WELCOME TO THE CONTINUITY CENTRAL ARCHIVE SITE

Please note that this is a page from a previous version of Continuity Central and is no longer being updated.

To see the latest business continuity news, jobs and information click here.

Business continuity information

IBM takes on Advanced Persistent Threats

As employee access to the Web has become ubiquitous, enterprises are struggling with massive increases in malware as well as Advanced Persistent Threats (APTs), which can compromise proprietary data. Many of today's security solutions often offer limited visibility and control over network activity, which can put the company at risk.

To help clients proactively protect against evolving security threats, including those posed by social media sites and malicious websites, IBM has announced a new class of network security appliance that delivers a more granular view of a company’s security posture and a simplified security management interface. This new next-generation intrusion prevention appliance helps clients address advanced attacks targeting their organization, providing visibility into exactly what applications are being used on the network, where users are going on the Web, with the ability to monitor and control this activity, which can result in improved security and reduced operational costs.

IBM Security Network Protection XGS 5000 is a next-generation intrusion protection system specifically designed to address the constantly evolving, increasingly sophisticated threats that organizations face today. It builds on the proven, core security features found in IBM Security Network Intrusion Prevention System, including helping protect against ‘zero-day’ exploits, by adding new levels of visibility and control over the network, applications, data and users to help improve security by helping prevent misuse and identify previously undetectable threats.

IBM Security Network Protection incorporates global threat intelligence from X-Force, including a Web filter database of over 15 billion URLs – capable of monitoring and categorizing millions of Web servers and applications each day to provide superior protection against the changing threat landscape. Once organizations are aware of the nature of activity on their network, the new application control features enable clients to have granular control over what is happening on their network; this means granular user and group-level control over which applications and Websites are permitted, and how they are used down to individual actions or activities within these applications and sites.

With IBM Security Network Protection, clients can:

  • Immediately discover which applications and Web sites are being accessed;
  • Identify misuse by application, Website, and user;
  • Enforce security policies with granular, intelligent application-level controls.

This visibility is greatly increased via integration with IBM’s Advanced Threat Protection Platform, which utilizes anomaly detection and event correlation capabilities to better address more complex attacks such as Advanced Persistent Threats (APTs). IBM Security customers can also choose tightly integrated solutions that use optimized security products and Security Intelligence tools, including analytics. In addition, IBM's Managed Security Services can provide constant monitoring and management of a customer's IT environment to augment or replace in-house expertise.

www.ibm.com/security

•Date: 2nd August 2012 • World •Type: Article • Topic: ISM

Business Continuity Newsletter Sign up for Continuity Briefing, our weekly roundup of business continuity news. For news as it happens, subscribe to Continuity Central on Twitter.
   

How to advertise How to advertise on Continuity Central.

To submit news stories to Continuity Central, e-mail the editor.

Want an RSS newsfeed for your website? Click here