Click icon to add picture

Leveraging security from the cloud The who, what, when, why and how of cloudbased security services

  Submitted

by-Shobhit Agrawal

7/31/12

Introduction
Discovering the “who, what, when, where, why and how” of cloud-based security services reveals how security can be used to reduce risk, optimize resources, improve flexibility and address regulatory requirements.

7/31/12

What are cloud-based security services?
Vulnerability scanning  Web/URL filtering  Security event management  Security log management

7/31/12

Who benefits from security delivered via the cloud?
 
 Large  Small

Scale enterprises, and and Medium-size businesses.

7/31/12

When do cloud-based security services provide a real advantage
The cloud-based advantage becomes clear whenever organizations experience a change causing them to reassess, reprioritize and reconfigure security.

7/31/12

Where do cloud-based security services work best?
Wherever businesses have Internet connectivity and want to protect information assets, cloud security services will work. Whether applied globally, at corporate headquarters or only for remote locations, the choice is driven by business require-ments.

7/31/12

Why do organizations need cloud-based security services?  With cloud security services, customers have
a consolidated view of business security posture, and a central resource (a security portal) for security-related information.

 With

a consolidated view of security posture delivered via the cloud, businesses now have the flexibility to report on the number of remediation tasks assigned and completed

7/31/12

How to select a cloudbased security service provider?
 Proven

experience delivering security functionality via the Internet.  A central portal where customers can view their security posture at any time.  A full suite of security technology for the entire IT infrastructure.  A global delivery footprint that provides global geographic coverage and continuous service availability.
7/31/12

Cloud-based security services from IBM Managed Security Services

IBM has been at the forefront of cloud computing since its inception. IBM is a proven provider of cloud security services with nearly a decade of experience using this delivery model. IBM has been at the forefront of security technologies like vulnerability assessment, intrusion prevention and virus prevention. IBM has the business expertise to help customers align security and risk reduction with existing business processes.
7/31/12

Cloud-based security services from IBM Managed SecurityServices include:
 Hosted  Hosted

Security Event and Log Management Email and Web Security Hosted Threat Analysis Service

 IBMX-Force

7/31/12

CONCLUSION
As the size and sophistication of Internet threats continue to multiply, businesses need to be more vigilant than ever in protecting their digital infrastructure and assets. Effective security requires to prevent the threats.

7/31/12

Thank You
Click to edit Master subtitle style

7/31/12

Sign up to vote on this title
UsefulNot useful