...

Tivoli Security Neel Kamal – 1

by user

on
Category: Documents
133

views

Report

Comments

Transcript

Tivoli Security Neel Kamal – 1
1
Tivoli Security
Neel Kamal – [email protected]
Charismatic Products and Companies
IBM Internal & BP Use Only
Charisma of Tivoli Security
Tivoli Security
IBM Internal & BP Use Only
Agenda
Market and Customer Challenges
Solution Overview
Target Customer / Buyer Segments
Success Stories
Competition Overview
IBM Internal & BP Use Only
Tivoli Security Focus Areas
Trusting
Identities
Managing
Access
Securing
Services
Protecting
Data
IBM
Payroll
Customers, partners,
employees (known)
IBM is #1 in this space
E
RC
O
F
Y
EN LIC
PO
Online banking
Loan
applications
Retail sales
Inventory
Manage those you know.
IBM Internal & BP Use Only
HCR
U6
IBM
Tivoli Security Focus Areas
Trusting
Identities
Managing
Access
Securing
Services
Protecting
Data
IBM
Payroll
Customers, partners,
employees (known)
E
RC
O
F
Y
EN LIC
PO
IBM is #1 in this space
Online banking
Loan
applications
Retail sales
Criminals, competitors,
hackers (unknown)
Inventory
IBM is #1 in this space
Manage those you know.
Protect against those you don’t.
IBM Internal & BP Use Only
HCR
U6
IBM
Tivoli Security Focus Areas
Trusting
Identities
Managing
Access
Securing
Services
Protecting
Data
IBM
Payroll
Customers, partners,
employees (known)
E
RC
O
F
Y
EN LIC
PO
Online banking
Loan
applications
IBM is #1 in this space
Retail sales
Criminals, competitors,
hackers (unknown)
Inventory
IBM is #1 in this space
Manage those you know.
Protect against those you don’t.
COMPLIANCE
Prove that you’re in control.
IBM Internal & BP Use Only
HCR
U6
IBM
Tivoli Security Focus Areas
IBM Internal & BP Use Only
Key Security Business Drivers
Lower IT Costs (While Enabling Innovation)
Address Rising Incidents
More than 12
incidents
20%
Less than 3
10%
Between 3 and 12
70%
Source: Customer Interviews
Source: IBM; IT Policy Compliance Group
Manage Insider Threat
Demonstrate Compliance
Internal attacks cost 6% of gross
annual revenue or $9 per employee
per day.
Sources: Forrester research, IdM Trends 2006;
USSS/CERT Insider Threat Survey 2005/6;
CSI/FBI Survey, 2005; National Fraud Survey;
CERT, various documents.
Example: Need to Meet the Requirements
of the PCI “Digital Dozen”
IBM Internal & BP Use Only
The IBM Security Opportunity is Significant
and Growing
200
Worldwide Security Products and Services
Revenue, 2006-2009 ($B)
CAGR (%):
140
120
100
80
60
40
20
0
Total (11.5%)
175.3
180
160
158.0
142.2
42.3
126.3
39
35
43
2006
47.6
48.3
52.3
32.7
28
23.8
Physical Security
Managed services and
systems integration
103.5 (9.5%)
94.6
86.6
78
24.5
45.9
63.4
55.6
57.6
Physical Security
Equipment, Software,
Appliances (10.2%)
37.9
IT Security
Services (17.1%)
71.8
27.6
30.7
33.9
2007
2008
2009
IT Security Hardware,
Software, Appliances
(12%)
• Security represents a
large and fast growing
opportunity
• Strong leadership in
Identity and Access
Management (IAM),
Application Security
and Intrusion
Prevention Systems
(IPS)
Source: IDC, Dec 2007 -- Worldwide IT Security Software, Hardware, and Services 2006-2010 Forecast : The Big Picture.
Source: Lehman Brothers, Nov 2007 – Security Industry Annual.
(Physical Security segments tracked by Lehman Bros but not included: guarding, armored transportation
equipment and services, doors and fences, intelligence & investigation services)
IBM Internal & BP Use Only
Agenda
Market and Customer Challenges
Solution Overview
Target Customer / Buyer Segments
Success Stories
Competition Overview
IBM Internal & BP Use Only
IBM Security Solutions Portfolio Delivers
Comprehensive Security Risk & Compliance
Management
The only security vendor in the market
with an end-to-end framework and solution
coverage from both the business and IT
security perspectives
15,000 researchers, developers and SMEs
on security initiatives
3,000+ security & risk management
patents
200+ security customer references and
50+ published case studies
Managing over 10 billion security events
per day for over 3,700 clients
40+ years of proven success securing the
zSeries environment
$1.5 Billion security spend in 2008
IBM Internal & BP Use Only
Why being comprehensive is that such a big deal !!
