Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection

Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection

発行者による作品情報

In networks today, organizations are faced with hundreds of new web and non-web applications that are available to their users. Social media applications, peer-to-peer file transfer applications, Voice over Internet Protocol (VoIP), web-based email, cloud data storage, and many others are all readily available. The ease and speed at which these new applications can be installed or simply accessed reduces the effectiveness of a perimeter-based security architecture and provides many new types of risks. These applications can be used by an attacker to obtain initial access into the organization and bypass any perimeter-based security.

This IBM® Redguide™ publication introduces the solution, which is a (IPS) that extends the capabilities of traditional protocol-based IPSes by providing application visibility and control. By using IBM X-Force® Research And Development, this solution provides critical insight and control of all user activities by analyzing each connection to identify the web or non-web application in use and the action being taken. The IBM Security Network Protection solution can then decide to allow or block the connection, and can inspect even those connections that are encrypted by SSL. Additionally, the X-Force IP Reputation information can be used to understand whether sites that are accessed are hosting malware, are BotNet Command and Control servers (C&C servers), or are phishing sites, and other important information.

The IBM Security Network Protection can record connection information, including user and application context, and can use this information for local policy refinement, including bandwidth management. Alternatively, the connection information can be sent to a (SIEM) for security analysis and longer term storage.

The IBM Security Network Protection consolidation of the traditional IPS function, in combination with sophisticated user-based application control and IP Reputation, can provide an integrated security solution. This approach allows for faster deployment and simplification of the administration that is associated with the deployment of multiple products, reduces the cost of ownership and complexity, and provides for better return on investment (ROI).

The target audience for this publication is business leaders, decision makers, network managers, IT security managers, and IT and business consultants.

ジャンル
コンピュータ/インターネット
発売日
2014年
7月16日
言語
EN
英語
ページ数
42
ページ
発行者
IBM Redbooks
販売元
International Business Machines Corp
サイズ
2.3
MB
Network Security Bible Network Security Bible
2011年
CCNSP-NP CCNSP-NP
2013年
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
2024年
Official (ISC)2 Guide to the CISSP CBK, Fourth Edition Official (ISC)2 Guide to the CISSP CBK, Fourth Edition
2014年
The Official (ISC)2 CISSP CBK Reference The Official (ISC)2 CISSP CBK Reference
2021年
Official (ISC)2  Guide to the CISSP CBK Official (ISC)2  Guide to the CISSP CBK
2013年
IBM Watson Content Analytics: Discovering Actionable Insight from Your Content IBM Watson Content Analytics: Discovering Actionable Insight from Your Content
2014年
IT Service Management Best Practices Using IBM SmartCloud Control Desk IT Service Management Best Practices Using IBM SmartCloud Control Desk
2013年
IBM and Cisco: Together for a World Class Data Center IBM and Cisco: Together for a World Class Data Center
2013年
Experiences with Oracle Database 12c Release 1 on Linux on System z Experiences with Oracle Database 12c Release 1 on Linux on System z
2014年
Oracle to DB2 Conversion Guide: Compatibility Made Easy Oracle to DB2 Conversion Guide: Compatibility Made Easy
2014年
IBM SAN Solution Design Best Practices for VMware vSphere ESXi IBM SAN Solution Design Best Practices for VMware vSphere ESXi
2013年
Security Vs. Convenience Security Vs. Convenience
2012年
The Path of Least Resistance: Computer Security Is Common Sense The Path of Least Resistance: Computer Security Is Common Sense
2012年
The Myth of the Secure OS The Myth of the Secure OS
2012年
Information Security Management - ITP 370 Information Security Management - ITP 370
2014年
Cyber-Terrorism Cyber-Terrorism
2014年
Hacked?! Hacked?!
2015年