Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection

Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection

Publisher Description

In networks today, organizations are faced with hundreds of new web and non-web applications that are available to their users. Social media applications, peer-to-peer file transfer applications, Voice over Internet Protocol (VoIP), web-based email, cloud data storage, and many others are all readily available. The ease and speed at which these new applications can be installed or simply accessed reduces the effectiveness of a perimeter-based security architecture and provides many new types of risks. These applications can be used by an attacker to obtain initial access into the organization and bypass any perimeter-based security.

This IBM® Redguide™ publication introduces the solution, which is a (IPS) that extends the capabilities of traditional protocol-based IPSes by providing application visibility and control. By using IBM X-Force® Research And Development, this solution provides critical insight and control of all user activities by analyzing each connection to identify the web or non-web application in use and the action being taken. The IBM Security Network Protection solution can then decide to allow or block the connection, and can inspect even those connections that are encrypted by SSL. Additionally, the X-Force IP Reputation information can be used to understand whether sites that are accessed are hosting malware, are BotNet Command and Control servers (C&C servers), or are phishing sites, and other important information.

The IBM Security Network Protection can record connection information, including user and application context, and can use this information for local policy refinement, including bandwidth management. Alternatively, the connection information can be sent to a (SIEM) for security analysis and longer term storage.

The IBM Security Network Protection consolidation of the traditional IPS function, in combination with sophisticated user-based application control and IP Reputation, can provide an integrated security solution. This approach allows for faster deployment and simplification of the administration that is associated with the deployment of multiple products, reduces the cost of ownership and complexity, and provides for better return on investment (ROI).

The target audience for this publication is business leaders, decision makers, network managers, IT security managers, and IT and business consultants.

GENRE
Computers & Internet
RELEASED
2014
July 16
LANGUAGE
EN
English
LENGTH
42
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
2.3
MB

More Books Like This

Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011
IBM Security Solutions Architecture for Network, Server and Endpoint IBM Security Solutions Architecture for Network, Server and Endpoint
2011
CompTIA Security+ SY0-601 Exam Cram CompTIA Security+ SY0-601 Exam Cram
2020
Cybersecurity Essentials Cybersecurity Essentials
2018
Network Security Bible Network Security Bible
2011
The InfoSec Handbook The InfoSec Handbook
2014

More Books by IBM Redbooks

TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
Advanced Networking Concepts Applied Using Linux on IBM System z Advanced Networking Concepts Applied Using Linux on IBM System z
2012
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
2009

Customers Also Bought

Creating a Trusted Network for Homeland Security Creating a Trusted Network for Homeland Security
2012
IBM Storage for Red Hat OpenShift Container Platform V3.11 Blueprint Version 1 Release 1 IBM Storage for Red Hat OpenShift Container Platform V3.11 Blueprint Version 1 Release 1
2019
IBM Hybrid Solution for Scalable Data Solutions using IBM Spectrum Scale IBM Hybrid Solution for Scalable Data Solutions using IBM Spectrum Scale
2019
Information Security Management - ITP 370 Information Security Management - ITP 370
2014
Security Vs. Convenience Security Vs. Convenience
2012
Cyber Issues Cyber Issues
2015