Skip to main content

Stopping Internet Threats Before They Affect Your Business by Using the IBM Security Network Intrusion Prevention System

Redguide

Note: This is publication is now archived. For reference only.

thumbnail 

Published on 17 February 2011

  1. .EPUB (0.6 MB)
  2. .PDF (2.5 MB)

Share this page:   

IBM Form #: REDP-4683-00


Authors: Axel Buecker, Diogo Bulhoes and Matthew Dobbs

    menu icon

    Abstract

    In this IBM® Redguide™ publication, we look closely at network-related security risks such as targeted attacks, worms, bots, intrusion attempts, phishing scams, and so on. These threats target vulnerabilities in IT systems, workstations, and applications and can have a crippling financial effect on all organizations, disrupting business processes, and causing loss of confidential and proprietary information.

    To better understand how these threats are targeting your organization, we examine the composition of today’s IT network perimeter, which has been diluted from a well-defined set of ingress and egress points to a mesh of undetectable flows from devices that are capable of accessing and penetrating every organization’s resources. The days of keeping the attackers out by building a well-defined wall are definitely over. Businesses and organizations require collaboration with internal and external business partners, customers, and employees, which further removes walls and protective barriers.

    After identifying these increasing threats, we describe how the IBM Security Network Intrusion Prevention System (IPS) can help you consolidate intrusion prevention with data and web application security into a single, optimized appliance for faster, more accurate security protection. The hardware appliance is preloaded and preconfigured with IBM security software and extends the capabilities of the IBM X-Force® research team, to address high-performance network security.

    The audience for this guide includes business leaders, decision makers, network managers, IT security managers, and IT and business consultants.

    Table of Contents

    Executive overview

    IT network perimeter security: A primer

    Challenges for secure business transactions beyond the network perimeter

    Addressing problems related to network intrusion

    IBM Security Network Intrusion Prevention System (IPS)

    Retail chain scenario: Implementing an end-to-end network security solution

    Summary

     

    Others who read this also read