Book description
Every organization today needs to manage the risk of exposing business-critical data, improve business continuity, and minimize the cost of managing IT security. Most all IT assets of an organization share a common network infrastructure. Therefore, the first line of defense is to establish proper network security. This security is a prerequisite for a logical set of technical countermeasures to protect from many different attack vectors that use the network to infiltrate the backbone of an organization.
The IBM® Security Network Intrusion Prevention System (IPS) stops network-based threats before they can impact the business operations of an organization. Preemptive protection, which is protection that works ahead of a threat, is available by means of a combination of line-speed performance, security intelligence, and a modular protection engine that enables security convergence. By consolidating network security demands for data security and protection for web applications, the IBM Security Network IPS serves as the security platform that can reduce the costs and complexity of deploying and managing point solutions.
This IBM Redbooks® publication provides IT architects and security specialists a better understanding of the challenging topic of blocking network threats. This book highlights security convergence of IBM Virtual Patch® technology, data security, and Web Application Protection. In addition, this book explores the technical foundation of the IBM Security Network IPS. It explains how to set up, configure, and maintain proper network perimeter protection within a real-world business scenario.
Table of contents
- Notices
- Preface
- Part 1: Architecture and design
- Chapter 1: Business context for threat and vulnerability management
- Chapter 2: Introducing the IBM Security Network IPS solution
- Chapter 3: IBM Security Network IPS architecture
- Chapter 4: IBM Security Network IPS solution design and management
- Part 2: Customer scenario
- Chapter 5: Overview of scenario, requirements, and approach
-
Chapter 6: Phase 1: Design and implementation of IBM Security Network IPS
- 6.1: Design
-
6.2: Implementation
- Group definitions
- GX7800 implementation (1/4)
- GX7800 implementation (2/4)
- GX7800 implementation (3/4)
- GX7800 implementation (4/4)
- GX5208 with Active Bypass implementation (1/2)
- GX5208 with Active Bypass implementation (2/2)
- GX4004 implementation
- Registration with IBM Security SiteProtector (1/2)
- Registration with IBM Security SiteProtector (2/2)
- 6.3: Conclusion
- Chapter 7: Phase 2: Policy tuning for IBM Security Network IPS
- Appendix A: Troubleshooting
- Related publications
- Index (1/3)
- Index (2/3)
- Index (3/3)
- Back cover
Product information
- Title: Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
- Author(s):
- Release date: December 2011
- Publisher(s): IBM Redbooks
- ISBN: None
You might also like
book
CCNP Security IPS 642-627 Official Cert Guide
CCNP Security IPS 642-627 Official Cert Guide David Burns Odunayo Adesina, CCIE® No. 26695 Keith Barker, …
book
Introduction to Storage Area Networks
Abstract The superabundance of data that is created by today's businesses is making storage a strategic …
book
Network Attacks and Exploitation
Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides …
book
Securing the Virtual Environment: How to Defend the Enterprise Against Attack, Included DVD
A step-by-step guide to identifying and defending against attacks on the virtual environment As more and …