SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
IBM Software Data Sheet
IBM Security QRadar
Vulnerability Manager
Improve security and compliance by prioritizing
security gaps for resolution
Highlights
●● ● ●
Help prevent security breaches by
discovering and highlighting high-risk
vulnerabilities from a single, integrated
dashboard
●● ● ●
Prioritize remediation and mitigation
activities by understanding the complete
network context
●● ● ●
Enable seamless integration with IBM®
Security QRadar® SIEM to get dynamic,
up-to-date asset information for proactive
vulnerability management
●● ● ●
Conduct rapid network scans—
periodically or dynamically—to find
security weaknesses and minimize risks
●● ● ●
Automate regulatory compliance with
collection, correlation and reporting
For many organizations, managing network vulnerabilities is a lesson in
frustration. Vulnerability scans are typically conducted in response to
compliance mandates, and they can reveal up to tens of thousands of
exposures—depending upon network size. Scan results are often a
complex puzzle of misconfigured devices, unpatched software, and
outdated or obsolete systems. And security administrators must struggle
to quickly identify and remediate or mitigate the exposures that pose
the greatest risk.
At the same time, security breaches are dramatically increasing for all
kinds of organizations. From e-commerce and social-networking giants to
healthcare, universities, banks, governments and gaming sites, the breadth
of breach targets is vast. While the number of disclosed vulnerabilities
continues to rise, the number of incidents that result in the loss, theft or
exposure of personally identifiable information has been increasing at a
rate of nearly 40 percent.1
IBM Security QRadar Vulnerability Manager can help organizations
minimize the chances of a network security breach by using a proactive
approach to finding security weaknesses and minimizing potential risks.
It uses a proven vulnerability scanner to collect up-to-date results, but
unlike other solutions, it leverages the capabilities of IBM QRadar
Security Intelligence Platform to present the data within the overall
context of the network usage, security and threat posture. Designed to
consolidate results from multiple vulnerability scanners, risk management
2
Data SheetIBM Software
solutions and external threat intelligence resources, QRadar
Vulnerability Manager operates like a centralized control center
to identify key security weaknesses that need to be addressed to
help thwart future attacks.
QRadar Vulnerability Manager helps security teams identify
resource configuration issues, understand the impact of
software patching schedules, coordinate with intrusion
prevention systems to block open connections, and establish
continuous monitoring of systems that can’t otherwise be
remediated—all from a single, integrated dashboard. By corre-
lating vulnerability data with QRadar SIEM event and threat
analysis, IBM Security QRadar Risk Manager device configura-
tion and network traffic analysis, and external databases, includ-
ing IBM X-Force® threat intelligence, QRadar Vulnerability
Manager can help organizations build actionable plans for
deploying their often constrained IT staffing resources. And
since it is already integrated with QRadar Security Intelligence
Platform, security teams have one less system to install,
configure and manage.
Get a single, prioritized view of potential
vulnerabilities
QRadar Vulnerability Manager is helping redefine how IT
security teams collect and use vulnerability assessment data—
transforming a tedious monthly or quarterly scanning and
reporting activity into an insightful, continuous monitoring
program. Its intuitive user interface provides complete
visibility across dynamic, multi-layered networks. Organizations
can now:
●● ●
Select a dashboard view and click through related tabs to
review security offenses, log events, network flows, asset
statuses and configurations, reports, risks and vulnerabilities
●● ●
Create, edit and save asset searches and scans for more
intelligent monitoring
●● ●
Make faster, more informed decisions with a prioritized,
consolidated view of scan data
●● ●
Help coordinate patching and virtual patching activities, and
direct intrusion prevention systems (IPSs) to block potential
attack paths for maximum impact
