IBM Security QFlow & Vflow
-
Upload
camilo-fandino-gomez -
Category
Software
-
view
105 -
download
0
Transcript of IBM Security QFlow & Vflow
QFlow and VFlow slides
2 IBM Security
Layer 7 traffic capture and analysis
for deep application insight
Network, application and user
activity monitoring
Full integration with QRadar SIEM
and QRadar Risk Manager
QRadar QFlow and QRadar VFlow Overview
QRadar QFlow monitors traffic in physical
environments and QRadar VFlow in virtual / cloud
environments to provide advanced flow collection and
analysis for Layer 7 visibility, via deep packet
inspection and stateful application classification
Key Capabilities Benefits
Reduce the risk and severity of
security breaches
Ensure regulatory and internal
policy compliance
Perform more complete and
accurate forensic investigations
Network and Application Visibility
Layer 7 application monitoring
Content capture
Network and Application Visibility
Layer 7 application monitoring
Content capture
Network and Application Visibility
Layer 7 application monitoring
Content capture
Network and Application Visibility
Layer 7 application monitoring
Content capture
3 IBM Security
QRadar QFlow & VFlow: Application Layer visibility and content awareness
• Provides Layer 7 visibility and stateful
classification of applications and protocols
• Uses Deep Packet Inspection (DPI)
technology to sample payload content and
identify malicious transfers
• Passive activity monitoring helps identify
and automatically configure new hosts,
assets and services within QRadar SIEM
Core Features
VFlow delivers application layer visibility
of all virtual network traffic
Runs as virtual host software on the
virtual server, not requiring additional
hardware
Analyzes port mirrored traffic for a
physical network switch bridging gap
between physical and virtual realm
4 IBM Security
Network traffic doesn’t lie. Attackers can stop logging and erase their tracks, but can’t cut off the network (flow data)
• Deep packet inspection for Layer 7 flow data
• Pivoting, drill-down and data mining on flow sources for advanced detection and forensics
Helps detect anomalies that might otherwise get missed
Enables visibility into attacker communications
Differentiated by network flow analytics
5 IBM Security
Helps detect zero-day attacks that have no signature
Enables policy monitoring and rogue server identification
Provides visibility into all attacker communications
Uses passive monitoring to build asset profiles and classify hosts
Improves network visibility and helps resolve traffic problems
Flows provide context for true network intelligence
© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products
and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service
marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your
enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.
No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,
products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products
or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
FOLLOW US ON:
THANK YOU