IBM Security X-Force Threat Intelligence

Similar documents
IBM Security Intrusion Prevention Solutions

Strengthen security with intelligent identity and access management

IBM Security QRadar Risk Manager

IBM Security QRadar Vulnerability Manager

IBM Security QRadar Risk Manager

Beyond passwords: Protect the mobile enterprise with smarter security solutions

IBM Security re-defines enterprise endpoint protection against advanced malware

Boosting enterprise security with integrated log management

Breaking down silos of protection: An integrated approach to managing application security

Simplify security management in the cloud

Risk-based solutions for managing application security

Safeguarding the cloud with IBM Dynamic Cloud Security

IBM QRadar Security Intelligence April 2013

Applying IBM Security solutions to the NIST Cybersecurity Framework

Leverage security intelligence for retail organizations

Reducing the cost and complexity of endpoint management

Selecting the right cybercrime-prevention solution

Securing the mobile enterprise with IBM Security solutions

IBM Security Network Protection

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

IBM Security Privileged Identity Manager helps prevent insider threats

Under the Hood of the IBM Threat Protection System

Security Intelligence

IBM Advanced Threat Protection Solution

Security strategies to stay off the Børsen front page

IBM Security QRadar QFlow Collector appliances for security intelligence

IBM QRadar Security Intelligence Platform appliances

IBM Security IBM Corporation IBM Corporation

The webinar will begin shortly

IBM Security Network Protection

Introducing IBM s Advanced Threat Protection Platform

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

and Security in the Era of Cloud

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

Extending security intelligence with big data solutions

How To Create An Insight Analysis For Cyber Security

IBM Endpoint Manager for Server Automation

Gaining the upper hand in today s cyber security battle

IBM Endpoint Manager for Core Protection

IBM Tivoli Federated Identity Manager

Win the race against time to stay ahead of cybercriminals

IBM Security Intelligence Strategy

The Current State of Cyber Security

IBM Security QRadar SIEM Product Overview

IBM Endpoint Manager for Mobile Devices

How to Choose the Right Security Information and Event Management (SIEM) Solution

IBM SmartCloud Monitoring

Managing security risks and vulnerabilities

The IBM Cognos family

IBM Security Strategy

Streamlining Web and Security

IBM Software Cloud service delivery and management

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

IBM SECURITY QRADAR INCIDENT FORENSICS

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

IBM Internet Security Systems products and services

For healthcare, change is in the air and in the cloud

Preemptive security solutions for healthcare

IBM Social Media Analytics

QRadar SIEM and Zscaler Nanolog Streaming Service

Move beyond monitoring to holistic management of application performance

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

IBM Tivoli Directory Integrator

Consolidated security management for mainframe clouds

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

Securing and protecting the organization s most sensitive data

Protecting against cyber threats and security breaches

IBM QRadar as a Service

What is Security Intelligence?

Symantec Cyber Security Services: DeepSight Intelligence

IBM Endpoint Manager for Lifecycle Management

IBM Security Network Intrusion Prevention System

IBM Global Technology Services Preemptive security products and services

Q1 Labs Corporate Overview

Security Intelligence Services.

IBM Cognos Enterprise: Powerful and scalable business intelligence and performance management

IBM Software Group IBM Marketing Center

Cisco Security IntelliShield Alert Manager Service

QRadar SIEM and FireEye MPS Integration

The business value of improved backup and recovery

How To Buy Nitro Security

Stay ahead of insiderthreats with predictive,intelligent security

AMPLIFYING SECURITY INTELLIGENCE

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Effectively Using Security Intelligence to Detect Threats and Exceed Compliance

IBM Protocol Analysis Module

Achieve Deeper Network Security

Transcription:

IBM Security X-Force Threat Intelligence Use dynamic IBM X-Force data with IBM Security QRadar to detect the latest Internet threats Highlights Automatically feed IBM X-Force data into IBM QRadar Security Intelligence Platform analytics Enrich QRadar threat analysis capabilities with up-to-the-minute data on Internet threats Leverage the additional threat context provided by IBM Security X-Force Threat Intelligence to gain deeper insight and greater protection Prevent or minimize the impact of today s complex and serious security attacks As security threats steadily increase in volume and sophistication, it s becoming more challenging to identify the most serious ones. Users must correlate threat information from multiple sources to make more informed decisions about which security issues pose the biggest threats to their organizations. This is particularly true on today s smarter planet, where instrumented, interconnected and intelligent businesses collect, process, use and store more information than ever before. With today s large variety of incoming attacks, it can be extremely difficult to detect and analyze ever-changing threats much less to turn collected threat data into actionable insights that consistently identify which threats are most dangerous. A solid security foundation designed to meet this need is IBM QRadar Security Intelligence Platform, an integrated family of products that helps detect and defend against threats by applying sophisticated analytics to more types of data. In doing so, the platform helps identify high-priority incidents that might otherwise get lost in the noise. And you can extend these comprehensive analytics still further, using IBM Security X-Force Threat Intelligence to augment QRadar intelligence capabilities by feeding it proprietary threat insights, including data on malware hosts, spam sources and anonymous proxies. Combining worldwide intelligence from IBM X-Force with security information and event management (SIEM), log management, anomaly detection, and configuration and vulnerability management capabilities from QRadar solutions provides users with additional context on security incidents, helping improve prioritization of incidents that require additional examination and enabling organizations to prevent or minimize damaging attacks.

IBM Software Address growing security threats head on Channel the power of IBM X-Force Tens of thousands of malware samples are created every day, with new classes of threats continually added to and improved upon. Sophisticated hackers use polymorphic programs to alter malware into new form factors after each delivery. And all of this is exacerbated by the proliferation of mobile devices, cloud computing and virtualization in fact, the intersection of these technologies provides fertile new ground for threats and malware. X-Force Threat Intelligence is much more than just a compilation of threat data. Behind it is the power of the IBM X-Force research and development team one of the best-known commercial security research groups in the world. This team of security experts provides the foundation for the IBM preemptive approach to Internet security by focusing their attention on researching and evaluating vulnerabilities and security issues, developing assessments and countermeasure technologies for IBM products, and educating users about emerging Internet threats and trends. In addition, today s attacks are often not random, but targeted for maximum financial gain and impact. Rogue individuals and groups are constantly innovating new ways to attack organizations critical data. As a result, traditional methods of dealing with Internet threats are no longer enough. Organizations need visibility into a much wider range of threat data than ever before in order to protect themselves most effectively. Adding X-Force Threat Intelligence to the QRadar Security Intelligence Platform can provide the extra intelligence required to go up against these modern-day threats. X-Force is instrumental in protecting users against the threat of attack because their knowledge base and data-collection methods are unmatched in the industry. From a vulnerability perspective, the team maintains and analyzes one of the world s most comprehensive databases of known security vulnerabilities, with more than 70,000 entries, including detailed analyses of every notable public vulnerability disclosure since 1994. From a threat perspective, the team tracks billions of security incidents daily, monitors millions of spam and phishing attacks, and has The value of the IBM X-Force research and development team Internet Global data centers Data capture Analysis Threat intelligence databases IBM Security X-Force Threat Intelligence The X-Force research and development team inspects millions of new and updated Internet sites every day, collects information, categorizes content and identifies those sites that pose a security danger to an organization. 2

analyzed billions of web pages and images. X-Force maintains a global research footprint that delivers unequaled security research and threat mitigation technology to IBM users. In addition to relying on their own findings, the X-Force team collects data from multiple research sources, researching all publicly disclosed vulnerabilities, consuming commercial vulnerability data and monitoring the underground for zero-day vulnerabilities. It also collaborates with the world s leading businesses and governments, vertical sector information sharing and analysis centers, global coordination centers, and other product vendors to provide complete data. Finally, from an engineering perspective, the team analyzes proof of concepts and public exploit code. By monitoring global Internet threats around the clock and updating the IBM Internet Security Systems AlertCon resource center in real time, the X-Force team helps keep IBM users abreast of the current global Internet threat level at all times. QRadar users gain access to all of these benefits when they add the proprietary threat insights of X-Force Threat Intelligence to QRadar Security Intelligence Platform. Enhance QRadar capabilities with X-Force X-Force Threat Intelligence leverages the X-Force research and development team s skills and infrastructure to provide additional insight into and context for security situations that involve IP addresses of a suspicious nature. By categorizing IP addresses into segments such as malware hosts, spam sources and anonymous proxies, this IP reputation data can be incorporated into QRadar rules, offenses and events. This allows for capturing events more quickly and accurately than previously possible, as well as for capturing them in a way that provides additional understanding for further analysis. Enhance IBM Security QRadar with IBM Security X-Force Threat Intelligence X-Force Threat Intelligence Botnet command and control Anonymous proxies Dynamic IPs Spam Malware Scanning IPs Standard intelligence feed Open-source threat intelligence Using X-Force Threat Intelligence with QRadar provides valuable capabilities beyond those included in the standard QRadar intelligence feed, such as frequent updates, in-house analytics, confidence ranking and comprehensive coverage. 3