IBM Security QRadar Vulnerability Manager provides a single, integrated dashboard for viewing multiple vulnerability assessment feeds and threat intelligence
sources. This way, security teams can quickly identify the exposures that pose the greatest risk.
3
Data SheetIBM Software
QRadar Vulnerability Manager includes an embedded scanning
engine that can be set up to run both dynamic and periodic
scans, providing near real-time visibility of weaknesses that
could otherwise remain hidden. Leveraging the passive asset
discovery capabilities of IBM Security QRadar QFlow and
Log Collector appliances, any new asset appearing on the
network can be immediately scanned. As a result, organizations
can reduce their exposure to advanced threats between regular
scanning cycles and help ensure compliance with the latest
security regulations.
Using the same rules-based approach as QRadar SIEM,
QRadar Vulnerability Manager helps minimize false positives
and filters out vulnerabilities already classified as non-
threatening. For example, applications may be installed on a
server, but they may be inactive, and therefore not a security
risk; devices that appear exposed may actually be protected by
a firewall; or endpoints that have vulnerabilities may already
be scheduled for patching.
QRadar Vulnerability Manager maintains a current network
view of all discovered vulnerabilities, including details such as
when the vulnerabilities were found, when they were last seen,
what scan jobs reported the vulnerabilities, and to whom the
vulnerability is assigned for remediation or mitigation. The
software also presents historic views of daily, weekly and
monthly trends, and it can produce long-term trending reports,
such as the month-by-month trend of Payment Card Industry
(PCI) failure vulnerabilities discovered over the past year.
Stand-alone, independent vulnerability-scanning solutions can
take considerable time to scan large address spaces for assets,
servers and services, and their scan results can be out of date
quickly. These point solutions also require additional infrastruc-
ture and include different technologies for network, application
and database scanning—all requiring additional administration.
And after identifying an often incomplete sea of vulnerabilities,
the point solutions do not include any contextual information
for helping security teams prioritize their tasks for remediation.
Thwart advanced threats
Unlike the random, brute-force attacks of the past, today’s
organizations must guard against “advanced persistent
threats”—that is, a complex series of attacks that often take
place over a prolonged timeframe. Using a range of tactics
from zero-day exploits to custom malware to simply trolling for
unpatched systems, these attackers consistently probe their tar-
gets using a “low-and-slow” approach until they find a security
gap. Organizations can use more intelligent tools like QRadar
Vulnerability Manager to improve their defenses by regularly
scanning and addressing as many high-impact vulnerabilities
as possible.
Most vulnerability scanners simply identify large numbers of
exposures and leave it up to security teams to understand the
severity of risks. These tools are often not integrated with the
existing security infrastructure and require additional manual
effort to align with the current network topology, usage infor-
mation and security processes. Many of these tools are used
simply for compliance, rather than as an integral part of a
threat and security management program.
4
Data SheetIBM Software
With QRadar Vulnerability Manager, organizations can:
●● ●
Leverage existing appliance infrastructure and security
intelligence data to seamlessly conduct automated scans for
network vulnerabilities
●● ●
Detect when new assets are added to the network, when
assets start behaving abnormally, or when assets might be
potentially compromised—using log events and network flow
data—and perform immediate scans to help ensure protection
and improve visibility
●● ●
Help improve productivity by enabling security teams to
focus on a small, manageable number of high-priority events,
eliminating false positives and correlating results with
network-blocking activities
Address compliance mandates
Regulatory requirements are forcing organizations of all sizes to
develop vulnerability management programs to help ensure
proper control of sensitive IT assets. QRadar Vulnerability
