Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

4/25/2012
08:31 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

IBM Announces New Threat Analytics To Help Organizations Better Identify Hidden Security Attacks

QRadar Network Anomaly Detection appliance analyzes complex network activity in real-time

LONDON, April 25, 2012 /PRNewswire/ -- INFOSEC -- IBM (NYSE: IBM) today unveiled new analytics using advanced security intelligence that can flag suspicious behavior in network activities to help better defend against hidden threats facing organizations.

(Logo: http://photos.prnewswire.com/prnh/20090416/IBMLOGO )

As organizations open up their networks to smartphones and increased social media access, traditional security defenses alone such as firewalls and antivirus software can't adequately protect an organization. According to the 2011 IBM X-Force Trend and Risk Report, adversaries ramped up social engineering attacks, and X-Force witnessed mobile exploits having increased by 19 percent in 2011. Firewalls and traditional security products do little against advanced threats that use unreported techniques or that have already invaded an organization.

To address this, IBM is announcing the QRadar Network Anomaly Detection appliance that analyzes complex network activity in real-time, detecting and reporting activity that falls outside normal baseline behavior. The analytics can look not only at inbound attacks but also can detect outbound network abnormalities where malware may have already infected a "zombie" system to send data outside the organization.

"Advanced attackers are both patient and clever, leaving just a whisper of their presence, and evading many network protection and detection approaches," said Marc van Zadelhoff, vice president of Strategy and Product Management, IBM Security Systems. "Most organizations don't even know they have been infected by malware. An advantage of IBM analytics is that it can detect the harbingers of new attacks from the outside or reveal covert malicious activity from the inside."

Using advanced behavioral algorithms, the QRadar Network Anomaly Detection appliance analyzes disparate data that can collectively indicate an attack - network and traffic flows, intrusion prevention system (IPS) alerts, system and application vulnerabilities, and user activity. It quantifies several risk factors to help evaluate the significance and credibility of a reported threat, such as the business value and vulnerabilities of targeted resources.

By applying behavioral analytics and anomaly detection, the application can flag abnormal events such as:

-- Outbound network traffic detected to countries where the company does not have business affairs; -- FTP traffic observed in a department that doesn't regularly use FTP services; and -- A known application running on a non-standard port or in areas where it is not allowed (e.g. unencrypted traffic running in secure areas of the network). The new QRadar Network Anomaly Detection appliance leverages the QRadar Security Intelligence Platform and is designed to complement IBM SiteProtector and IBM Security Network IPS deployments. The new appliance also receives a threat intelligence feed from IBM X-Force research, providing insight into suspect entities on the Internet based upon knowledge of more than 15 billion Web pages and images. The X-Force IP Reputation Feed provides QRadar Network Anomaly Detection with a real-time list of potentially malicious IP addresses - including malware hosts, spam sources and other threats. If the product sees any traffic to or from these sites, it can immediately alert the organization and provide rich contextual information about the activity.

IBM Security Network IPS with Hybrid Protection

Today IBM is announcing the newest version of its Network IPS, which contains hybrid protection, combining the broad protection found in IBM's Protocol Analysis Engine with the open source capabilities and common rule syntax of SNORT. This functionality gives IBM clients the ability to easily create and share custom IPS rules in a popular open source format and at the same time provides the confidence that comes with IBM's protection powered by IBM X-Force Research. IBM's Protocol Analysis Engine is considered to be one of the industry's most comprehensive threat detection engines.

IBM's Advanced Threat Protection Platform

IBM is announcing its suite of network security offerings, the Advanced Threat Protection Platform, which is now one of the most comprehensive, integrated threat protection portfolios. It comprises IBM Security Network IPS and IBM SiteProtector, and the new QRadar Network Anomaly Detection appliance with the new X-Force IP Reputation Feed. Users can now access X-Force intelligence through their QRadar offenses and reports to identify threats related to malicious IP addresses. The solutions also help protect against network-based threats masked in common network traffic and prevents attackers from exploiting vulnerabilities at the network, host and application layers.

As security is increasingly becoming a big data issue, this appliance is part of IBM's overall push to combine analytics with real-time feeds to deliver greater security intelligence to clients. IBM offers a range of security-specific appliances targeted at specific needs.

Availability

QRadar Network Anomaly Detection appliance with the X-Force IP Reputation Feed is available this quarter. IBM Advanced Threat Protection Portfolio, except the QRadar Network Anomaly Detection appliance, is available today and comprises existing and new product offerings.

About IBM Security

Q1 Labs was acquired by IBM in October 2011, and serves as a cornerstone of IBM's new Security Systems division. IBM's security portfolio provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, network security and more. IBM operates the world's broadest security research and development organization and delivery organization. This comprises nine security operations centers, nine IBM Research centers, 11 software security development labs and an Institute for Advanced Security with chapters in the United States, Europe and Asia Pacific. IBM monitors 13 billion security events per day in more than 130 countries and holds more than 3,000 security patents.

For more information on IBM security, please visit: www.ibm.com/security.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-35519
PUBLISHED: 2021-05-06
An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel i...
CVE-2021-20204
PUBLISHED: 2021-05-06
A heap memory corruption problem (use after free) can be triggered in libgetdata v0.10.0 when processing maliciously crafted dirfile databases. This degrades the confidentiality, integrity and availability of third-party software that uses libgetdata as a library. This vulnerability may lead to arbi...
CVE-2021-30473
PUBLISHED: 2021-05-06
aom_image.c in libaom in AOMedia before 2021-04-07 frees memory that is not located on the heap.
CVE-2021-32030
PUBLISHED: 2021-05-06
The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_chec...
CVE-2021-22209
PUBLISHED: 2021-05-06
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.8. GitLab was not properly validating authorisation tokens which resulted in GraphQL mutation being executed.