IBM Security Success Story: Westpac Sydney, Australia
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
IBM Security Systems IBM Security Success Story: Westpac Sydney, Australia Ryan Hall Worldwide Sales Executive, Infrastructure Security Products IBM Corporation ryanhall@us.ibm.com @ryanohall 1 © 2013 IBM Corporation
IBM Security Systems Corporate Background: Westpac Westpac was founded in 1817 and was the first bank established in Australia • Headquartered in Sydney since 1982 Publicly traded Banking and Financial Services firm • 1,200 branches • 2,900 ATMs • 12.5 million customers • 36,000 employees Second-largest bank in Australia (by assets) and largest bank in New Zealand Westpac's vision is to be the leading financial services company in Australia and New Zealand URL: http://www.westpac.com.au 2 © 2013 IBM Corporation
IBM Security Systems IBM and Westpac: Technology Partnership Tight strategic I/T partnership between IBM and Westpac dates back to 2000 Most recently, the partnership was renewed with a focus on Westpac’s “Technology Transformation Program: • Driven by large acquisition of competitor and need to standardize across enterprise • 5 year initiative with goals to: Improve service quality for bank staff and customers Lower overall security risk Decrease information technology costs Support Westpac business agility (i.e., M&A, new product/service lines) 3 © 2013 IBM Corporation
IBM Security Systems Westpac Network Security Prior to implementing ISS appliances, the existing network defenses generated too many false alerts And, as a financial institution subject to stringent regulatory requirements, Westpac needed to increase the speed and accuracy of finding malware and breaches From a management standpoint, having systems from multiple IDS/IPS vendors was not optimal To increase the performance of their network, Westpac was rebuilding its network infrastructure for 10 GbE Westpac decided to standardize on IBM Network Security products and implemented IBM Intrusion Prevention Systems in their headquarters and remote offices and branches Models deployed today are the GX4, GX5, GX6 and GX7, and additionally, Westpac formerly deployed the predecessor platform which was acquired from ISS by IBM One of the first customers of the new XGS line of Next Generation IPS systems • Ordered eight XGS 5100 systems for immediate deployment in Australia and New Zealand • Plans to standardize on XGS platform for core and branch network security 4 © 2013 IBM Corporation
IBM Security Systems Benefits to Westpac from IBM Network Security Issue IBM Network Security Benefits Vulnerabilities in operating systems, web servers, and IBM’s Virtual Patch technology helps block attacks other applications provided an opportunity for before they reach their intended target (NOT attackers to penetrate Westpac’s systems SIGNATURE BASED) Attacks were leading to service interruption, data theft, The IBM Protocol Analysis Module (PAM) uses a and increasing costs for remediation multi-layer approach of a wide variety of different techniques to detect and prevent exploits Internal Westpac users were causing security issues The advanced heuristics engines within IBM’s Protocol by opening infected files in their emails Analysis Module can detect and block many of these attacks before they reach the user Attackers also were using new ways to get malware PAM currently supports nearly 400 different protocols into the Bank, including storage devices and social and file formats, so malicious files can be detected in engineering channels other than email Common applications (such as PDF, Flash, Java, and Again, IBM’s Virtual Patch technology blocks these MS Office) were experiencing a high amount of vulnerabilities before at-risk files applications can be vulnerabilities compromised 5 © 2013 IBM Corporation
IBM Security Systems Future Benefits to Westpac from IBM Network Security With new XGS next-generation platform, Westpac expects to further grow their comprehensive network security capabilities: Advanced Threat Protection Flexible Performance Licensing • Block phishing, malware sites, and botnet – Save money by only licensing for the throughput you need command & control – As bandwidth increases, increase appliance • Visibility and control of applications can performance without even having to reboot enforce policy and save bandwidth Tight integration with QRadar SSL Visibility – On-appliance flow generation • Detect and prevent user-targeted attacks over – LEEF-format event feeds encrypted channels • On-box hardware acceleration prevents the need for a dedicated SSL appliance Adaptable Hardware • Swappable network interface modules provide connectivity to 7 different network media standards • Reduce racks pace by up to 85% and power consumption by up to 82% compared to GX 6 platform © 2013 IBM Corporation