Reduce cost by reusing infrastructure
Convenience in getting support as needed.
Note: 1800 IBM Help – world class support
Bundle Pricing and discounts
We know the destination!!
Note: We have everything you need to get their safely and quickly
IBM Internal & BP Use Only
The business
Visibility
Control
Automation
IBM Internal & BP Use Only
Manage Risks
Reduce Cost
The business
Visibility
Control
Automation
Compliance /
Governance
Enable innovation
IBM Internal & BP Use Only
Manage Risks
Reduce Cost
The business
Visibility
Control
Automation
Compliance /
Governance
Enable innovation
people
Employees and admins
Customers and
Bus. partners
IBM Internal & BP Use Only
Manage Risks
Reduce Cost
The business
Visibility
Control
Automation
Compliance /
Governance
Enable innovation
people
Customers and
Bus. partners
Employees and admins
Data
IBM Internal & BP Use Only
Manage Risks
Reduce Cost
The business
Visibility
Control
Automation
Compliance /
Governance
Enable innovation
people
Customers and
Bus. partners
Employees and admins
Data
CRM
Application
ERP
IBM Internal & BP Use Only
Manage Risks
Reduce Cost
The business
Visibility
Control
Automation
Compliance /
Governance
Enable innovation
people
Customers and
Bus. partners
Employees and admins
Data
CRM
Application
ERP
infrastructure
IBM Internal & BP Use Only
Manage Risks
Reduce Cost
The business
Visibility
Control
Compliance /
Governance
Automation
Enable innovation
mitigate
assess
manage
people
Customers and
Bus. partners
Employees and admins
Data
CRM
Application
ERP
infrastructure
IBM Internal & BP Use Only
Manage Risks
Reduce Cost
The business
Visibility
Control
Compliance /
Governance
Automation
Enable innovation
mitigate
assess
manage
people
Customers and
Bus. partners
Employees and admins
Cyber security
hackers
Data
Application
development
CRM
Application
ERP
cloud
infrastructure
IBM Internal & BP Use Only
Manage Risks
Reduce Cost
The business
Visibility
Control
Compliance /
Governance
Automation
Enable innovation
mitigate
assess
manage
people
Customers and
Bus. partners
Employees and admins
Cyber security
hackers
Data
Application
development
CRM
Application
ERP
cloud
infrastructure
IBM Internal & BP Use Only
Agenda
Market and Customer Challenges
Solution Overview
Target Customer / Buyer Segments
Success Stories
Competition Overview
IBM Internal & BP Use Only
To successfully sell security, you must include
the right stakeholders during the sales cycle:
LOB owners
SOA/App Architects
Application/Db Authorization
Security Admin
Network / Operations
Identity and
Access Management
Federation
Web Security
User Account
Provisioning
Key
Management
Compliance
Threat Mitigation
(The solution categories shown typically move right over time – (For ex. - Federation and Web Security both started more in
the “SOA/Application Architects” domain))
IBM Internal & BP Use Only
Agenda
Market and Customer Challenges
Solution Overview
Target Customer / Buyer Segments
Success Stories
Competition Overview
IBM Internal & BP Use Only
Major Grocery Business Adopts ISS Technology Across Its Retail Locations to Achieve PCI Compliance
Industry: Retail / Distribution
Food Lion : one of the largest supermarket chains in the United States, operating 1,300 supermarkets
TSV: $1.2 million
Client Challenge
1300 Retail Stores upgraded to use New Internet Technologies
Had to Remain PCI Compliant
Concerned about Internet Threats to the store networks.
Client wanted an inexpensive design.
IBM Response
ISS sales team positioned the IBM Proventia Network MFS (MX1004) as the device of choice for Food Lion.
The ISS sales team engaged the MFS product team and was able to beat rival CISCO for the business.
IBM Solution
IBM Proventia Network Multi-Function Security (MFS) - 1385 units
IBM Internal & BP Use Only
IBM ISS helps Shearman & Sterling, LLP secure its network and data within 20 days.
Industry: Legal
TCV: $330,000 - New IBM security white space client!
Client challenge
– When a key security employee unexpectedly left the company, the client needed to act quickly to secure its highly
private and global business data.
– The organization’s network was exposed, requiring immediate support
– Client needed an immediate solution to monitor and manage these devices.
IBM Response
– On Site Executive Discussion.
– Once the employee left – IBM responded immediately to have the solution in place
– This deal closed in its entirety in only 20 days,
•
•
•
including a targeted review of IBM offerings
a thorough scoping of the client requirements
identification of necessary solutions and final receipt of the signed contract.