Manager helps organizations facilitate compliance by conduct-
ing regular network scans and maintaining detailed audit trails.
It categorizes each vulnerability with a severity rating and an
exposure score. In addition to scanning assets both internally
and externally, QRadar Vulnerability Manager enables security
teams to create tickets to manage remediation activities and
specify exceptions with a full audit trail.
Identifying high-priority vulnerabilities
STOP STOP
STOP
STOP
IBM Security QRadar Vulnerability Manager:
Real-time visibility and automatic remediation
Attacks or threat sources
Firewall—Address blocked
Intrusion prevention solutions—Connection blocked
Endpoint managers—Patch scheduled
Inactive application
Asset is vulnerable
QRadar Vulnerability Manager uses security intelligence to help filter vulnerabilities. This enables organizations to understand how to prioritize their remediation or
mitigation activities.
5
Data SheetIBM Software
With QRadar Vulnerability Manager, organizations can:
●● ●
Orchestrate a high volume of concurrent assessments without
disturbing normal network operations—multiple stakeholders
can scan and rescan the network as needed for remediation
verification
●● ●
Summarize vulnerability assessments by day, week and month
for effective reporting and visibility of trends
●● ●
Run scans from both inside and outside the network
●● ●
Capture an audit trail of all vulnerability management activi-
ties, including discovery, assignments, notes, exceptions and
remediation
Extend your security intelligence
QRadar Vulnerability Manager combines the real-time security
visibility of QRadar Security Intelligence Platform with the
results of proven vulnerability-scanning technology. As part of
the QRadar SIEM architecture, QRadar Vulnerability Manager
can be quickly activated via a licensing key—requiring no addi-
tional hardware or software. This can result in considerable cost
savings, since security teams do not normally have to deploy
new technologies or learn a new interface. They can simply
generate reports from within the familiar QRadar product
family user interface.
Key integrations for QRadar Vulnerability Manager include:
●● ●
QRadar SIEM: Provides the appliance infrastructure for
conducting network scans, the asset database for logging
and tracking vulnerability management activities, the passive
network detection capabilities for discovering newly added
assets, and all the contextual security intelligence data needed
to build and execute actionable vulnerability management
plans
●● ●
QRadar Risk Manager: Reveals current and historical
network connection data to show how vulnerabilities relate
to the overall network topology—including how firewall and
IPS rules affect the exploitability of specific assets from inter-
nal and external threat sources
●● ●
IBM Security SiteProtector™ System: Provides virtual
patching capabilities using network IPS signatures to protect
against exploits of identified vulnerabilities by blocking
associated connections
●● ●
X-Force threat intelligence feed: Supplies up-to-date
information on recommended fixes and security advice for
active vulnerabilities, viruses, worms and threats
●● ●
IBM Endpoint Manager: Streamlines remediation tasks
by automatically managing patches to hundreds of thousands
of endpoints, including the latest mobile devices; provides
integrated reporting for real-time monitoring of patch
progress
●● ●
IBM Security AppScan®: Supports web application vulner-
ability assessments, enabling QRadar Vulnerability Manager
to provide visibility and prioritization of web application
vulnerabilities within its integrated dashboard
●● ●
IBM InfoSphere® Guardium® Vulnerability
Assessment: Supports scanning of database infrastructure,
enabling QRadar Vulnerability Manager to provide visibility
and prioritization of database vulnerabilities within its
integrated dashboard
Apply proactive security
In a world where no networks are truly secure, QRadar
Vulnerability Manager enables organizations to more effectively
protect their environments using an extensive line of proactive
defenses, including:
●● ●
High-speed internal scanning, which helps preserve network
performance and availability
●● ●
Support for discovery, non-authenticated, authenticated and
Open Vulnerability Assessment Language (OVAL) scans
●● ●
External scanning capabilities to see the network from an
