Beruflich Dokumente
Kultur Dokumente
Virtual Appliance offers the best of both worlds: the power ● Advanced network protection – Advanced intrusion preven-
and protection of advanced network intrusion prevention in a tion including DNS protection.
virtual security appliance. Sophisticated detection technology ● Data security – Monitoring and identification of unen-
and virtual form can help keep appliance sprawl to a mini- crypted personally identifiable information (PII) and other
mum and your consolidation plans on track, without jeopard- confidential data.
izing the security of network operations. High throughput ● Web application security – Protection for Web apps,
and low latency help maintain traffic flow and ensure efficient Web 2.0 and databases (same protection as Web application
network operations. firewall).
● Application control – Reclaim bandwidth and block Skype,
Extending and simplifying security peer-to-peer networks and tunneling.
operations
IBM Security Network Intrusion Prevention System Virtual By consolidating security demands, such as threat detection
Appliance extends the same high level of preemptive protec- and prevention, data security, Web application protection and
tion to your virtual operations, helping you block threats to application control, IBM Security Network Intrusion
these environments. At the same time, our solution helps ease Prevention System Virtual Appliance helps reduce the cost of
complexity by enabling you to manage virtual security, tradi- deploying and maintaining point solutions. This modular
tional enterprise security and vulnerability management from technology can help safeguard your networks from attack cat-
a single management interface. In addition to minimizing the egories and threats, including:
need for multiple point solutions and resources, the ability to
share network policies and best practices between your virtual
● Worms and spyware
and physical network security operations can help ensure
● Denial-of-service (DoS) and distributed denial-of-service
consistency. (DDoS)
● Botnets
● Targeted attacks against Web applications
Staying ahead of evolving threats and ● Proprietary or sensitive data leaving the network
compliance measures
IBM Security Network Intrusion Prevention System Virtual
Enabling security services in cloud
Appliance relies on the IBM Protocol Analysis Module
(PAM), which is designed by the IBM X-Force team, to offer computing
a robust extensible protection engine that adds new areas of IBM Security Network Intrusion Prevention System Virtual
protection as threats evolve. With the full power of PAM Appliance provides the virtual appliance that enables man-
technology, IBM Security Network Intrusion Prevention aged cloud service providers to protect specific virtual net-
System Virtual Appliance is a comprehensive network protec- work segments with the option of customized security
tion solution that includes: policies or “trust X-Force” default configurations. With the
ability to deliver new revenue-generating services powered by
● IBM Virtual Patch® technology – Shielding vulnerabilities the security of X-Force, cloud service providers can gain a
from exploitation, independent of a software patch. significant competitive differentiator while delivering the reli-
● Client side application protection – Protects end users ability their clients demand.
against attacks targeting applications used everyday such as
Microsoft Office files, Adobe PDF files, Multimedia files
and Web browsers.
2
IBM Software Data Sheet
IBM Security Solutions
GV1000 GV200
Offering simplified implementation and virtual appliance and self-contained solution, the solution can
maintenance deliver security without altering server images, virtual servers,
Designed for easy installation, configuration and manage- applications or the virtual infrastructure. You can select from
ment, IBM Security Network Intrusion Prevention System several operating modes, including:
Virtual Appliance can help you juggle the conflicting priori-
ties of staffing requirements and network security. As a
● Active – intrusion prevention for blocking
● Inline simulation – displays what would be blocked
● Passive – intrusion detection for alerting without blocking
3
If you prefer to transfer the burden of protecting your net-
work to a trusted security partner, IBM offers established
consulting and managed services through skilled service
solution teams for assessment, design, deployment and
management.
© Copyright IBM Corporation 2010
Product data has been reviewed for accuracy as of the date of initial
publication. Product data is subject to change without notice.
Any statements regarding IBM’s future direction and intent are
subject to change or withdrawal without notice, and represent goals and
objectives only.
Please Recycle
SED03058-USEN-02