IBM Security Success Story: Westpac Sydney, Australia

Page created by Brenda Lang
 
CONTINUE READING
IBM Security Success Story: Westpac Sydney, Australia
IBM Security Systems

IBM Security Success Story:
Westpac
Sydney, Australia

    Ryan Hall
    Worldwide Sales Executive, Infrastructure Security Products
    IBM Corporation
    ryanhall@us.ibm.com
    @ryanohall

1                                                                 © 2013 IBM Corporation
IBM Security Success Story: Westpac Sydney, Australia
IBM Security Systems

Corporate Background: Westpac

   Westpac was founded in 1817 and was the first bank established in Australia
    • Headquartered in Sydney since 1982

   Publicly traded Banking and Financial Services firm
    •   1,200 branches
    •   2,900 ATMs
    •   12.5 million customers
    •   36,000 employees

   Second-largest bank in Australia (by assets) and largest bank in New Zealand

   Westpac's vision is to be the leading financial services company in Australia and New
    Zealand

   URL: http://www.westpac.com.au

2                                                                               © 2013 IBM Corporation
IBM Security Success Story: Westpac Sydney, Australia
IBM Security Systems

IBM and Westpac: Technology Partnership

   Tight strategic I/T partnership between IBM and Westpac dates back to 2000

   Most recently, the partnership was renewed with a focus on Westpac’s “Technology
    Transformation Program:
    • Driven by large acquisition of competitor and need to standardize across enterprise
    • 5 year initiative with goals to:
           Improve service quality for bank staff and customers
           Lower overall security risk
           Decrease information technology costs
           Support Westpac business agility (i.e., M&A, new product/service lines)

3                                                                                     © 2013 IBM Corporation
IBM Security Systems

Westpac Network Security

   Prior to implementing ISS appliances, the existing network defenses generated too many false alerts

   And, as a financial institution subject to stringent regulatory requirements, Westpac needed to increase the speed and
    accuracy of finding malware and breaches

   From a management standpoint, having systems from multiple IDS/IPS vendors was not optimal

   To increase the performance of their network, Westpac was rebuilding its network infrastructure for 10 GbE

   Westpac decided to standardize on IBM Network Security products and implemented IBM Intrusion Prevention Systems in
    their headquarters and remote offices and branches

   Models deployed today are the GX4, GX5, GX6 and GX7, and additionally, Westpac formerly deployed the predecessor
    platform which was acquired from ISS by IBM

   One of the first customers of the new XGS line of Next Generation IPS systems
    •   Ordered eight XGS 5100 systems for immediate deployment in Australia and New Zealand
    •   Plans to standardize on XGS platform for core and branch network security

4                                                                                                         © 2013 IBM Corporation
IBM Security Systems

Benefits to Westpac from IBM Network Security

                               Issue                                        IBM Network Security Benefits

       Vulnerabilities in operating systems, web servers, and         IBM’s Virtual Patch technology helps block attacks
        other applications provided an opportunity for                  before they reach their intended target (NOT
        attackers to penetrate Westpac’s systems                        SIGNATURE BASED)

       Attacks were leading to service interruption, data theft,      The IBM Protocol Analysis Module (PAM) uses a
        and increasing costs for remediation                            multi-layer approach of a wide variety of different
                                                                        techniques to detect and prevent exploits

       Internal Westpac users were causing security issues            The advanced heuristics engines within IBM’s Protocol
        by opening infected files in their emails                       Analysis Module can detect and block many of these
                                                                        attacks before they reach the user

       Attackers also were using new ways to get malware              PAM currently supports nearly 400 different protocols
        into the Bank, including storage devices and social             and file formats, so malicious files can be detected in
        engineering                                                     channels other than email

       Common applications (such as PDF, Flash, Java, and             Again, IBM’s Virtual Patch technology blocks these
        MS Office) were experiencing a high amount of                   vulnerabilities before at-risk files applications can be
        vulnerabilities                                                 compromised

5                                                                                                           © 2013 IBM Corporation
IBM Security Systems

Future Benefits to Westpac from IBM Network Security

   With new XGS next-generation platform, Westpac expects to further grow their
    comprehensive network security capabilities:

   Advanced Threat Protection                           Flexible Performance Licensing
    •   Block phishing, malware sites, and botnet           – Save money by only licensing for the throughput
                                                              you need
        command & control
                                                            – As bandwidth increases, increase appliance
    •   Visibility and control of applications can            performance without even having to reboot
        enforce policy and save bandwidth

                                                         Tight integration with QRadar
   SSL Visibility                                          – On-appliance flow generation
    •   Detect and prevent user-targeted attacks over       – LEEF-format event feeds
        encrypted channels
    •   On-box hardware acceleration prevents the
        need for a dedicated SSL appliance

   Adaptable Hardware
    •   Swappable network interface modules provide
        connectivity to 7 different network media
        standards
    •   Reduce racks pace by up to 85% and power
        consumption by up to 82% compared to GX
6       platform                                                                             © 2013 IBM Corporation
IBM Security Systems

