud_client_presentation.PPTX
Presentation data security solutions certified ibm business partner for ibm...
Ad

More from Anna Landolfi (7)

PDF
IBM Power8 announce
PDF
IBM SmartCloud Orchestrator
PDF
IBM per la sicurezza del Datacenter
PDF
IBM PureSystems
PDF
IBM Business Analytics
PDF
IBM Mobile First
PDF
SoftLayer Cloud Services
IBM Power8 announce
IBM SmartCloud Orchestrator
IBM per la sicurezza del Datacenter
IBM PureSystems
IBM Business Analytics
IBM Mobile First
SoftLayer Cloud Services

Recently uploaded (20)

PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PPTX
future_of_ai_comprehensive_20250822032121.pptx
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PPTX
Internet of Everything -Basic concepts details
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PPTX
Microsoft User Copilot Training Slide Deck
PPTX
Configure Apache Mutual Authentication
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
Flame analysis and combustion estimation using large language and vision assi...
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
future_of_ai_comprehensive_20250822032121.pptx
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Lung cancer patients survival prediction using outlier detection and optimize...
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Internet of Everything -Basic concepts details
4 layer Arch & Reference Arch of IoT.pdf
Early detection and classification of bone marrow changes in lumbar vertebrae...
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
sustainability-14-14877-v2.pddhzftheheeeee
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
Microsoft User Copilot Training Slide Deck
Configure Apache Mutual Authentication
Auditboard EB SOX Playbook 2023 edition.
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Flame analysis and combustion estimation using large language and vision assi...

