IBM Security Intrusion Prevention Solutions Sarah Cucuz sarah.cucuz@spyders.ca
IBM Software Solution Brief IBM Security intrusion prevention solutions In-depth protection for networks, servers, endpoints and applications Highlights Provide preemptive security for the latest threats, powered by IBM X-Force Deliver multilayered protection for both physical and virtual servers across the network Protect your infrastructure from the latest application layer threats, including web application attacks As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. Today, there are hackers working around the clock, plotting threats through spyware, worms, botnets and shell code to exploit new vulnerabilities. Responding to these challenges, IBM Security offers a comprehensive portfolio of intrusion prevention solutions that go beyond traditional intrusion prevention to provide multilayered, end-to-end security that can actually protect networks from attacks before they occur. The IBM Security Network Intrusion Prevention System solution features industry-leading performance, preemptive protection powered by the X-Force research and development team, high levels of availability, and simplified deployment and management for networks. The IBM Security Network Protection offering adds additional nextgeneration features, including ultimate visibility into the network and granular controls for users and groups. IBM network intrusion prevention solutions complement IBM Security solutions for protecting hosts and virtual servers. For hosts, IBM Security Host Protection resides on individual servers and endpoints and monitors them for attacks. IBM Security Virtual Server Protection for VMware protects against the risks inherent in virtual environments. To make the entire portfolio easier and more cost effective to manage, IBM Security SiteProtector System provides a single dashboard that enables organizations to quickly and easily create security policies and updates and push them out to the intrusion prevention sensors across the entire network.
IBM Software Solution Brief automatically incorporated into the IBM Security intrusion prevention portfolio, enabling users to preempt attacks and more effectively defend their networks against emerging threats. The IBM Security portfolio of intrusion prevention solutions enables organizations to reach higher levels of security by deploying a layered approach and applying intrusion prevention to their networks, individual systems and virtual environments, versus deploying just a single intrusion prevention system. Prevent network threats IBM Security intrusion prevention solutions are designed to stop Internet threats before they impact your business. Preemptive protection protection that works ahead of the threat is available through a proprietary combination of line-speed performance, security intelligence and a modular protection engine that enables security convergence. By consolidating network demands for data security and protection for web applications, IBM Security Network Intrusion Prevention System and IBM Security Network Protection appliances serve as core security platforms that can reduce the cost and complexity of deploying and managing point solutions. IBM X-Force: Powering evolving protection The IBM Security intrusion prevention portfolio is backed by the X-Force research and development team, one of the best-known commercial security research groups in the world. This team monitors the latest Internet threats, develops security intelligence and provides advice on how to protect against imminent and emerging threats. This information is Protocol Analysis Module technology PDF XLS DOC DOC PDF Virtual Patch management Client-side application protection XLS Web application protection Threat detection and prevention Data security Application control The IBM protocol analysis module drives security convergence to deliver network and server protection that goes beyond traditional approaches. 2
IBM Software Solution Brief Stopping Internet threats before they impact the business As a global leader in information solutions, Equifax holds one of the largest stores of consumer and commercial data income data, unemployment data, asset and wealth data, property data, credit scores and much more. As a result, security is of paramount importance to both Equifax and the people and organizations it serves. In late 2005, Equifax s board of directors met with executives to discuss evolving security risks. At the time, most companies were concerned with closing vulnerabilities that hackers could exploit. However, as criminals began to strategically target companies over a period of months, and even years, to steal data or intellectual property, Equifax executives recognized a more holistic approach was needed one that would enable administrators to assemble disparate pieces of information and uncover new threats from patterns of activity. In addition to utilizing IBM QRadar Security Intelligence Platform, Equifax moved from a standard network detection model to an intrusion prevention framework using an IBM Security intrusion prevention solution one that enables the identification of malicious behavior and threats hidden within network traffic. Supported with new threat intelligence from IBM X-Force research and development, the solution helps Equifax proactively identify and prevent evolving threats. Protect high-value assets on the network IBM Security Host Protection solution provides centralized host control that can scale to hundreds of thousands of endpoints, with support for a variety of operating systems. It can detect specific threats and classes of threats with a deep packet inspection system that differentiates between valid and malicious traffic including threats tunneling through encrypted web transactions and stops those threats as they occur. It can also protect hosts against data breaches and facilitate tracking and reporting for regulatory compliance. Minimize security risk for virtual environments Now, organizations can leverage the many cost benefits of virtualization without incurring the added risks from the hypervisor and management stack layers, rootkit activities and unauthorized virtual machines. IBM Security Virtual Server Protection for VMware automatically helps ensure that security policies persist as virtual machines migrate from server to server, providing firewall and intrusion prevention without the need for a host-based agent. This solution helps organizations meet regulatory compliance by limiting critical data access, tracking user access and providing virtual infrastructure reports. It also helps minimize virtual machine sprawl and associated security risk, while maximizing virtual machine density. Centralize security management IBM Security SiteProtector System provides a single point of control that pushes security policies and updates out to intrusion prevention mechanisms, then collects event information to provide real-time insight into the security status of the entire network. By collecting real-time security data from each intrusion prevention solution, the system highlights the current security status and provides reports on long-term regulatory compliance. The consolidated dashboard provides at-a-glance information on current and emerging threats, along with deeper analyses based on a variety of filters that can be used to prove regulatory compliance, as needed. Capable of scaling to thousands of locations and a wide variety of operating systems, IBM Security SiteProtector System reduces the cost and complexity of security management through centralized control of diverse network and host security devices. 3
Why IBM? Together, the solutions comprising the IBM Security intrusion prevention system portfolio can secure an entire network including individual physical and virtual hosts, endpoints, applications and all the traffic that flows through the network from a wide range of threats. In addition, they can do this from a single console, which saves IT staff time. Protect your network with this layered approach from IBM Security, and achieve new levels of security for your organization. For more information To learn more about IBM Security intrusion prevention solutions, contact your IBM representative or IBM Business Partner, or visit: ibm.com/security About IBM Security solutions IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research and development, provides security intelligence to help organi- zations holistically protect their people, infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world s broadest security research, development and delivery organizations, monitors 13 billion security events per day in more than 130 countries, and holds more than 3,000 security patents. Copyright IBM Corporation 2013 IBM Corporation Software Group Route 100 Somers, NY 10589 Produced in the United States of America June 2013 IBM, the IBM logo, ibm.com, SiteProtector, and X-Force are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at Copyright and trademark information at ibm.com/legal/copytrade.shtml QRadar is a registered trademark of Q1 Labs, an IBM Company. This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. The client examples cited are presented for illustrative purposes only. Actual performance results may vary depending on specific configurations and operating conditions. THE INFORMATION IN THIS DOCUMENT IS PROVIDED AS IS WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. The client is responsible for ensuring compliance with laws and regulations applicable to it. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the client is in compliance with any law or regulation. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that systems and products are immune from the malicious or illegal conduct of any party. Please Recycle WGS03004-USEN-01
About Spyders: Spyders is a fast-growing provider of networking and information security services for clients across industry verticals including financial services, healthcare and education. For over 25 years, Spyders team has been delivering cost-effective network and IT security services and training to help Private and Public sector businesses gain a competitive advantage in the market place. Organizations of all sizes rely on Spyders to protect their critical assets, mitigate and manage risk and reduce costs.