IBM Security Solution
Contract to monitor and manage Cisco products: (8) firewalls and (2) IPS devices.
Monitor’s Globally in Hong Knong, Bejing, the UK, and the US
IBM Internal & BP Use Only
Tivoli Security – Sales Success Stories
IBM Internal & BP Use Only
Tivoli Security – Sales
Success Stories
ty
uri
ec in
S
i
l
ivo ilable
T
of ava
t
e
s ires Kits
l
l
Fu inW ales
S
W
IBM Internal & BP Use Only
IBM Security Solutions Combined Portfolio: Sum is
Greater Than its Parts
Wave: ISS Managed Security Services
Leader
Wave: User Account Provisioning and Enterprise Security
Information Management
Leader
MQ: ISS Network Security, Firewalls and Managed Services
Leader
MQ: Web Access Management
Leader
MQ: Security Information & Event Management
MQ: User Provisioning ( TIM )
Challenger
Leader
#1
Marketshare: Web Access Management, Worldwide,
( FIM, TAM )
Ranked #1
#1
Marketshare : Application Security Vulnerability Scanning,
Ranked #1
#1
ISS Managed Security Services and Vulnerability Assessment
Ranked #1
#1
Identity Management ( TIM , TAM, FIM, TDI, TDS)
Ranked #1
#1
Marketshare: Identity and Access Management
Ranked #1
#1
Marketshare: Application Vulnerability Assessment
(Rational AppScan)
Ranked #1
#1
Intrusion Prevention System
Ranked #1
( Rational AppScan )
IBM Internal & BP Use Only
Why IBM? - Analysts recognize IBM leadership
Gartner Leadership
IDC Market Share Leadership
– Web Access Management Magic
Quadrant (November 2009)
– User Provisioning Magic Quadrant
(September 2009)
– Enterprise Single Sign-On Marketscope
– Strong Positive (September 2009)
– Security Information & Event
Management Magic Quadrant (May
2009)
– Managed Security Services Providers,
North America Magic Quadrant (April
2009)
Forrester Leadership
– Managed Security Services Market
Overview (January 2010)
– Identity & Access Management Wave
(November 2009)
– Information Security and IT Risk
Consulting Wave (March 2009)
FOR IBM INTERNAL AND BP USE ONLY
– #1 Identity & Access Management
(2009)
– #1 Application Vulnerability Assessment
(2009)
– #1 Vulnerability Assessment (2009)
– #1 Intrusion Prevention Systems (IPS)
Market Leader for $100,000+ Systems
(2009)
Frost & Sullivan Leadership
– Managed Security Services (2009)
– Latin American Managed Security
Services Market Study (2009)
– North American Network Security
Infrastructure Protection Company of
the Year (2009)
– North American Video Surveillance
Software Developer Company of the
Year (2009)
EMA Leadership
– Website Vulnerability Assessment
Value Leader (2009)
IBM Internal & BP Use Only
Agenda
Market and Customer Challenges
Solution Overview
Target Customer / Buyer Segments
Success Stories
Competition Overview
IBM Internal & BP Use Only
Competitive Landscape
http://ciportal.tivlab.austin.ibm.com
IBM Internal & BP Use Only
IAM Competitive Landscape
IBM Internal & BP Use Only
Questions?
IBM Internal & BP Use Only
35
36
BACKUP SLIDES
IBM Internal & BP Use Only
37
IBM Network Intrusion Prevention System
Protecting the network ahead of the threat
Features:
Benefits:
Modular product architecture drives
security convergence by adding
entirely new modules of protection as
threats evolve; from worms to botnets
to data security to Web applications,
Proventia® Network IPS delivers the
protection demanded for business
continuity, data security & compliance.
With a variety of models and solutions
ranging in speeds from 10 Mbps to 40
Gbps, Proventia Network IPS offers a
model sized specifically for clients’
differing needs, from remote office
deployments to core network
applications.
Stops threats before impact without
sacrificing high-speed network
performance.
Protects networks, servers, desktops
and revenue-generating applications
from malicious threats.
Evolves with network security needs to
reduce the cost of managing dozens of
different point products.
Flexible management options address
each client’s unique needs.
Why IBM?
Delivers pre-emptive protection backed by the IBM Internet Security
Systems™ X-Force® research and development team
Preserves network performance and availability
Offers ease of installation, configuration and management
IBM Internal & BP Use Only
38
IBM Management SiteProtector System
Enhancing the effectiveness of security operations through a central point of
management
Features :
Benefits :
Offers a centralized interface to
control and manage diverse
network and host security devices
Incorporates advanced event
analytics and flexible,
customizable reporting
Integrates within existing systems
and expands to support additional
types and functions of security
offerings
Helps reduce the costs and
complexity of security management
Enables you to better understand
and communicate your enterprisewide security posture of risk
Leverages existing investments
and skill sets while easing
deployment of additional
capabilities
Why IBM?
