IBM Internet Security Systems October Market Intelligence Brief

Similar documents
Overview: Compliance and Security Management PCI-DSS Control Compliance Suite Overview

PROFESSIONAL SERVICES (Solution Brief)

IBM Internet Security Systems Proventia Management SiteProtector

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network

Compliance in 5 Steps

GuardTower TM White Paper. Enterprise Security Management Systems

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Secret Server HP ArcSight Integration Guide

A Pragmatic Path to Compliance. Jaffa Law

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Data Security and Privacy Principles IBM Cloud Services

IBM PowerSC. Designed for Enterprise Security & Compliance in Cloud and Virtualised environments. Highlights

WHITEPAPER. THE INGRES DATABASE AND COMPLIANCE Ensuring your business most valuable assets are secure

efax Corporate for Independent Agent Offices

Protecting Your Cloud

IBM Tivoli Directory Server

Complete document security

HIPAA Regulatory Compliance

Establish and Maintain Secure Cardholder Data with IBM Payment Card Industry Solutions

Xerox FreeFlow Print Server. Security White Paper. Secure solutions. for you and your customers

Compliance and Privileged Password Management

Building a Case for Mainframe Security

SQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY

Oracle Database Vault

What is Penetration Testing?

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry

Balancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld

Sarbanes-Oxley Act (SOX)

IT Audit Process Prof. Liang Yao Week Two IT Audit Function

Run the business. Not the risks.

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1

PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)

VANGUARD WHITE PAPER VANGUARD INSURANCE INDUSTRY WHITEPAPER

WHITE PAPERS. INSURANCE INDUSTRY (White Paper)

Securing Mainframe File Transfers and TN3270

Security Terminology Related to a SOC

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

IBM Proventia Management SiteProtector Sample Reports

Cloud-based data backup: a buyer s guide

The Need In today s fast-paced world, the growing demand to support a variety of applications across the data center and help ensure the compliance an

Cybersecurity Conference Presentation North Bay Business Journal. September 27, 2016

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

Enterprise SM VOLUME 1, SECTION 5.7: SECURE MANAGED SERVICE

Escaping PCI purgatory.

CA Host-Based Intrusion Prevention System r8

The Convergence of Security and Compliance

Enabling compliance with the PCI Data Security Standards December 2007

Symantec Security Monitoring Services

IBM BigFix Compliance

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights

HITRUST CSF Assurance Program HITRUST, Frisco, TX. All Rights Reserved.

Information Security Risk Strategies. By

IBM Cloud Internet Services: Optimizing security to protect your web applications

Introduction to AWS GoldBase

USING QUALYSGUARD TO MEET SOX COMPLIANCE & IT CONTROL OBJECTIVES

Demonstrating Compliance in the Financial Services Industry with Veriato

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

Compliance with CloudCheckr

Weighing in on the Benefits of a SAS 70 Audit for Third Party Administrators

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

Comprehensive Database Security

The Convergence of Security and Compliance. How Next Generation Endpoint Security Manages 5 Core Compliance Controls

SECURITY PRACTICES OVERVIEW

CoreMax Consulting s Cyber Security Roadmap

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

01.0 Policy Responsibilities and Oversight

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow

Safeguarding Cardholder Account Data

SIEMLESS THREAT DETECTION FOR AWS

Automating the Top 20 CIS Critical Security Controls

IBM Exam 00M-662 Security Systems Sales Mastery Test v2 Version: 7.1 [ Total Questions: 72 ]

SARBANES-OXLEY (SOX) ACT

CRYPTTECH. Cost-effective log management for security and forensic analysis, ensuring compliance with mandates and storage regulations

Modern Database Architectures Demand Modern Data Security Measures

ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V

SOC-2 Requirement Solution Brief. EventTracker 8815 Centre Park Drive, Columbia MD SOC-2

Aligning Your Organization s Business Units to Achieve a Cohesive Cybersecurity Strategy

Data Security: Public Contracts and the Cloud

CCISO Blueprint v1. EC-Council

IBM Power Systems. IBM Systems and Technology Group. Power your planet. Smarter systems for a smarter planet

Tracking and Reporting

An Oracle White Paper June Oracle Audit Vault and Database Firewall

Security by Default: Enabling Transformation Through Cyber Resilience

Moving Workloads to the Public Cloud? Don t Forget About Security.