Real-time security overview with IBM Security X-Force Threat Intelligence correlation Selection of malicious IP categories Ability to set rules leveraging IBM Security X-Force Threat Intelligence Leveraging X-Force Threat Intelligence in conjunction with QRadar rules enables users to more precisely detect dangerous network activity. X-Force IP reputation data is constantly updated and maintained, and the content in these feeds is given relative threat scoring. This enables QRadar users to prioritize incidents and offenses generated through this content. The data from these intelligence sources is automatically incorporated into the QRadar correlation and analysis functions and serves to greatly enrich its threat detection capabilities with up-to-the-minute Internet threat data. Any security event or network activity data seen involving these addresses is automatically flagged, adding valuable context to security incident analyses and investigations. Users can also incorporate the latest X-Force security threat advisories and informational updates into the QRadar dashboard. This dashboard includes the current X-Force AlertCon level, which provides users with a quick and concise indicator of current Internet threat conditions. Using X-Force Threat Intelligence with QRadar Security Intelligence Platform is simple and fast once users have added these threat insights they will immediately begin receiving advanced threat data automatically and seamlessly. 4

Get the most value out of additional threat intelligence X-Force Threat Intelligence provides vulnerability coverage across a wide range of use cases, including: Security issue A series of attempted logins from a dynamic range of IP addresses An anonymous proxy connection to a business partner portal A connection from a non-mail server with a known spam host A connection between an internal endpoint and a known botnet command and control Communication between an endpoint and a known malware distribution site Insight provided Malicious attacker Suspicious behavior Spam contamination Botnet infection Malware attack By adding the dynamic information from X-Force Threat Intelligence to the analytical capabilities of QRadar Security Intelligence Platform, users can gain more intelligent and accurate security enforcement. This additional insight from X-Force Threat Intelligence enables QRadar users to apply this valuable data in real time to more closely monitor and tightly secure their environment. Why IBM? A preemptive security approach requires market-leading research, a keen eye for attack trends and techniques, and a streamlined and affordable platform for delivering advanced security solutions that are knowledge-based. IBM commands the extensive knowledge, innovative research methods and complex technologies required to achieve preemptive security designed to protect your entire IT infrastructure, from the network gateway to the desktop. For more information To learn more about IBM Security X-Force Threat Intelligence, contact your IBM representative or IBM Business Partner, or visit: ibm.com/security 5

About IBM Security solutions IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned IBM X-Force research and development, provides security intelligence to help organizations holistically protect their people, infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world s broadest security research, development and delivery organizations, monitors 13 billion security events per day in more than 130 countries, and holds more than 3,000 security patents. Additionally, IBM Global Financing can help you acquire the software capabilities that your business needs in the most cost-effective and strategic way possible. We ll partner with credit-qualified clients to customize a financing solution to suit your business and development goals, enable effective cash management, and improve your total cost of ownership. Fund your critical IT investment and propel your business forward with IBM Global Financing. For more information, visit: ibm.com/financing Copyright IBM Corporation 2013 IBM Corporation Software Group Route 100 Somers, NY 10589 Produced in the United States of America March 2013 IBM, the IBM logo, ibm.com, and X-Force are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at Copyright and trademark information at ibm.com/legal/copytrade.shtml QRadar is a registered trademark of Q1 Labs, an IBM Company. This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. THE INFORMATION IN THIS DOCUMENT IS PROVIDED AS IS WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that systems and products are immune from the malicious or illegal conduct of any party. Please Recycle WGD03025-USEN-00