Provides single management tool that supports broad range of security products and
allows cost-effective incremental growth
Incorporates time-tested IBM practices and methods as well as industry-leading research
from the X-Force team
IBM Internal & BP Use Only
39
IBM Proventia server protection
IBM ISS Threat Mitigation Services – endpoint system protection – server
protection
Features:
Benefits:
An intrusion prevention system
that utilizes multiple layers of
defense
IBM Virtual Patch® technology,
buffer overflow exploit prevention
(BOEP), application black and
white listing and the ability to
inspect secure Web transactions
before they’re delivered to the
Web application
A firewall to help decrease
exposure to malicious activity
Combines multiple inspection
technologies to offer superior
protection at the deepest network
levels
Helps ensure data confidentiality
and ease regulatory compliance
through extensive monitoring
Aids in reducing cost and
complexity through centralized
security management and
extensive support for multiple
operating systems
Why IBM?
Backed by IBM ISS X-Force® research and development team
Supported by IBM Managed Protection Services (MPS)
IBM Internal & BP Use Only
40
IBM Proventia Virtual Server Security for VMware
Helps customers to be more cost-effective, compliant and secure by delivering
integrated and optimized security for virtual data centers
Features:
Benefits:
Intrusion prevention and Firewall
Automatic VM discovery
VM rootkit detection and
Inter-VM traffic analysis
Virtual infrastructure auditing and
reporting
Virtual network access control
IBM Virtual Patch® technology
Enforces dynamic security wherever
virtual machines (VMs) are deployed
Helps to accelerate and simplify your
Payment Card Industry Data Security
Standard (PCI DSS) audit, and achieve
compliance with security and reporting
functionality customized for the virtual
infrastructure
Increases the ROI of the virtual
infrastructure with automatic protection,
discovery and assessment features
Why IBM?
Provides a complete solution for physical and virtual security backed by the worldrenowned security research
Enables clients to manage virtual security and existing protection from the same console
IBM Internal & BP Use Only
Example: IBM Solutions for Total PCI Compliance
SECURITY POLICY FOR
EMPLOYEES & CONTRACTORS
IBM ISS Products & Services
Tivoli Security Compliance Manager
IBM Global Services
IBM Rational AppScan
FIREWALL TO PROTECT
CARDHOLDER DATA
IBM Proventia Server Intrusion
Prevention System (IPS)
IBM Proventia Network (IPS)
IBM Global Services
IBM Global Services
Tivoli Console Insight Manager
IBM Tivoli Access Manager
IBM Proventia Network Multi-Function
Security (MFS)
IBM Global Services
IBM Tivoli Compliance Insight Manager
IBM Tivoli Security Operations Manager
IBM Proventia Server IPS
IBM Global Services
IBM Digital Video Surveillance
IBM Biometric Access Control
IBM Global Services
SECURE & PROTECT
CARDHOLDER DATA
8
IBM Tivoli Identity Manager
IBM Tivoli Federated Identity Manager
IBM Global Services
RESTRICT ACCESS
D
GE
NA ES
MA IC
M RV
IB SE
41
IBM Tivoli Access Manager
IBM Tivoli zSecure Admin
IBM Tivoli Compliance Insight Manager
IBM Global Services
4
SECURE SYSTEMS &
APPLICATIONS
7
IBM Software Development Platform
IBM Tivoli CCMBD
IBM Global Services
IBM Rational AppScan
ENCRYPT TRANSMISSION
6
5
IBM Storage Manager
IBM Proventia Server IPS
IBM PKI Services
IBM Global Services
IBM Data Encryption of IMS and DB2
IBM Websphere
Proventia Network Intrusion Prevention System
DataPower XML Security Gateway
USE & UPDATE
ANTI-VIRUS SOFTWARE
IBM Proventia Desktop Endpoint Security
IBM Proventia Network Enterprise Scanner
IBM Global Services
IBM Internal & BP Use Only
AR
E
UNIQUE IDs
PROTECT STORED
CARDHOLDER DATA
3
9
DW
RESTRICT PHYSICAL
ACCESS
NO DEFAULT PASSWORDS
OR SECURITY PARAMETERS
2
10
MONITOR ACCESS
1
12
HA
R
11
IB
M
&
IB
M
TEST SECURITY SYSTEMS
AND PROCESS
E
AR
W S
FT ON
SO TI
M LU
IB SO
BP
SE PR
RV O F
IC ES
ES SIO
NA
L
The products outlined in this chart highlight IBM capabilities. Please call your local IBM executive for a full listing of all products and services that map to PCI requirements
AP Organizational Resources to Assist
AP Sales
AP Tivoli Security Leader, ISS Leader
– Tim Birdsall
([email protected])
SPL ITS Sales Leader
– Ramon Jocson
([email protected])
SPL ISS Leader
– Justine Milne
([email protected])
Japan Sales
Japan Tivoli Security Leader
– Keiko Nagatani
([email protected])
Japan ISS Leader
– T Arakawa
([email protected])
Japan SPL ITS and ISS Sales Leader
– Muneyuki Watanabe
([email protected])
AP Technical Services-Tivoli
James Darwin
([email protected])
AP SWAT-Tivoli
Chris Hockings
([email protected])
AP Technical Pre-salesTivoli/ISS
Scott Henley
([email protected])
IBM Internal & BP Use Only
Tivoli WW Security Contacts – Overview – January 2010
Internal Use Only
1 of 5
To activate email links, view these slides in Screenshow mode.