in PCI Regulated Environments

The HITRUST CSF. A Revolutionary Way to Protect Electronic Health Information

Combatting advanced threats with endpoint security intelligence

Locking Down the Cloud Security is Not a Myth

McAfee Database Security

PCI DSS and the VNC SDK

to Enhance Your Cyber Security Needs

IBM PowerVM. Virtualization without limits. Highlights. IBM Systems and Technology Data Sheet

Insurance Industry - PCI DSS

IBM Fundamentals of Applying Tivoli Security and Compliance Management Solutions V2.

locuz.com SOC Services

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

IBM Security Access Manager

incontact Open Cloud Platform Scalable, Reliable, Extensible, Powering Contact Centers of all Sizes.

Transcription:

IBM Internet Security Systems October 2007 Market Intelligence Brief

Page 1 Contents 1 All About AIX : Security for IBM AIX 1 AIX Adoption Rates 2 Security Benefits within AIX 3 Benefits of RealSecure Server Sensor for AIX 5 For More Information 5 About IBM ISS All About AIX : Security for IBM AIX When it comes to UNIX operating systems, not all open source database solutions have what it takes to replace established proprietary products. IBM AIX operating system leads the industry in vision and support in building solutions that run businesses worldwide. AIX is the only UNIX operating system that leverages the experience of IBM Internet Security Systems (ISS) in supporting both software and hardware platforms for servers, from blades to mainframes. AIX Adoption Rates Since its introduction in 1986 1, AIX has continually grown market share within the UNIX community. According the 2006 IDC server operating systems report, three major players accounted for nearly 90 percent of all UNIX revenue in second-quarter 2006: Sun (34 percent), IBM (28 percent) and HP (28 percent). Recent analyst reports have estimated the AIX user base includes more than 800,000 users worldwide 2 including national governments and some of the world s largest companies. With its aggressive new release schedule, AIX continues to grow its worldwide market share. Key features in the operating system include: Support for advanced virtualization through 64-bit system and software architecture with dynamic logical partitioning (LPAR). Scalability to run 32-bit or 64-bit applications simultaneously. Capacity on Demand (CoD), providing the agility to scale-up at a moment s notice. Capacity Upgrade on Demand (CUoD), allowing the installation of additional systems with more resources (processors/memory) on hand than are initially required. The open, standards-based operating system provides fully integrated support for 32- and 64-bit applications and is compatible with IBM eservers including System pseries and IBM BladeCenter.

Page 2 Security Benefits within AIX To complement the granular security that IBM RealSecure Server Sensor provides, AIX security features include: Enhanced system security to help protects against unauthorized access using a variety of authentication mechanisms that you can install, configure and deploy in the base operating system. Enhanced network security to help secure intranets and extend the network over the Internet by using built-in network security features. Effective system management to help securely administer the network infrastructure, servers, clients and pervasive devices. A repertoire of useful applications and tools to help access secure programming interfaces and open-source software tools to establish operating procedures for addressing security requirements and exposures. Increased access control that can specify who receives access to protected information resources. Robust encryption capabilities to enhance data-transmission protection and help secure sensitive cryptographic keys. These features, in addition to the multi-layered server protection built into the RealSecure Server Sensor, help companies to not only protect their businesscritical servers, but also meet regulatory compliance standards. It is critical for organizations to employ additional security software like RealSecure Server Sensor to provide granular protection against any internal or external hacker attempts that try to take advantage of both known and new vulnerabilities. The IBM Internet Security Systems X-Force research and development team can shield the operating system and applications from serious security vulnerabilities.

