SlideShare a Scribd company logo
© 2013 IBM Corporation
IBM Security Systems
IBM Next Generation IPS (XGS5000) demo
© 2013 IBM Corporation
IBM Security Systems
XGS5000 demo setup
Hacker
InternetInternet
Server
User
Desktop
XGS5000
© 2013 IBM Corporation
IBM Security Systems
XGS5000 demo setup – firmware, xpu, url & web db
© 2013 IBM Corporation
IBM Security Systems
XGS5000 demo setup – inline blocking
© 2013 IBM Corporation
IBM Security Systems
XGS5000 demo setup – leverage on X-Force default signature & blocking
© 2013 IBM Corporation
IBM Security Systems
XGS5000 demo setup – fixpacks
© 2013 IBM Corporation
IBM Security Systems
Test cases
1. Blocking Web Application attacks
2. Blocking malicious files
3. Application control
• Blocking uploads
4. URL control
5. Enforcing user authentication
6. Identifying applications and users
• Application that takes up the most bandwidth
• Top users of a specific application
• Breakdown of network and application traffic for a specific user
• Breakdown of Web traffic category
© 2013 IBM Corporation
IBM Security Systems
IBM X-Force detailed information on web applications, URLs
© 2013 IBM Corporation
IBM Security Systems
Blocking Web Application attacks – vulnerable web server
© 2013 IBM Corporation
IBM Security Systems
Blocking Web Application attacks – attempting XSS injection attack
© 2013 IBM Corporation
IBM Security Systems
Blocking Web Application attacks – page cannot load
© 2013 IBM Corporation
IBM Security Systems
Blocking Web Application attacks – XGS blocks attack
© 2013 IBM Corporation
IBM Security Systems
Blocking Web Application attacks – XGS blocks attack
© 2013 IBM Corporation
IBM Security Systems
Blocking malicious files – attempt to download file from server
© 2013 IBM Corporation
IBM Security Systems
Blocking malicious files – download disrupted
© 2013 IBM Corporation
IBM Security Systems
Blocking malicious files – XGS blocks malicious file download
© 2013 IBM Corporation
IBM Security Systems
Blocking malicious files – XGS blocks malicious file download
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – create new rule
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – create web application object
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – control uploading of data
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – deploy changes
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – add web application object to the rule
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – policy deployed
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – user logs in to email
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – user compose email
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – user attempt to upload file as attachment in the email
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads - uploading
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – upload fail
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – XGS blocks upload via email
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – XGS blocks upload via email
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – XGS blocks upload via email
© 2013 IBM Corporation
IBM Security Systems
URL control – create a new rule
© 2013 IBM Corporation
IBM Security Systems
URL control – deploy changes
© 2013 IBM Corporation
IBM Security Systems
URL control – create new URL list
© 2013 IBM Corporation
IBM Security Systems
URL control – add URL to block in the list
© 2013 IBM Corporation
IBM Security Systems
URL control – deploy changes
© 2013 IBM Corporation
IBM Security Systems
URL control – URL list to rule
© 2013 IBM Corporation
IBM Security Systems
URL control – deploy changes
© 2013 IBM Corporation
IBM Security Systems
URL control – user attempt to access URL
© 2013 IBM Corporation
IBM Security Systems
URL control – user redirected to XGS
© 2013 IBM Corporation
IBM Security Systems
URL control – user redirected to XGS
© 2013 IBM Corporation
IBM Security Systems
URL control – XGS display warning message, URL has been blocked
© 2013 IBM Corporation
IBM Security Systems
URL control – XGS blocks URL
© 2013 IBM Corporation
IBM Security Systems
URL control – XGS blocks URL
© 2013 IBM Corporation
IBM Security Systems
URL control – XGS blocks URL
© 2013 IBM Corporation
IBM Security Systems
URL control – access to other URL in the same domain is allowed
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – create group and user objects
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – create group and user objects
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – create group
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – create group and user objects
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – user object
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – user object
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – specify group membership
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – specify group membership
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – specify group membership
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – object created
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – create rule, source = unauthenticated users
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – deploy changes
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – create web application object
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – specify granular control for YouTube
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – deploy changes
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – add object to rule
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – deploy changes
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – set action to Authenticate
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – deploy changes
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – user attempt to access youtube
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – user attempt to load a video on YouTube
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – user redirected to authentication page
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – user fills in credentials
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – user redirected to YouTube video
© 2013 IBM Corporation
IBM Security Systems
Application that takes up the most bandwidth
© 2013 IBM Corporation
IBM Security Systems
Application that takes up the most bandwidth
© 2013 IBM Corporation
IBM Security Systems
Application that takes up the most bandwidth
© 2013 IBM Corporation
IBM Security Systems
Top users of a specific application
© 2013 IBM Corporation
IBM Security Systems
Top users of a specific application
© 2013 IBM Corporation
IBM Security Systems
Top users of a specific application
© 2013 IBM Corporation
IBM Security Systems
Breakdown of network and application traffic for a specific user
© 2013 IBM Corporation
IBM Security Systems
Breakdown of network and application traffic for a specific user
© 2013 IBM Corporation
IBM Security Systems
Breakdown of network and application traffic for a specific user
© 2013 IBM Corporation
IBM Security Systems
Breakdown of Web traffic category
© 2013 IBM Corporation
IBM Security Systems
Breakdown of Web traffic category
© 2013 IBM Corporation
IBM Security Systems
Breakdown of Web traffic category
© 2013 IBM Corporation
IBM Security Systems
ibm.com/security
© Copyright IBM Corporation 2013. All rights reserved. The information contained in these materials is provided for informational purposes
only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use
of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any
warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement
governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in
all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole
discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any
way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United
States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response
to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated
or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure
and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to
be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems,
products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE
MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