Product
Product/Market Manager
Enablement Manager
GTM Manager
Tivoli (ISS)
IBM Proventia Network IPS
Eric York
Scott Paisley
Brian Moran
IBM Proventia server protection
David Abercrombie
Kent Browne
Dori White
IBM Proventia SiteProtector
Charles Arnett
Kent Browne
Wangui McKelvey
IBM Network Multi-function Security (MFSUTM)
Matt Ward
Kent Browne
Wangui McKelvey
IBM Virtual Server Security for VMware
David Abercrombie
Scott Paisley
Dori White
Identity & Access Assurance
Rick Weinberg / Ravi Srinivasan
Neel Kamal / Mike Campbell
Perry Swenson
Data & App Security
Rich Telljohan
Ray Neucom
Kelly Schupp
Security Mgmt. for z/OS
Glinda Cummings
Ted Ralston
Anne Lescher / Barbara Kennedy
Tivoli (IAM/Risk/Compliance Bundles)
Tivoli (IAM/Risk/Compliance Individual Products)
TIM
Rick Weinberg
Neel Kamal
Perry Swenson
TSPM
Ravi Srinivasan
Ray Neucom / Mike Campbell
Kelly Schupp
TAMeb
Ravi Srinivasan
Ray Neucom / Mike Campbell
Perry Swenson
TAM E-SSO (Encentuate)
E. K. Koh
Neel Kamal / Mike Campbell
Perry Swenson
TAMOS
Russ Warren
Mike Campbell
Perry Swenson
TFIM (SOA / F-SSO)
Ravi Srinivasan
Ray Neucom
Perry Swenson
TFIM BG
Ravi Srinivasan
Ray Neucom
Perry Swenson
TDI
Jason Todoroff (Release/Development Manager)
Perry Swenson
TDS
Amit Kapil (Test Management)
Perry Swenson
TCIM/TSIEM
Nick Briers / Luis Casco-Arias TSIEM Collectors)
Neel Kamal
Kelly Schupp
zSecure Suite
Glinda Cummings
Ted Ralston
Anne Lescher / Barbara Kennedy
TSOM
Luis Casco-Arias
Ted Ralston
Kelly Schupp
TSCM
<Open>
Ted Ralston
Kelly Schupp
TKLM
Gordon Arnold
<Open>
Kelly Schupp
Unified SSO
E. K. Koh
Neel Kamal
Perry Swenson
IBM Internal & BP Use Only
Internal Use Only
Tivoli WW Security Contacts – Overview – January 2010
Tivoli Security Development
Venkat Raghavan – Director Security Development
Jim Bowerman - Director, Compliance Products
Michael Pintus - TSOM Development
Eric van der Schilden – TCIM Development
Bob Gilliam - Director, Tivoli Security Development
Rudy Coward - WW Support (Level 3)
Mark Gould – Tivoli Security/Directory Development
Other Key Tivoli Security Contacts
For information about . . .
Contact . . .
Advanced Tech Group (Manager)
Claire Rankin
Business Development
Jack Desjardins
Channels
Jocelyn Urdahl (Manager) & Lisa Jensen
Competition
Blair Drenner
Education – Customer
Lanny Heidenfelder
Education - Internal
Steve Criswell
Education/Enablement – Technical
Stefan Mueller
Enablement – Sales
Joe Carusillo
IBM VP Security Strategy
Kristin Lovejoy
IGS
Randy Orr
Security, Risk & Compliance Prod. Mgmt.
Greg Adams (Director)
Craig Love – TIM Development
- Joe Anthony (Program Director – Identity/Application Security Product Mgmt.
