In this demo
Bravo shows how QVM can be used to filter out vulnerabilities that have not experienced traffic recently and how to filter out vulnerabilities based on whether there are virtual patch rules in place on the IPS systems to block exploitation of the vulnerability. He shows how QVM can read Security Information and Event Management (SIEM) data to prioritize the vulnerability instances that have actually experienced exploit traffic. He also demonstrates how QRadar Risk Manager (QRM) can be used to generate policy-based risk assessments on the infrastructure and use those assessments to further prioritize the security team's work. Finally, he demonstrates QVM's ability to assign vulnerability management to members of the IT security team and track remediation activities. \
You might also be interested in.....
Use IBM security intelligence and big data solutions to uncover actionable insights into modern,advanced data threats. Read the white paper and learn about understanding and identifying advanced threats, expanding visibility with QRadar Security Intelligence, and security Intelligence with InfoSphere® BigInsights™.
Understanding the shifting nature of malicious attacks on and vulnerabilities of your enterprise mainframe or hybrid system, especially as your organization implements new technologies -- cloud computing, response-based workload resource balancing, mobile access, big data handling, social collaboration -- is just the beginning of establishing a comprehensive security policy for your mainframe-oriented environment. In "Creating the ultimate security platform," IBM explains how System z can deliver proactive protection for data, web, cloud, mobile, and enterprise environments on mainframe systems.
This whitepaper starts by detailing how mainframe security requirements have changed in the Internet era. Originally, mainframes were isolated from outside influences, but now many are just as connected to the web as a typical smartphone; the difference is that it is relatively easy to secure the simple environment of a phone, but not so easy with the complex architecture of a mainframe.
The paper describes how security intelligence, consistent, normalized analysis of disparate data to recognize and block attacks, takes an "umbrella" approach to security (from network intrusion prevention all the way to endpoint management) in order to create a complete picture of the infrastructure and the attacks and vulnerabilities that threaten it. The security intelligence approach, optimized for the way a contemporary computer system is used, replaces the traditional "security only at the obvious vulnerable points" way of protecting your mainframe.
Find out some of the top issues that IBM X-Force is tracking in their latest Risk and Trends report? Are APTs the new big threat? What about Java Zero Day vulnerabilities? These get a lot of press, but are they the most pressing issues? Find out in the late