attacker’s viewpoint and help facilitate compliance
●● ●
Single-click investigations from dashboard screens and deep,
rules-based, rapid searching capabilities to learn more about
specific events or identify long-term trends
●● ●
Suppression of acceptable, false positive or otherwise
non-mitigated vulnerabilities from ongoing reporting
●● ●
Vulnerability assignment and remediation lifecycle
management
●● ●
Full audit trail for compliance reporting
Why IBM?
IBM Security offers one of the most advanced and integrated
portfolios of enterprise security products and services. The
portfolio, supported by world-renowned X-Force research
and development, provides security intelligence to help organi-
zations holistically protect their people, infrastructures, data
and applications, offering solutions for identity and access
management, database security, application development, risk
management, endpoint management, network security and
more. These solutions enable organizations to effectively
manage risk and implement integrated security for mobile,
cloud, social media and other enterprise business architectures.
IBM operates one of the world’s broadest security research,
development and delivery organizations, monitors 13 billion
security events per day in more than 130 countries, and holds
more than 3,000 security patents.
For more information
To learn more about IBM Security QRadar Vulnerability
Manager, please contact your IBM representative or
IBM Business Partner, or visit:
ibm.com/software/products/us/en/category/SWI60
Additionally, IBM Global Financing can help you acquire
the software capabilities that your business needs in the most
cost-effective and strategic way possible. We’ll partner with
credit-qualified clients to customize a financing solution to
suit your business and development goals, enable effective
cash management, and improve your total cost of ownership.
Fund your critical IT investment and propel your business
forward with IBM Global Financing. For more information,
visit: ibm.com/financing
© Copyright IBM Corporation 2013
IBM Corporation
Software Group
Route 100
Somers, NY 10589
Produced in the United States of America
June 2013
IBM, the IBM logo, ibm.com, AppScan, Guardium, InfoSphere,
SiteProtector, and X-Force are trademarks of International Business
Machines Corp., registered in many jurisdictions worldwide. Other
product and service names might be trademarks of IBM or other
companies. A current list of IBM trademarks is available on the web at
“Copyright and trademark information” at ibm.com/legal/copytrade.shtml
QRadar is a registered trademark of Q1 Labs, an IBM Company.
This document is current as of the initial date of publication and may be
changed by IBM at any time. Not all offerings are available in every
country in which IBM operates.
THE INFORMATION IN THIS DOCUMENT IS PROVIDED
“AS IS” WITHOUT ANY WARRANTY, EXPRESS OR
IMPLIED, INCLUDING WITHOUT ANY WARRANTIES
OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE AND ANY WARRANTY OR CONDITION OF
NON-INFRINGEMENT. IBM products are warranted according to the
terms and conditions of the agreements under which they are provided.
The client is responsible for ensuring compliance with laws and regulations
applicable to it. IBM does not provide legal advice or represent or warrant
that its services or products will ensure that the client is in compliance with
any law or regulation.
Statement of Good Security Practices: IT system security involves
protecting systems and information through prevention, detection and
response to improper access from within and outside your enterprise.
Improper access can result in information being altered, destroyed or
misappropriated or can result in damage to or misuse of your systems,
including to attack others. No IT system or product should be considered
completely secure and no single product or security measure can be
completely effective in preventing improper access. IBM systems and
products are designed to be part of a comprehensive security approach,
which will necessarily involve additional operational procedures, and may
require other systems, products or services to be most effective. IBM does
not warrant that systems and products are immune from the malicious or
illegal conduct of any party.
1 “IBM X-Force 2012 Trend and Risk Report,” IBM Security Systems,
March 2013. http://www-03.ibm.com/security/xforce/downloads.html
	