More Related Content

Similar to cases for IBM xgs5000 (5.0) demo

IBM Security intelligence v1 - ahmed el nahas
IBM Security intelligence v1 - ahmed el nahasIBM Security intelligence v1 - ahmed el nahas
IBM Security intelligence v1 - ahmed el nahas
Shwetank Jayaswal
 
Emergency Response How to Identify and Resolve Security Risks
Emergency Response How to Identify and Resolve Security RisksEmergency Response How to Identify and Resolve Security Risks
Emergency Response How to Identify and Resolve Security Risks
IBM Security
 
Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the Crime
IBM Security
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
IBM Security
 
Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation   ibm info sphere guardium enterprise-wide database protection a...Presentation   ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...
solarisyougood
 
Tip from ConnectED 2015: Mobile security roundup
Tip from ConnectED 2015: Mobile security roundupTip from ConnectED 2015: Mobile security roundup
Tip from ConnectED 2015: Mobile security roundup
SocialBiz UserGroup
 
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your EndpointsMalware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
IBM Security
 
Security Authentication and Authorization Service (AAS) for IBM InfoSphere St...
Security Authentication and Authorization Service (AAS) for IBM InfoSphere St...Security Authentication and Authorization Service (AAS) for IBM InfoSphere St...
Security Authentication and Authorization Service (AAS) for IBM InfoSphere St...
lisanl
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
AGILLY
 
IBM Security SaaS IaaS and PaaS
IBM Security SaaS IaaS and PaaSIBM Security SaaS IaaS and PaaS
IBM Security SaaS IaaS and PaaS
Camilo Fandiño Gómez
 
Customizing the Mobile Connections App
Customizing the Mobile Connections AppCustomizing the Mobile Connections App
Customizing the Mobile Connections App
Prolifics
 
JavaOne2013: Securing Java in the Server Room - Tim Ellison
JavaOne2013: Securing Java in the Server Room - Tim EllisonJavaOne2013: Securing Java in the Server Room - Tim Ellison
JavaOne2013: Securing Java in the Server Room - Tim Ellison
Chris Bailey
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
IBM Security
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
Casey Lucas
 