- Chris Bauserman (Mgr. – Data Security / Compliance Product Mgmt.
Hans Schoone – zSecure Development
* Partial view. For a complete view of the
development organization, check BluePages.
2 of 5
Pricing
Rob Spash
Program Manager
Sonia Kobdish
Security Portfolio Manager
Jeanette Fetzer
Support Planning
Jane Becker
Tiger Team
Kent Blossom
IBM Internal & BP Use Only
Internal Use Only
Tivoli WW Security Contacts – Overview – January 2010
3 of 5
Service Product Line (SPL) – ISS Functional Leadership Matrix
Marc van Zadelhoff
Dir., WW Sales &
Offering Mgt
Geo Sales Leaders
WW Sales
Latha Miripuri
PSS Offering Mgmt
Jason Hilling & team
MSS Offering Mgmt
Ramon Jocson
AP ITS Sales
Uwe Kissmann
CM SPL Sales
Muneyuki Watanabe
JP ITS Sales
Joao Gaspar
LA SPL Sales
Chris Esemplare
NA SPL Sales
Bjoern Haan
NE SPL Sales
Carsten M Nitschke
SW SPL Sales
IBM Internal & BP Use Only
Enablement &
Alliances teams
Internal Use Only
Tivoli WW Security Contacts – Overview – January 2010
4 of 5
Tivoli Sales Organization – Functional Mapping
Tivoli Sales Leader
Security Leader
ISS Leader
AP
Mitch Young
Tim Birdsall
Tim Birdsall
ANZ
Mike McKee
Paul Cooper
Paul Cooper
ASEAN
TBD
Chi Sen Gay
SG/PH/TH - Tit Ho Tan
MY/ID/VN - Mohammad Ismail
Ahmad
GCG
Willie Hui
Eric Chin
CN - Bo Yuan
HK - Patrick Tang
TW - Regina Chuang
ISA
Gaurav Agarwal
Ram Gandhekar
Vaidy Iyer
Korea
JongBaek Park
KyuuShik Eom
Seung Wook Cha
CEEMEA
Ernest Jones
Hansjoerg Benz
CEE
Peter Rehus
Dusan Milidrag
MENA
V Fickweiler
Hansjoerg Benz (a)
R/CIS
A Kuznetsov
Oxana Tikhonova
SA
John Stallard
Helen Constantinides
Japan
TBA
Keiko Nagatani
T Arakawa
LA
Dalmir J Santos
Max Rodriguez
Ricardo DS Marques
Brazil
Joaquim F Campos
Joaquim F Campos
Mexico
Juan F Garcia
Juan Francisco Garcia
SSA
Ramiro Zuniga
Ramiro Zuniga
Tivoli Sales Leader
Security Leader
ISS Leader
NA
Bob Jones
Kevin Williams
Chris Esemplare (a)
Canada
Chris Mallon
East
Carl Valentino
Jose Bravo
Thomas Evans
Federal
Jose Cabrera
Jerry Jarvis
David Terry
West
JP Westwood
Jerry Welsh
Laura B-Wilborn
NE
Steven Sorce
John Canny
John Canny (a)
Alps
Daniel Boehrer
Germany
Oliver Grell
Andreas Sundrum
Jens Spring
Nordics
Mats Landelius
Johan Larksater
Johan Larksater
UKI
Steve Bradford
Grant Telfer
Mike Wright
SW
Leonardo Ferri
Emmanuel R Rivera
Guido Dalla Volta
Benelux
Johan Arts
Johan Arts
France
Erick Craberou
Erick Craberou
Italy
Mauro Bonfanti
Mauro Bonfanti
SPGI
Diego Navarrete
Diego Navarrete
IBM Internal & BP Use Only
John Kokonis (a)
Daniel Boehrer
Internal Use Only
Tivoli WW Security Contacts – Overview – January 2010
Services Product Line (SPL) Sales Organization – Functional Mapping
ITS Sales Leader
ISS Leader
AP
Ramon Jocson
Justine Milne