	
	
	
	
	
	
	
Please Recycle
WGD03027-USEN-00

Weitere ähnliche Inhalte

Andere mochten auch

DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...Andris Soroka
 
Cyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureCyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureOllie Whitehouse
 
The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response Darren Pauli
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...IBM Security
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 
Incident Response: How To Prepare
Incident Response: How To PrepareIncident Response: How To Prepare
Incident Response: How To PrepareResilient Systems
 

Andere mochten auch (6)

DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
 
Cyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureCyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics Lecture
 
The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Incident Response: How To Prepare
Incident Response: How To PrepareIncident Response: How To Prepare
Incident Response: How To Prepare
 

Mehr von IBM Security

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackIBM Security
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationIBM Security
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?IBM Security
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...IBM Security
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowIBM Security
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats IBM Security
 

Mehr von IBM Security (20)

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 

Kürzlich hochgeladen

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Kürzlich hochgeladen (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

IBM Security QRadar Vulnerability Manager

  • 1. IBM Software Data Sheet IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights ●● ● ● Help prevent security breaches by discovering and highlighting high-risk vulnerabilities from a single, integrated dashboard ●● ● ● Prioritize remediation and mitigation activities by understanding the complete network context ●● ● ● Enable seamless integration with IBM® Security QRadar® SIEM to get dynamic, up-to-date asset information for proactive vulnerability management ●● ● ● Conduct rapid network scans— periodically or dynamically—to find security weaknesses and minimize risks ●● ● ● Automate regulatory compliance with collection, correlation and reporting For many organizations, managing network vulnerabilities is a lesson in frustration. Vulnerability scans are typically conducted in response to compliance mandates, and they can reveal up to tens of thousands of exposures—depending upon network size. Scan results are often a complex puzzle of misconfigured devices, unpatched software, and outdated or obsolete systems. And security administrators must struggle to quickly identify and remediate or mitigate the exposures that pose the greatest risk. At the same time, security breaches are dramatically increasing for all kinds of organizations. From e-commerce and social-networking giants to healthcare, universities, banks, governments and gaming sites, the breadth of breach targets is vast. While the number of disclosed vulnerabilities continues to rise, the number of incidents that result in the loss, theft or exposure of personally identifiable information has been increasing at a rate of nearly 40 percent.1 IBM Security QRadar Vulnerability Manager can help organizations minimize the chances of a network security breach by using a proactive approach to finding security weaknesses and minimizing potential risks. It uses a proven vulnerability scanner to collect up-to-date results, but unlike other solutions, it leverages the capabilities of IBM QRadar Security Intelligence Platform to present the data within the overall context of the network usage, security and threat posture. Designed to consolidate results from multiple vulnerability scanners, risk management
  • 2. 2 Data SheetIBM Software solutions and external threat intelligence resources, QRadar Vulnerability Manager operates like a centralized control center to identify key security weaknesses that need to be addressed to help thwart future attacks. QRadar Vulnerability Manager helps security teams identify resource configuration issues, understand the impact of software patching schedules, coordinate with intrusion prevention systems to block open connections, and establish continuous monitoring of systems that can’t otherwise be remediated—all from a single, integrated dashboard. By corre- lating vulnerability data with QRadar SIEM event and threat analysis, IBM Security QRadar Risk Manager device configura- tion and network traffic analysis, and external databases, includ- ing IBM X-Force® threat intelligence, QRadar Vulnerability Manager can help organizations build actionable plans for deploying their often constrained IT staffing resources. And since it is already integrated with QRadar Security Intelligence Platform, security teams have one less system to install, configure and manage. Get a single, prioritized view of potential vulnerabilities QRadar Vulnerability Manager is helping redefine how IT security teams collect and use vulnerability assessment data— transforming a tedious monthly or quarterly scanning and reporting activity into an insightful, continuous monitoring program. Its intuitive user interface provides complete visibility across dynamic, multi-layered networks. Organizations can now: ●● ● Select a dashboard view and click through related tabs to review security offenses, log events, network flows, asset statuses and configurations, reports, risks and vulnerabilities ●● ● Create, edit and save asset searches and scans for more intelligent monitoring ●● ● Make faster, more informed decisions with a prioritized, consolidated view of scan data ●● ● Help coordinate patching and virtual patching activities, and direct intrusion prevention systems (IPSs) to block potential attack paths for maximum impact IBM Security QRadar Vulnerability Manager provides a single, integrated dashboard for viewing multiple vulnerability assessment feeds and threat intelligence sources. This way, security teams can quickly identify the exposures that pose the greatest risk.