IBM Security Intelligence

  • 1. IBM Security IBM Security Intelligence © 2013 IBM Corporation© 2014 IBM Corporation Speaker: Alfonso Ponticelli Security QRadar Technical Sales, Italy
  • 2. IBM Security Systems What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure that impacts the IT security and risk posture of an enterprise Security Intelligence © 2014 IBM Corporation2 IT security and risk posture of an enterprise Security Intelligence provides actionable and comprehensive insight for managing risks and threats from protection and detection through remediation
  • 3. IBM Security Systems Solutions for the full Security Intelligence timeline IBM Security Intelligence © 2014 IBM Corporation3
  • 4. IBM Security Systems Built upon common foundation of QRadar SIOS Reporting Engine Workflow Rules Engine Real-Time Viewer Security Intelligence Solutions IBM QRadar SIEM Platform QRadar SIEM QRadar Risk Manager QRadar QFlow and VFlow QRadar Vulnerability Manager © 2014 IBM Corporation4 Analytics Engine Warehouse Archival Security Intelligence Operating System (SIOS) Normalization
  • 5. IBM Security Systems Servers and mainframes Network and virtual activity Data activity Security devices Structured & Unstructured Data …Suspected Incidents • Automated data collection, asset discovery and profiling • Automated, real-time, and integrated analytics Embedded Intelligence Highly Prioritized Security and Operational Incidents Highly Prioritized Security and Operational Incidents Automated Dynamic Threat Environment Requires Security Intelligence IBM QRadar SIEM Platform © 2014 IBM Corporation5 Application activity Configuration information Vulnerabilities and threats Users and identities Global threat intelligence • Massive data reduction • Activity baselining and anomaly detection • Out-of-the box rules and templates Automated Offense Identification Visibility across organizational security systems to improve response times and incorporate adaptability/flexibility required for early detection of threats or risky behaviors
  • 6. IBM Security Systems And continually adding context for increased accuracy Security Intelligence Feeds Internet ThreatsGeo Location Vulnerabilities IBM QRadar SIEM Platform © 2014 IBM Corporation6
  • 7. IBM Security Systems Using fully integrated architecture and interface IBM QRadar Platform © 2014 IBM Corporation7
  • 8. IBM Security Systems Continued journey towards Total Security Intelligence IBM QRadar Security Intelligence © 2014 IBM Corporation8
  • 9. IBM Security Systems Network traffic doesn’t lie. Attackers can stop logging and erase their tracks, but can’t cut off the network (flow data) • Deep packet inspection for Layer 7 flow data • Pivoting, drill-down and data mining on flow sources for advanced detection and forensics Helps detect anomalies that might otherwise get missed Enables visibility into attacker communications Differentiated by network flow analytics IBM QRadar Platform © 2014 IBM Corporation9 Enables visibility into attacker communications
  • 10. IBM Security Systems QRadar Risk Manager: Visualize network, configurations and risks Depicts network topology views and helps visualize current and alternative network traffic patterns Identifies active attack paths and assets at risk of exploit IBM QRadar Risk Manager © 2014 IBM Corporation10 Collects network device configuration data to assess vulnerabilities and facilitate analysis and reportingDiscovers firewall configuration errors and improves performance by eliminating ineffective rules Analyzes policy compliance for network traffic, topology and vulnerability exposures
  • 11. IBM Security Systems Investigating offense attack path Clicking ‘attack path’ button for an offense performs search showing precise path (and all permutations) between involved source and destination IPs Firewall rules enabling the attack path can then be quickly analyzed to understand the exposure IBM QRadar Risk Manager © 2014 IBM Corporation11 understand the exposure Allows “virtual patch” to be applied by quickly showing which firewall rules may be changed to immediately shut down attack path—before patching or other configuration changes can typically be implemented
  • 12. IBM Security Systems Strengthened by integrated vulnerability insights IBM QRadar Vulnerability Manager © 2014 IBM Corporation12
  • 13. IBM Security Systems QVM enables customers to interpret ‘sea’ of vulnerabilities IBM QRadar Vulnerability Manager © 2014 IBM Corporation13
  • 14. IBM Security Systems QRadar Security Intelligence easily grows with your needs Add QRadar Risk Manager • Enables pre-exploit configuration investigations • Simplifies security policy reviews for compliance tests Implement QRadar Vulnerability Manager • Extends pre-exploit analysis - adds integrated, vulnerability insights • Reduces magnitude of pre-exploit conditions as QRadar SIEM does for post-exploit conditions • Helps identify and measure exposures to external threats IBM QRadar Security Intelligence © 2014 IBM Corporation14 Inject IBM X-Force Threat Research Intelligence - Provides intelligence feed to QRadar - Includes vulnerabilities, IP reputations, malware reports • Simplifies security policy reviews for compliance tests • Provides network topology depictions and permits attack simulations QRadar SIEM • Additional security telemetry data • Rules-based correlation analysis engine • Data overload reduction ‘magic’ compressing millions or even billions of daily raw events to manageable list of issues
  • 15. IBM Security Systems QRadar Incident Forensics Module Overview Seamlessly integrated with Security Intelligence incident detection and workflow processes Full packet capture for complete insight and incident forensics IBM QRadar Incident Forensics © 2014 IBM Corporation15 Deep packet inspection, analytics and searching enabling powerful and intuitive forensics Providing unified view of all flow, user, event, and forensic information
  • 16. IBM Security Systems Offering Overview Family Product Appliance Virtual Appliance Software SIEM All-in-One 2100 Light3 / 2100 / 3105 / 3124 3190 21XX Light3 / 21XX / 31XX Console 3105 / 3124 3190 31XX Event Processor 1605 / 1624 1690 16XX Flow Processor 1705 / 1724 1790 17XX Como Event/Flow Processor 1805 18XX Event Collector5 1501 1590 15XX2 QFlow Collector 1201 / 1202 / 1301 / 1310 VFlow / 1290 12XX © 2014 IBM Corporation16 QFlow Collector 1201 / 1202 / 1301 / 1310 VFlow / 1290 12XX Log Manager All-in-1 2100 / 3105 / 3124 3190 21XX / 31XX1 Console 3105 / 3124 3190 31XX1 Event Processor 1605 / 1624 1690 16XX1 QNAD QNAD QNAD Risk Manager QRM QRM / QRM Light4 QRM VM3 / QRM Light VM4 QRM SW3 / QRM Light SW4 Vulnerability Manager QVM QVM3 QVM VM3 QVM SW3