IBM X-Force Research

82 visualizações

Publicada em

IBM® X-Force® Research provides the foundation for IBM’s preemptive approach to Internet security. This industry-leading group of security experts focuses on researching and evaluating vulnerabilities, threats and security issues; developing ssessments and countermeasure technology for IBM products; and educating the public about emerging Internet threats and
trends.

Publicada em: Tecnologia
0 comentários
0 gostaram
Estatísticas
Notas
  • Seja o primeiro a comentar

  • Seja a primeira pessoa a gostar disto

Sem downloads
Visualizações
Visualizações totais
82
No SlideShare
0
A partir de incorporações
0
Número de incorporações
2
Ações
Compartilhamentos
0
Downloads
4
Comentários
0
Gostaram
0
Incorporações 0
Nenhuma incorporação

Nenhuma nota no slide

IBM X-Force Research

  1. 1. IBM Security Data Sheet Highlights • Develops security protection that forms the foundation of IBM Security • Researches and analyzes security threats, vulnerabilities and exploits • Creates proactive countermeasure technologies • Collaborates with leading public and private organizations to help enhance internet security worldwide • Educates the public about emerging threats IBM X-Force Research IBM X-Force helps organizations stay ahead of emerging threats with security research IBM® X-Force® Research provides the foundation for IBM’s preemptive approach to Internet security. This industry-leading group of security experts focuses on researching and evaluating vulnerabilities, threats and security issues; developing assessments and countermeasure technology for IBM products; and educating the public about emerging Internet threats and trends. The advanced security research and the threat mitigation technology that X- Force delivers are instrumental in helping protect IBM customers from the threat of attack. X-Force threat intelligence, combined with 24x7x365 threat monitoring and analysis from IBM Security Services global security operations centers, helps ensure that IBM Security customers stay ahead of existing and emerging threats. The X-Force team: • Maintains a comprehensive databases of known security vulnerabilities • Analyzes millions of malware samples each year • Tracks billions of security incidents daily • Monitors millions of spam and phishing attacks • Examines billions of web pages and images Page 1 of 4
  2. 2. Monitoring and reporting internet threats To deliver a broad view of the threat landscape, the X-Force team combines its own research findings with data collected from multiple research sources, including publicly disclosed vulnerabilities and commercial vulnerability data. The team also monitors the underground for irresponsibly disclosed zero-day vulnerabilities; analyzes proofs of concept and public exploit code; and, through the expertise of the IBM Trusteer® group, analyzes advanced malware. By monitoring global Internet threats around the clock and updating the IBM Security AlertCon online resource center, the X-Force team helps IBM keep stakeholders and clients abreast of the current global Internet threat level. IBM X-Force core components The X-Force research and development team focuses its efforts on four main areas: research, analytic engines, security content delivery, and industry and customer deliverables. • X-Force research groups are responsible for understanding what each security issue is, how it works and how it can be exploited. • That intelligence then feeds into IBM Security analytic engines to help protect customers against these threats. The results of analytics and research are delivered through security content updates to customers on a regular basis. • Clients and the general public can investigate X-Force threat intelligence through the X-Force Exchange platform, a cloud-based threat intelligence sharing platform enabling users to rapidly research the latest global security threats, aggregate actionable intelligence and collaborate with peers. • Industry and customer deliverables are widely regarded as important to both education and decision making. They include blogs, speaking engagements, presentations at security conferences and original research publications such as the IBM X-Force Threat Intelligence reports, X-Force Threat Research papers, and X-Force Malware Research papers Collaborating with leading organizations to enhance threat analysis X-Force builds and maintains one of the largest and most authoritative vulnerability databases in the industry. Containing over 100,000 documented vulnerabilities, the database includes detailed analysis of every notable public vulnerability disclosure recorded since 1994. Moreover, X-Force collaborates with thousands of the world’s leading businesses and governments, industry information sharing and analysis centers, and global coordination centers, as well as other security product vendors. Through the IBM X-Force Exchange threat intelligence platform, IBM offers a collaborative environment for analysts, practitioners and X-Force researchers. Using this valuable online resource, security industry experts can work together on investigating threat observables and indicators of compromise. By providing the ability to collaborate in private groups and access reports on threat activity, the platform helps streamline communications and threat investigations. Protecting organizations against emerging threats As security is increasingly becoming a big data issue, combining analytics with threat intelligence feeds delivers greater security intelligence for helping organizations stay ahead of emerging threats and trends. These threat intelligence feeds are integrated into network and endpoint protection, identity and access management solutions and cloud security products, as well as the IBM QRadar® SIEM (security incident and event management) platform, to add external context to internal indicators of Page 2 of 4
  3. 3. compromise. In addition to its research role, X-Force develops countermeasure technologies for IBM security solutions. X-Force malware researchers from the Trusteer organization retrieve malware, configurations and modules from listening points across the globe. This dedicated cross-functional team monitors chatter on the darknet, installs malware in a dedicated lab environment, and analyzes it to understand the malware operator’s modus operandi. With skills in reverse engineering, the team uses proprietary decryption tools and versioning to identify incremental changes in malware to develop and deploy defenses. The IBM X-Force Incident Response Service team can proactively hunt for and respond to threats and apply the latest threat intelligence before breaches occur. With services for incident response planning and for remote and onsite threat response, X- Force expertise is now just a phone call away. Through the capabilities of the IBM X-Force Ethical Hacking Team, clients can also take advantage of penetration testing services designed to identify systems vulnerabilities, validate existing controls and provide a roadmap for remediation. Combining the expertise of its skilled consultants with industry-leading security assessment tools, the team helps simplify the process of identifying and prioritizing weaknesses while providing specific guidance and recommendations to help reduce exposures. Why IBM Security? A preemptive security approach requires market-leading research, a keen eye for attack trends and techniques, and a streamlined and affordable platform for delivering advanced security solutions that are knowledge-based. IBM Security commands the extensive knowledge, innovative research methods and complex technologies required to achieve preemptive security. The experienced and certified consultants, architects, project managers and subject matter experts at IBM are prepared to provide your organization with a comprehensive platform of preemptive security solutions designed to protect your entire IT infrastructure, from the network gateway to the desktop. IBM is the trusted security advisor to thousands of the world’s leading businesses and governments, providing ahead-of-the- threat protection for networks, desktops and servers. IBM understands the threats to your network and the critical balance between performance and protection. As a result, IBM has enabled its world-class vulnerability-based security technology to stop Internet threats before they impact your business. Page 3 of 4
  4. 4. For more information To learn more about IBM X-Force, contact your IBM representative or IBM Business Partner, or visit: ibm.com/xforce © Copyright IBM Corporation 2016 IBM Corporation Software Group Route 100 Somers, NY 10589 Produced in the United States of America April 2016 IBM, the IBM logo, ibm.com, are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at "Copyright and trademark information" at ibm.com/legal/copytrade.shtml This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. THE INFORMATION IN THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. Please Recycle Page 4 of 4

×