  • 3. 3 Data SheetIBM Software QRadar Vulnerability Manager includes an embedded scanning engine that can be set up to run both dynamic and periodic scans, providing near real-time visibility of weaknesses that could otherwise remain hidden. Leveraging the passive asset discovery capabilities of IBM Security QRadar QFlow and Log Collector appliances, any new asset appearing on the network can be immediately scanned. As a result, organizations can reduce their exposure to advanced threats between regular scanning cycles and help ensure compliance with the latest security regulations. Using the same rules-based approach as QRadar SIEM, QRadar Vulnerability Manager helps minimize false positives and filters out vulnerabilities already classified as non- threatening. For example, applications may be installed on a server, but they may be inactive, and therefore not a security risk; devices that appear exposed may actually be protected by a firewall; or endpoints that have vulnerabilities may already be scheduled for patching. QRadar Vulnerability Manager maintains a current network view of all discovered vulnerabilities, including details such as when the vulnerabilities were found, when they were last seen, what scan jobs reported the vulnerabilities, and to whom the vulnerability is assigned for remediation or mitigation. The software also presents historic views of daily, weekly and monthly trends, and it can produce long-term trending reports, such as the month-by-month trend of Payment Card Industry (PCI) failure vulnerabilities discovered over the past year. Stand-alone, independent vulnerability-scanning solutions can take considerable time to scan large address spaces for assets, servers and services, and their scan results can be out of date quickly. These point solutions also require additional infrastruc- ture and include different technologies for network, application and database scanning—all requiring additional administration. And after identifying an often incomplete sea of vulnerabilities, the point solutions do not include any contextual information for helping security teams prioritize their tasks for remediation. Thwart advanced threats Unlike the random, brute-force attacks of the past, today’s organizations must guard against “advanced persistent threats”—that is, a complex series of attacks that often take place over a prolonged timeframe. Using a range of tactics from zero-day exploits to custom malware to simply trolling for unpatched systems, these attackers consistently probe their tar- gets using a “low-and-slow” approach until they find a security gap. Organizations can use more intelligent tools like QRadar Vulnerability Manager to improve their defenses by regularly scanning and addressing as many high-impact vulnerabilities as possible. Most vulnerability scanners simply identify large numbers of exposures and leave it up to security teams to understand the severity of risks. These tools are often not integrated with the existing security infrastructure and require additional manual effort to align with the current network topology, usage infor- mation and security processes. Many of these tools are used simply for compliance, rather than as an integral part of a threat and security management program.
  • 4. 4 Data SheetIBM Software With QRadar Vulnerability Manager, organizations can: ●● ● Leverage existing appliance infrastructure and security intelligence data to seamlessly conduct automated scans for network vulnerabilities ●● ● Detect when new assets are added to the network, when assets start behaving abnormally, or when assets might be potentially compromised—using log events and network flow data—and perform immediate scans to help ensure protection and improve visibility ●● ● Help improve productivity by enabling security teams to focus on a small, manageable number of high-priority events, eliminating false positives and correlating results with network-blocking activities Address compliance mandates Regulatory requirements are forcing organizations of all sizes to develop vulnerability management programs to help ensure proper control of sensitive IT assets. QRadar Vulnerability Manager helps organizations facilitate compliance by conduct- ing regular network scans and maintaining detailed audit trails. It categorizes each vulnerability with a severity rating and an exposure score. In addition to scanning assets both internally and externally, QRadar Vulnerability Manager enables security teams to create tickets to manage remediation activities and specify exceptions with a full audit trail. Identifying high-priority vulnerabilities STOP STOP STOP STOP IBM Security QRadar Vulnerability Manager: Real-time visibility and automatic remediation Attacks or threat sources Firewall—Address blocked Intrusion prevention solutions—Connection blocked Endpoint managers—Patch scheduled Inactive application Asset is vulnerable QRadar Vulnerability Manager uses security intelligence to help filter vulnerabilities. This enables organizations to understand how to prioritize their remediation or mitigation activities.