ANZ
Simon Walsh
Kirsten Garwood
ASEAN
Yik Yong Ho
Yan Nuen Foo
GCG
Janet Ang
CN - Leo Li
HK - Stephen Chan
TW - Janet Yuan
ITS Sales Leader
ISS Leader
NA
John Visentin
Chris Esemplare
Canada
John Ostrander
John Kokonis
East
Chris Nicoletti
Joe Bronte (A/I Accts)
West
Brenda Harvey
Tom Darlington (A/I Accts)
NA GB
Ed Terry
ISA
Neeraj Sharma
Sadayappan Venkatesh
NA MSS
John Wheeler
Korea
SungShik Won
Dong Kyu Lee
NA PSS
Don Kneitel
CEEMEA
Mike Weston
Uwe Kissmann
NE
Henrik T Hedegaard
Bjoern Haan
CEE
Maria Ilieva
Vedat Finz
Alps
Fiona Cullen
Giuseppe Cristofaro
MENA
M Megawer (a)
Ragy Magdy
Germany
E Armbruster
Juergen Schmidt
R/CIS
Valery Kornienko
Uwe Kissmann (a)
Nordics
Peter Poulen
Bo S Nielsen
SA
Maureen Baird
Uwe Kissmann (a)
UKI
Robert Payne
Terry Morris
Japan
Muneyuki Watanabe
Muneyuki Watanabe
SW
Dave Goossens
Carsten M Nitschke
JP MSS
Shohichi Honma
Benelux
Bert Bouw
Olivier Roulent (BE/LU)
JP PSS
Hideo Mori
Job-Leen Oprel (NL)
LA
Armando Toledo
Joao Gaspar
France
Nicolas Grangier
Nicolas Grangier
Brazil
Newton Tanaka
Beatriz Ferreira
Italy
Antonio Taurisano
Gianluigy Baldan
Mexico
Oscar Sananez
Joaquin Tomas (a)
SPGI
Isidro C Jativa
Isidro C Jativa
SSA
Dario Santiso
Ciro Arenas
IBM Internal & BP Use Only
5 of 5
IBM Security Tiger Team Contacts (1)
IOT/G
MT
-----
IMT/GM
R
Business
Partners
U.S. East
Sales
Consultant
Ray Morin
Dyson Hepting
Primary
Architect
John McGarvey
Backup
Architect
Peter Brittenham
Support for business partners
John McKeon
US East + Puerto Rico + US Virgin Islands Roll-up states
(Alabama, Connecticut, Delaware, Florida, Georgia,
Indiana, Kentucky, Maine, Maryland, Massachusetts,
Michigan, Mississippi, New Hampshire, New Jersey, New
York, North Carolina, Ohio, Pennsylvania, Rhode Island,
South Carolina, Tennessee, Vermont, Virginia, West
Virginia)
David Hemsath
Shawn Willden
US West Roll-up states (Alaska, Arizona, Arkansas,
California, Colorado, Hawaii, Idaho, Illinois, Iowa,
Kansas, Louisiana, Minnesota, Missouri, Montana,
Nebraska, Nevada, New Mexico, North Dakota,
Oklahoma, Oregon, South Dakota, Texas, Utah,
Washington, Wisconsin, Wyoming, American Samoa,
Guam, Marshall Islands, North Mariana Island, Federated
States of Micronesia, Palau)
Peter Brittenham
John McKeon
US Federal
Peter Brittenham
David Pipher
North
America
U.S. West
Dinesh Yadav
U.S. Federal
Canada
(Sales support as
needed)
Peter Brittenham
John McGarvey
Canada (roll-up countries) - Canada, Antigua & Barbuda,
Aruba, Bahamas, Barbados, Bermuda, British Virgin
Islands, Cayman Islands, Dominica, Grenada, Jamaica,
Netherlands Antilles, Saint Kitts and Nevis, Saint Vincent
and the Grenadines, Suriname, Trinidad and Tobago,
Turks and Caicos Islands.