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
UISGCON
 
Application Development for IBM Connections with IBM Bluemix
Application Development  for IBM Connections with IBM BluemixApplication Development  for IBM Connections with IBM Bluemix
Application Development for IBM Connections with IBM Bluemix
IBM Connections Developers
 
Application Development for IBM Connections with IBM Bluemix
Application Development  for IBM Connections with IBM BluemixApplication Development  for IBM Connections with IBM Bluemix
Application Development for IBM Connections with IBM Bluemix
Niklas Heidloff
 
IBM Lotusphere 2013 AD109: Using the IBM® Sametime® Proxy SDK: WebSphere Port...
IBM Lotusphere 2013 AD109: Using the IBM® Sametime® Proxy SDK: WebSphere Port...IBM Lotusphere 2013 AD109: Using the IBM® Sametime® Proxy SDK: WebSphere Port...
IBM Lotusphere 2013 AD109: Using the IBM® Sametime® Proxy SDK: WebSphere Port...
William Holmes
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
IBM Security
 
Mobility 301 : Protect
Mobility 301 : ProtectMobility 301 : Protect
Mobility 301 : Protect
AGILLY
 

Similar to cases for IBM xgs5000 (5.0) demo (20)

IBM Security intelligence v1 - ahmed el nahas
IBM Security intelligence v1 - ahmed el nahasIBM Security intelligence v1 - ahmed el nahas
IBM Security intelligence v1 - ahmed el nahas
 
Emergency Response How to Identify and Resolve Security Risks
Emergency Response How to Identify and Resolve Security RisksEmergency Response How to Identify and Resolve Security Risks
Emergency Response How to Identify and Resolve Security Risks
 
Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the Crime
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
 
Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation   ibm info sphere guardium enterprise-wide database protection a...Presentation   ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...
 
Tip from ConnectED 2015: Mobile security roundup
Tip from ConnectED 2015: Mobile security roundupTip from ConnectED 2015: Mobile security roundup
Tip from ConnectED 2015: Mobile security roundup
 
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your EndpointsMalware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
 
Security Authentication and Authorization Service (AAS) for IBM InfoSphere St...
Security Authentication and Authorization Service (AAS) for IBM InfoSphere St...Security Authentication and Authorization Service (AAS) for IBM InfoSphere St...
Security Authentication and Authorization Service (AAS) for IBM InfoSphere St...
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
IBM Security SaaS IaaS and PaaS
IBM Security SaaS IaaS and PaaSIBM Security SaaS IaaS and PaaS
IBM Security SaaS IaaS and PaaS
 
Customizing the Mobile Connections App
Customizing the Mobile Connections AppCustomizing the Mobile Connections App
Customizing the Mobile Connections App
 
JavaOne2013: Securing Java in the Server Room - Tim Ellison
JavaOne2013: Securing Java in the Server Room - Tim EllisonJavaOne2013: Securing Java in the Server Room - Tim Ellison
JavaOne2013: Securing Java in the Server Room - Tim Ellison
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
 
Application Development for IBM Connections with IBM Bluemix
Application Development  for IBM Connections with IBM BluemixApplication Development  for IBM Connections with IBM Bluemix
Application Development for IBM Connections with IBM Bluemix
 
Application Development for IBM Connections with IBM Bluemix
Application Development  for IBM Connections with IBM BluemixApplication Development  for IBM Connections with IBM Bluemix
Application Development for IBM Connections with IBM Bluemix
 
IBM Lotusphere 2013 AD109: Using the IBM® Sametime® Proxy SDK: WebSphere Port...
IBM Lotusphere 2013 AD109: Using the IBM® Sametime® Proxy SDK: WebSphere Port...IBM Lotusphere 2013 AD109: Using the IBM® Sametime® Proxy SDK: WebSphere Port...
IBM Lotusphere 2013 AD109: Using the IBM® Sametime® Proxy SDK: WebSphere Port...
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
 
