IBM launches XGS 5000 advanced threat platform

New form of intrusion prevention is unveiled to tackle growing threats from BYOD and social media.

Security

IBM has introduced its new XGS 5000 intrusion prevention system to provide administrators with greater insight into an organisation's IT security.

The new appliance will help companies combat new threats emerging from social media, according to IBM. The platform, dubbed IBM Security Network Protection, will allow enterprises to create and enforce security policies that can be modified to a user's role in the business, the time of day, as well as the site being visited.

The XGS 5000 is the company's midrange appliance. It sports 2.5-Gbps throughput and works on up to eight network segments. It also incorporates threat intelligence from IBM's security practice X-Force. This includes a web filter database of more than 15 billion URLs.

Once organisations are aware of the nature of activity on their network, the new application control features enable clients to have granular control over what is happening on their network. This means granular user and group-level control over which applications and web sites are permitted, and how they are used down to individual actions or activities within these applications and sites.

"The escalation of targeted attacks and rapid adoption of mobility, cloud and social media requires companies to take a new approach to securing the enterprise," said Brendan Hannigan, general manager of IBM's Security Systems Division.

Hannigan said that the company was uniquely positioned to help customers address these challenges with its new Advanced Threat Protection Platform. "[It] combines total security intelligence from within the enterprise, exhaustive external threat intelligence and the new XGS appliance that delivers fine-grained activity detection and control," he added.

The XGS 5000 is the latest addition to IBM's Advanced Threat Protection Platform and the company said it would protect companies against network-based threats masked in common network traffic as well as preventing attackers from exploiting vulnerabilities at the network, host and application layers.

The new appliance will be available in the third quarter of this year.

Featured Resources

Unleashing the power of AI initiatives with the right infrastructure

What key infrastructure requirements are needed to implement AI effectively?

Download now

Achieve today. Plan tomorrow. Making the hybrid multi-cloud journey

A Veritas webinar on implementing a hybrid multi-cloud strategy

Download now

A buyer’s guide for cloud-based phone solutions

Finding the right phone system for your modern business

Download now

The workers' experience report

How technology can spark motivation, enhance productivity and strengthen security

Download now

Recommended

What is e-safety?
e safety

What is e-safety?

27 Jan 2021
Your essential guide to internet security
Security

Your essential guide to internet security

27 Jan 2021
Mimecast links breach to SolarWinds hackers
Security

Mimecast links breach to SolarWinds hackers

27 Jan 2021
TikTok vulnerability exposed private user data
data protection

TikTok vulnerability exposed private user data

26 Jan 2021

Most Popular

WhatsApp could face €50 million GDPR fine
General Data Protection Regulation (GDPR)

WhatsApp could face €50 million GDPR fine

25 Jan 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

21 Jan 2021
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

12 Jan 2021