IBM launches XGS 5000 advanced threat platform
New form of intrusion prevention is unveiled to tackle growing threats from BYOD and social media.
IBM has introduced its new XGS 5000 intrusion prevention system to provide administrators with greater insight into an organisation's IT security.
The new appliance will help companies combat new threats emerging from social media, according to IBM. The platform, dubbed IBM Security Network Protection, will allow enterprises to create and enforce security policies that can be modified to a user's role in the business, the time of day, as well as the site being visited.
The XGS 5000 is the company's midrange appliance. It sports 2.5-Gbps throughput and works on up to eight network segments. It also incorporates threat intelligence from IBM's security practice X-Force. This includes a web filter database of more than 15 billion URLs.
Once organisations are aware of the nature of activity on their network, the new application control features enable clients to have granular control over what is happening on their network. This means granular user and group-level control over which applications and web sites are permitted, and how they are used down to individual actions or activities within these applications and sites.
"The escalation of targeted attacks and rapid adoption of mobility, cloud and social media requires companies to take a new approach to securing the enterprise," said Brendan Hannigan, general manager of IBM's Security Systems Division.
Hannigan said that the company was uniquely positioned to help customers address these challenges with its new Advanced Threat Protection Platform. "[It] combines total security intelligence from within the enterprise, exhaustive external threat intelligence and the new XGS appliance that delivers fine-grained activity detection and control," he added.
The XGS 5000 is the latest addition to IBM's Advanced Threat Protection Platform and the company said it would protect companies against network-based threats masked in common network traffic as well as preventing attackers from exploiting vulnerabilities at the network, host and application layers.
The new appliance will be available in the third quarter of this year.
Unleashing the power of AI initiatives with the right infrastructure
What key infrastructure requirements are needed to implement AI effectively?Download now
Achieve today. Plan tomorrow. Making the hybrid multi-cloud journey
A Veritas webinar on implementing a hybrid multi-cloud strategyDownload now
A buyer’s guide for cloud-based phone solutions
Finding the right phone system for your modern businessDownload now
The workers' experience report
How technology can spark motivation, enhance productivity and strengthen securityDownload now