  • 5. 5 Data SheetIBM Software With QRadar Vulnerability Manager, organizations can: ●● ● Orchestrate a high volume of concurrent assessments without disturbing normal network operations—multiple stakeholders can scan and rescan the network as needed for remediation verification ●● ● Summarize vulnerability assessments by day, week and month for effective reporting and visibility of trends ●● ● Run scans from both inside and outside the network ●● ● Capture an audit trail of all vulnerability management activi- ties, including discovery, assignments, notes, exceptions and remediation Extend your security intelligence QRadar Vulnerability Manager combines the real-time security visibility of QRadar Security Intelligence Platform with the results of proven vulnerability-scanning technology. As part of the QRadar SIEM architecture, QRadar Vulnerability Manager can be quickly activated via a licensing key—requiring no addi- tional hardware or software. This can result in considerable cost savings, since security teams do not normally have to deploy new technologies or learn a new interface. They can simply generate reports from within the familiar QRadar product family user interface. Key integrations for QRadar Vulnerability Manager include: ●● ● QRadar SIEM: Provides the appliance infrastructure for conducting network scans, the asset database for logging and tracking vulnerability management activities, the passive network detection capabilities for discovering newly added assets, and all the contextual security intelligence data needed to build and execute actionable vulnerability management plans ●● ● QRadar Risk Manager: Reveals current and historical network connection data to show how vulnerabilities relate to the overall network topology—including how firewall and IPS rules affect the exploitability of specific assets from inter- nal and external threat sources ●● ● IBM Security SiteProtector™ System: Provides virtual patching capabilities using network IPS signatures to protect against exploits of identified vulnerabilities by blocking associated connections ●● ● X-Force threat intelligence feed: Supplies up-to-date information on recommended fixes and security advice for active vulnerabilities, viruses, worms and threats ●● ● IBM Endpoint Manager: Streamlines remediation tasks by automatically managing patches to hundreds of thousands of endpoints, including the latest mobile devices; provides integrated reporting for real-time monitoring of patch progress ●● ● IBM Security AppScan®: Supports web application vulner- ability assessments, enabling QRadar Vulnerability Manager to provide visibility and prioritization of web application vulnerabilities within its integrated dashboard ●● ● IBM InfoSphere® Guardium® Vulnerability Assessment: Supports scanning of database infrastructure, enabling QRadar Vulnerability Manager to provide visibility and prioritization of database vulnerabilities within its integrated dashboard Apply proactive security In a world where no networks are truly secure, QRadar Vulnerability Manager enables organizations to more effectively protect their environments using an extensive line of proactive defenses, including: ●● ● High-speed internal scanning, which helps preserve network performance and availability ●● ● Support for discovery, non-authenticated, authenticated and Open Vulnerability Assessment Language (OVAL) scans ●● ● External scanning capabilities to see the network from an attacker’s viewpoint and help facilitate compliance ●● ● Single-click investigations from dashboard screens and deep, rules-based, rapid searching capabilities to learn more about specific events or identify long-term trends ●● ● Suppression of acceptable, false positive or otherwise non-mitigated vulnerabilities from ongoing reporting ●● ● Vulnerability assignment and remediation lifecycle management ●● ● Full audit trail for compliance reporting
  • 6. Why IBM? IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research and development, provides security intelligence to help organi- zations holistically protect their people, infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 13 billion security events per day in more than 130 countries, and holds more than 3,000 security patents. For more information To learn more about IBM Security QRadar Vulnerability Manager, please contact your IBM representative or IBM Business Partner, or visit: ibm.com/software/products/us/en/category/SWI60 Additionally, IBM Global Financing can help you acquire the software capabilities that your business needs in the most cost-effective and strategic way possible. We’ll partner with credit-qualified clients to customize a financing solution to suit your business and development goals, enable effective cash management, and improve your total cost of ownership. Fund your critical IT investment and propel your business forward with IBM Global Financing. For more information, visit: ibm.com/financing © Copyright IBM Corporation 2013 IBM Corporation Software Group Route 100 Somers, NY 10589 Produced in the United States of America June 2013 IBM, the IBM logo, ibm.com, AppScan, Guardium, InfoSphere, SiteProtector, and X-Force are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml QRadar is a registered trademark of Q1 Labs, an IBM Company. This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. The client is responsible for ensuring compliance with laws and regulations applicable to it. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the client is in compliance with any law or regulation. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that systems and products are immune from the malicious or illegal conduct of any party. 1 “IBM X-Force 2012 Trend and Risk Report,” IBM Security Systems, March 2013. http://www-03.ibm.com/security/xforce/downloads.html Please Recycle WGD03027-USEN-00