Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection

Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection

Descripción editorial

In networks today, organizations are faced with hundreds of new web and non-web applications that are available to their users. Social media applications, peer-to-peer file transfer applications, Voice over Internet Protocol (VoIP), web-based email, cloud data storage, and many others are all readily available. The ease and speed at which these new applications can be installed or simply accessed reduces the effectiveness of a perimeter-based security architecture and provides many new types of risks. These applications can be used by an attacker to obtain initial access into the organization and bypass any perimeter-based security.

This IBM® Redguide™ publication introduces the solution, which is a (IPS) that extends the capabilities of traditional protocol-based IPSes by providing application visibility and control. By using IBM X-Force® Research And Development, this solution provides critical insight and control of all user activities by analyzing each connection to identify the web or non-web application in use and the action being taken. The IBM Security Network Protection solution can then decide to allow or block the connection, and can inspect even those connections that are encrypted by SSL. Additionally, the X-Force IP Reputation information can be used to understand whether sites that are accessed are hosting malware, are BotNet Command and Control servers (C&C servers), or are phishing sites, and other important information.

The IBM Security Network Protection can record connection information, including user and application context, and can use this information for local policy refinement, including bandwidth management. Alternatively, the connection information can be sent to a (SIEM) for security analysis and longer term storage.

The IBM Security Network Protection consolidation of the traditional IPS function, in combination with sophisticated user-based application control and IP Reputation, can provide an integrated security solution. This approach allows for faster deployment and simplification of the administration that is associated with the deployment of multiple products, reduces the cost of ownership and complexity, and provides for better return on investment (ROI).

The target audience for this publication is business leaders, decision makers, network managers, IT security managers, and IT and business consultants.

GÉNERO
Informática e internet
PUBLICADO
2014
16 de julio
IDIOMA
EN
Inglés
EXTENSIÓN
42
Páginas
EDITORIAL
IBM Redbooks
TAMAÑO
2,3
MB

Más libros de IBM Redbooks

TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
Understanding LDAP - Design and Implementation Understanding LDAP - Design and Implementation
2004
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
WebSphere Message Broker V7.0 Integration with WebSphere Adapter for SAP Software WebSphere Message Broker V7.0 Integration with WebSphere Adapter for SAP Software
2010
Big Data Networked Storage Solution for Hadoop Big Data Networked Storage Solution for Hadoop
2013
Advanced Networking Concepts Applied Using Linux on IBM System z Advanced Networking Concepts Applied Using Linux on IBM System z
2012

Otros clientes también compraron

IBM Storage for Red Hat OpenShift Container Platform V3.11 Blueprint Version 1 Release 1 IBM Storage for Red Hat OpenShift Container Platform V3.11 Blueprint Version 1 Release 1
2019
IBM Hybrid Solution for Scalable Data Solutions using IBM Spectrum Scale IBM Hybrid Solution for Scalable Data Solutions using IBM Spectrum Scale
2019
Multicloud Storage as a Service using VRealize Automation and IBM Spectrum Storage Multicloud Storage as a Service using VRealize Automation and IBM Spectrum Storage
2020
Creating a Trusted Network for Homeland Security Creating a Trusted Network for Homeland Security
2012
Security Vs. Convenience Security Vs. Convenience
2012
IBM Storage Solutions for Splunk Enterprise IBM Storage Solutions for Splunk Enterprise
2019