Customer Success: Target

Client Requirements                                                                  Industry: Retail
       To increase the performance of their Datacenters target decided to
        rebuild its network infrastructure for 10 GbE
                                                                                     Profile: Target Corporation is an American
       Existing network IPS solution had only 1 Gbps throughput capacity, so        retailing company, founded in 1902 and
        they decided to evaluate different vendors to increase performance
                                                                                     headquartered in Minneapolis, Minnesota. It
                                                                                     is the second-largest discount retailer in the
Competition                                                                          United States. The company is ranked at
                                                                                     number 38 on the Fortune 500 as of 2012
       Sourcefire
                                                                                     and is a component of the Standard &
                                                                                     Poor's 500 index.

IBM Solution                                                                         Target is headquartered in Minneapolis, MN
       IBM Security Network IPS GX7800
       IBM Security SiteProtector System                                            Size: 365,000 employees

Why IBM
       Utilizing a partner’s lab, Target tested solutions from both IBM and
        Sourcefire
       Included performance testing at 10Gbps+ throughput and detection
       IBM scored higher in both areas with Sourcefire failing evasion testing
       Target later confirmed this testing with similar results in their internal
        environment
                                                                                              www. target.com

7                                                                                                           © 2013 IBM Corporation
IBM Security Systems

Customer Success: Jackson National Life Insurance

Client Requirements                                                                Industry: Insurance
       Desire to create another security layer around its critical servers
       Performance and high throughput was critical                               Profile: A family-owned company that has
       10 GbE connectivity                                                        evolved into a diversified retirement
                                                                                   services provider, Jackson National Life
                                                                                   Insurance Company® ("Jackson®") has a
Competition                                                                        rich history. Named after Andrew Jackson,
       Palo Alto Networks                                                         the seventh president of the United States,
                                                                                   Jackson first opened for business in 1961.

IBM Solution                                                                       Jackson National Life Insurance is
                                                                                   headquartered in Lansing, MI
       IBM Security Network IPS GX7412
       IBM Security SiteProtector System                                          Size: 2,900+ employees

Why IBM
       Jackson National life was already using Palo Alto Networks as their
        network firewall solution and initially considered utilizing PA IPS
       After an internal head to head evaluation, IBM scored higher as a result
        of intelligence provided by the X- Force R&D team
       IBM was also determined to be superior under high levels of throughput,
        and was valued for its ability to scale up to future bandwidth needs                 www. jackson.com

8                                                                                                        © 2013 IBM Corporation
IBM Security Systems

Customer Success: Pfizer

Client Requirements                                                              Industry: Pharmaceuticals
       Increase security in Pfizer’s key data centers to handle growth
       High levels of security without compromising performance                 Profile: Pfizer is the world's largest
                                                                                 research-based biopharmaceutical
                                                                                 company with major research and
Competition                                                                      development locations in the United States
       Sourcefire                                                               and the U.K. Phizer operates in nearly
                                                                                 every market in the world with 58 percent of
                                                                                 revenues generated outside the U.S.
IBM Solution
       IBM Security Network IPS GX7800s (4)                                     Pfizer is headquartered in New York City,
                                                                                 NY
       Deployed 2 GX7800s in each critical datacenter
       IBM Security SiteProtector System                                        Size: 100,000+ employees

Why IBM
       IBM built a close relationship with Pfizer and was able to respond
        extremely quickly to their needs
       High levels of confidence in both IBM and IBM’s security technology
       Found the IBM’s “ahead of the threat” detection to be superior vs. the
        Sourcefire offering
       Valued unique IBM features such as real-time Web application
        protection
                                                                                          www. pfizer.com

9                                                                                                      © 2013 IBM Corporation
IBM Security Systems

Key Assets and Proof Points

                                                  IBM Wins InformationWeek’s IPS Survey
                                                     IBM was rated #1 in the recent InformationWeek survey
                                                                             [LINK]

                                                    New Tolly Group Test Report Released
                                             IBM Delivers Superior Protection from Evolving Threats with High Levels
                                                                     of Performance. [LINK]

                                                      Equifax Uses QRadar, Network IPS
                                                                and AppScan!
                                               Utilize this case study to show QRadar clients the benefits of utilizing
                                                            IBM Security Network IPS for threat protection
                                                                               [LINK]

                       (Note: Put slides into presentation mode to click the links to each asset)

10                                                                                                     © 2013 IBM Corporation
IBM Security Systems

                                                             ibm.com/security

   © Copyright IBM Corporation 2013. All rights reserved. The information contained in these materials is provided for informational purposes only,
   and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or
   otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or
   representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use
   of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in
   which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion
   based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM,
   the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other
11 countries or both. Other company, product, or service names may be trademarks or service marks of others.                          © 2013 IBM Corporation
You can also read