IBM Security Systems Customer Success: Target Client Requirements Industry: Retail To increase the performance of their Datacenters target decided to rebuild its network infrastructure for 10 GbE Profile: Target Corporation is an American Existing network IPS solution had only 1 Gbps throughput capacity, so retailing company, founded in 1902 and they decided to evaluate different vendors to increase performance headquartered in Minneapolis, Minnesota. It is the second-largest discount retailer in the Competition United States. The company is ranked at number 38 on the Fortune 500 as of 2012 Sourcefire and is a component of the Standard & Poor's 500 index. IBM Solution Target is headquartered in Minneapolis, MN IBM Security Network IPS GX7800 IBM Security SiteProtector System Size: 365,000 employees Why IBM Utilizing a partner’s lab, Target tested solutions from both IBM and Sourcefire Included performance testing at 10Gbps+ throughput and detection IBM scored higher in both areas with Sourcefire failing evasion testing Target later confirmed this testing with similar results in their internal environment www. target.com 7 © 2013 IBM Corporation
IBM Security Systems Customer Success: Jackson National Life Insurance Client Requirements Industry: Insurance Desire to create another security layer around its critical servers Performance and high throughput was critical Profile: A family-owned company that has 10 GbE connectivity evolved into a diversified retirement services provider, Jackson National Life Insurance Company® ("Jackson®") has a Competition rich history. Named after Andrew Jackson, Palo Alto Networks the seventh president of the United States, Jackson first opened for business in 1961. IBM Solution Jackson National Life Insurance is headquartered in Lansing, MI IBM Security Network IPS GX7412 IBM Security SiteProtector System Size: 2,900+ employees Why IBM Jackson National life was already using Palo Alto Networks as their network firewall solution and initially considered utilizing PA IPS After an internal head to head evaluation, IBM scored higher as a result of intelligence provided by the X- Force R&D team IBM was also determined to be superior under high levels of throughput, and was valued for its ability to scale up to future bandwidth needs www. jackson.com 8 © 2013 IBM Corporation
IBM Security Systems Customer Success: Pfizer Client Requirements Industry: Pharmaceuticals Increase security in Pfizer’s key data centers to handle growth High levels of security without compromising performance Profile: Pfizer is the world's largest research-based biopharmaceutical company with major research and Competition development locations in the United States Sourcefire and the U.K. Phizer operates in nearly every market in the world with 58 percent of revenues generated outside the U.S. IBM Solution IBM Security Network IPS GX7800s (4) Pfizer is headquartered in New York City, NY Deployed 2 GX7800s in each critical datacenter IBM Security SiteProtector System Size: 100,000+ employees Why IBM IBM built a close relationship with Pfizer and was able to respond extremely quickly to their needs High levels of confidence in both IBM and IBM’s security technology Found the IBM’s “ahead of the threat” detection to be superior vs. the Sourcefire offering Valued unique IBM features such as real-time Web application protection www. pfizer.com 9 © 2013 IBM Corporation
IBM Security Systems Key Assets and Proof Points IBM Wins InformationWeek’s IPS Survey IBM was rated #1 in the recent InformationWeek survey [LINK] New Tolly Group Test Report Released IBM Delivers Superior Protection from Evolving Threats with High Levels of Performance. [LINK] Equifax Uses QRadar, Network IPS and AppScan! Utilize this case study to show QRadar clients the benefits of utilizing IBM Security Network IPS for threat protection [LINK] (Note: Put slides into presentation mode to click the links to each asset) 10 © 2013 IBM Corporation
IBM Security Systems ibm.com/security © Copyright IBM Corporation 2013. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other 11 countries or both. Other company, product, or service names may be trademarks or service marks of others. © 2013 IBM Corporation
You can also read