UKI
Matthew MiddletonLeal
John McKeon
Peter Brittenham
United Kingdom ((roll-up countries) - United Kingdom,
Channel Islands, Gibraltar, Isle of Man), Ireland
Michel Bobillier
Jean-Paul Chobert
John McGarvey
Germany
Northeast
Laura Cresce
Countries Covered
Alps
Nordic
Germany
Austria, Switzerland (roll-up countries), Lichtenstein
(Sales support as
needed)
Peter Brittenham
David Hemsath
Denmark ((roll-up countries),- Denmark, Faeroe Islands
(or Faroe Islands), Greenland), Sweden, Finland, Iceland,
Norway
IBM Internal & BP Use Only
IBM Security Tiger Team Contacts(2)
IOT/G
MT
Southwest
Japan
IMT/G
MR
Sales Consultant
Primary
Architect
Backup
Architect
Countries Covered
France
Sophie Tacchi
Jean-Paul Chobert
Shawn Willden
France ((roll-up countries) France, Andorra, French
Guyana, French Polynesia, Guadeloupe, Martinique,
Mayotte, Monaco, New Caledonia, Reunion, Wallis &
Futuna)
Italy
Umberto Sansovini
John McGarvey
Jean-Paul
Chobert
Italy (roll-up countries), Italy, San Mariino, Vatican City
BeNeLux
Jeroen Kroon
John McGarvey
Jean-Paul
Chobert
Belgium (Roll-up countries), Netherlands, Luxembourg
SPGI
(Sales support as needed)
Devesh Ranjan
Karthik
Sivakumar
Spain, Portugal, Greece, Israel, Cyprus, Malta
Japan
(Sales support as needed)
Priyank Thakur
Rohit Sarabhai
Japan
Karthik Sivakumar
Devesh Ranjan
Singapore, Indonesia, Malaysia ((roll-up countries) Malaysia, Brunei), Philippines, Thailand ((roll-up
countries) - Thailand, Myanmar-embargoed), Vietnam
((roll-up countries) - Vietnam, Cambodia, Laos)
Karthik Sivakumar
Devesh Ranjan
China ((roll-up countries) - China, Mongolia)), Hong
Kong ((roll-up countries - Hong Kong, Macau), Taiwan
ASEAN
ASEAN
GCG
GCG
India
South Asia
ISA
Venkatesh Sadayappan
Rohit Sarabhai
Priyank Thakur
India, ((roll-up countries) - India, Bhutan, Maldives,
Nepal ), Bangladesh, Sri Lanka
Korea
Korea
(Sales support as needed)
Priyank Thakur
Rohit Sarabhai
Korea
Peter Brittenham
Australia ((roll-up countries) - Australia, Papua New
Guinea, Kiribati, Samoa, Solomon Islands, TimorLeste, Tonga, Vanuatu), New Zealand ((roll-up
countries) - New Zealand, FIJI)
ANZ
Latin
America
Glen Gooding
(Sales support as needed)
ANZ
Glen Gooding
John McKeon
Brazil
(Sales support as needed)
Brazil
SSA
(Sales support as needed)
Argentina, Chile, Columbia, Peru, Venezuela, Bolivia,
Ecuador, Paraguay, Uruguay
David Hemsath
Mexico
(Sales support as needed)
Shawn Willden
Mexico, Latin Caribbean (LCR roll-up countries) Belize, Costa Rica, Dominican Republic, El Salvador,
Guatemala, Haiti, Honduras, Nicaragua, Panama
IBM Internal & BP Use Only
Technical Sales Architect Assignments (3)
IOT/G
MT
IMT/GM
R
MENA
SS
Sales
Consultant
Yasser El-Shishiny
(Sales support as
needed)
Primary
Architect
Devesh Ranjan
Rohit Sarabhai
Backup
Architect
Karthik Sivakumar
Egypt, Pakistan, Afghanistan, North Africa ((roll-up
countries) - Northwest Africa, Algeria, Morocco, Tunisia),
Middle East FZE - (Dubai (Services)),
WT Middle East ((roll-up countries) - Bahrain, Iraq,
Jordan, Kuwait, Lebanon, Libya, Oman, Palestine, Qatar,
Saudi Arabia, United Arab Emirates, Yemen)
Priyank Thakur
South Africa (roll-up countries) - South Africa, Lesotho,
Swaziland
Central Africa (roll-up countries) - Angola, Benin,
Botswana, Burkina Faso, Burundi, Cameroon, Cape
Verde Islands, Central African Republic, Chad, Comoros,
Congo Rep, Cote D'Ivoire (Ivory Coast), Democratic
Republic-Congo, Equatorial Guinea, Eritrea, Ethiopia,
Gabon, Gambia, Ghana, Guinea, Guinea-Bissau, Kenya,
Liberia, Madagascar, Malawi, Mali, Mauritius,
Mozambique, Namibia, Niger, Nigeria, Republic of
Djibouti, Rwanda, Sao Thome Island, Senegal,
Seychelles, Sierre Leone, Somalia, Tanzania, Togo,
Uganda, Zambia, Zimbabwe
David Hemsath
Albania, Albania, Bosnia & Herzegovina, Bulgaria,
Croatia, Czech Republic, Hungary, Estonia, Latvia,
Lithuania, Macedonia, Republic of Moldova, Montenegro,
Poland, Romania, Serbia, Kosovo, Slovakia, Slovenia,
Turkey
David Hemsath
Russia, Armenia, Belarus, Georgia, Kazakhstan,
Kyrgyzstan, Ukraine, Turkesh Republic Region (roll-up
countries) - Azerbaijan, Tajikistan, Turkmenistan,
Uzbekistan
CEEMEA
CEE
RCIS
Anthony Few
Anthony Few
Shawn Willden
Shawn Willden
Countries Covered
IBM Internal & BP Use Only
51
Example of a Quick Reference Guide (info available in Sales Kits)
IBM Internal & BP Use Only
Fly UP