Page 3 Benefits of RealSecure Server Sensor for AIX IBM ISS is a leader in the enterprise security industry in its commitment to AIX, providing support in-house for the preceding releases. In addition to offering a superior protection engine fueled by the world renowned X-Force team, clients choose RealSecure Server Sensor for its robust capabilities, such as: Helps protect the network and applications from security vulnerabilities Monitors network traffic to detect and mitigate inbound outbound threats Helps secure the confidentiality, availability and integrity of business data Aids in compliance with industry regulation requirements RealSecure Server Sensor for AIX is compatible with the following IBM eservers and network operating systems: Blade center JS20 and JS 21 PowerPC: AIX 5.1, AIX 5.2-32bit, AIX 5.2-64bit, AIX 5.3-64bit System I models i5 520, i5 550, i5 570 and i5 595 Power5+ Processor: AIX 5.1, AIX 5.2-32bit, AIX 5.2-64bit, AIX 5.3-32bit, AIX 5.3-64bit System p models p5 185, p5 505, p5 505Q, p5 510Q, p5 520, p5 520Q, p5 550, p5 550Q, p5 560Q, p5 570, p5 575, p5 590, p5 595 Power5+ Processor: AIX 5.1, AIX 5.2-32bit, AIX 5.2-64bit, AIX 5.3-32bit, AIX 5.3-64bit Virtually all industries are subject to regulatory compliance standards that require increased documentation for server security. RealSecure Server Sensor provides reporting and data archiving that helps ease the burden of analysis and demonstration of regulatory compliance. Working with IBM Managed Security Services and IBM Professional Security Services in addition to using RealSecure Server Sensor further assists with security planning, management and compliance reporting. RealSecure Server Sensor addresses the regulations in the chart below.

Page 4 In addition to the above chart, RealSecure Server Sensor also adheres to the server security requirements found in the Gramm-Leach-Bliley Act (GLBA), How does the RealSecure Server Sensor address the compliance regulations? Compliance regulation Federal Information Management Security Act (FISMA) Health Insurance Portability & Accountability Act (HIPAA) International Organization for Standardization/International Electrotechnical Commission (ISO/IEC 17799) National Institute of Standards & Technology (NIST 800-53) Payment Card Industry Data Security Standard (PCI DSS) IBM RealSecure Server Sensor and IBM services Helps enforce security policy; enhance access control, information security incident management and business continuity management. Helps ensure proper server access and permissions; manage server security; maintain and manage group security policies; audit file system activities and changes to the server, documents, and environment. Helps organize information security with reporting on access control rights to applications, functions, and data, as well as incident management. Helps identify and block threats; evaluate/ monitor existing controls; reduce security risks with proper assignments; and provide file integrity monitoring and operating system log monitoring, while protecting machines from malicious code. Helps provide coverage for requirements 1, 5, 6, 10 and 11, including firewall, anti-virus, application security, network access and regularly testing systems and processes.

Page 5 Sarbanes-Oxley Act (SOX) and Supervisory Control and Data Acquisition (SCADA). To assist customers with meeting the rising standards of regulatory compliance, the software allows users to monitor log-ins and privilege escalations, while offering both sensor and group level configuration. Overall, IBM ISS is committed to maintaining its position both ahead of the security threat and ahead of the enterprise security market space by supporting a broad range of network operating systems. For More Information To learn how RealSecure Server Sensor can provide complete, cost-effective data protection for the critical applications on your AIX operating system, please call 1 800 776-2362 or visit www.ibm.com/services/us/iss. About IBM ISS IBM ISS is the trusted security expert to global enterprises and world governments, providing products and services that protect against Internet threats. An established world leader in security since 1994, IBM ISS delivers proven cost efficiencies and reduces regulatory and business risk across the enterprise. IBM ISS products and services are based on the proactive security intelligence conducted by the IBM Internet Security Systems X-Force research and development team a world authority in vulnerability and threat research.

Copyright IBM Corporation 2007 IBM United States IBM Global Services Route 100 Somers, NY 10589 U.S.A. Produced in the United States of America. 10-07 All Rights Reserved. IBM, the IBM logo, and AIX, BladeCenter, and System pseries are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. RealSecure Server Sensor and X-Force are trademarks or registered trademarks of Internet Security Systems, Inc., in the United States, other countries, or both. Internet Security Systems, Inc. is a wholly-owned subsidiary of International Business Machines Corporation. UNIX is a registered trademark of The Open Group in the United States and other countries. Other company, product and service names may be trademarks or service marks of others. References in this publication to IBM products or services do not imply that IBM intends to make them available in all countries in which IBM operates. The IBM home page on the Internet can be found at ibm.com Printed in the (country of origin) on recycled paper containing 10% recovered post-consumer fiber. 1. Wikipedia: http://en.wikipedia.org/wiki/ibm_ AIX _%28operating_system%29. June 5, 2007. 2. IDG News Service. http://www.itworldcanada.com/ Pages/Docbase/ViewArticle.aspx?id=idgml-0bdd5a41-1ee8-4c66-a0fc-cb7e33a6a8f5. December 19, 2005. GTS03008-USEN-00