Mobility 301 : Protect
Mobility 301 : ProtectMobility 301 : Protect
Mobility 301 : Protect
 

Recently uploaded

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 

Recently uploaded (20)

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 

cases for IBM xgs5000 (5.0) demo

  • 1. © 2013 IBM Corporation IBM Security Systems IBM Next Generation IPS (XGS5000) demo
  • 2. © 2013 IBM Corporation IBM Security Systems XGS5000 demo setup Hacker InternetInternet Server User Desktop XGS5000
  • 3. © 2013 IBM Corporation IBM Security Systems XGS5000 demo setup – firmware, xpu, url & web db
  • 4. © 2013 IBM Corporation IBM Security Systems XGS5000 demo setup – inline blocking
  • 5. © 2013 IBM Corporation IBM Security Systems XGS5000 demo setup – leverage on X-Force default signature & blocking
  • 6. © 2013 IBM Corporation IBM Security Systems XGS5000 demo setup – fixpacks
  • 7. © 2013 IBM Corporation IBM Security Systems Test cases 1. Blocking Web Application attacks 2. Blocking malicious files 3. Application control • Blocking uploads 4. URL control 5. Enforcing user authentication 6. Identifying applications and users • Application that takes up the most bandwidth • Top users of a specific application • Breakdown of network and application traffic for a specific user • Breakdown of Web traffic category
  • 8. © 2013 IBM Corporation IBM Security Systems IBM X-Force detailed information on web applications, URLs
  • 9. © 2013 IBM Corporation IBM Security Systems Blocking Web Application attacks – vulnerable web server
  • 10. © 2013 IBM Corporation IBM Security Systems Blocking Web Application attacks – attempting XSS injection attack
  • 11. © 2013 IBM Corporation IBM Security Systems Blocking Web Application attacks – page cannot load
  • 12. © 2013 IBM Corporation IBM Security Systems Blocking Web Application attacks – XGS blocks attack
  • 13. © 2013 IBM Corporation IBM Security Systems Blocking Web Application attacks – XGS blocks attack
  • 14. © 2013 IBM Corporation IBM Security Systems Blocking malicious files – attempt to download file from server
  • 15. © 2013 IBM Corporation IBM Security Systems Blocking malicious files – download disrupted
  • 16. © 2013 IBM Corporation IBM Security Systems Blocking malicious files – XGS blocks malicious file download
  • 17. © 2013 IBM Corporation IBM Security Systems Blocking malicious files – XGS blocks malicious file download
  • 18. © 2013 IBM Corporation IBM Security Systems Blocking uploads
  • 19. © 2013 IBM Corporation IBM Security Systems Blocking uploads – create new rule
  • 20. © 2013 IBM Corporation IBM Security Systems Blocking uploads – create web application object
  • 21. © 2013 IBM Corporation IBM Security Systems Blocking uploads – control uploading of data
  • 22. © 2013 IBM Corporation IBM Security Systems Blocking uploads – deploy changes
  • 23. © 2013 IBM Corporation IBM Security Systems Blocking uploads – add web application object to the rule
  • 24. © 2013 IBM Corporation IBM Security Systems Blocking uploads – policy deployed
  • 25. © 2013 IBM Corporation IBM Security Systems Blocking uploads – user logs in to email
  • 26. © 2013 IBM Corporation IBM Security Systems Blocking uploads – user compose email
  • 27. © 2013 IBM Corporation IBM Security Systems Blocking uploads – user attempt to upload file as attachment in the email
  • 28. © 2013 IBM Corporation IBM Security Systems Blocking uploads - uploading
  • 29. © 2013 IBM Corporation IBM Security Systems Blocking uploads – upload fail
  • 30. © 2013 IBM Corporation IBM Security Systems Blocking uploads – XGS blocks upload via email
  • 31. © 2013 IBM Corporation IBM Security Systems Blocking uploads – XGS blocks upload via email
  • 32. © 2013 IBM Corporation IBM Security Systems Blocking uploads – XGS blocks upload via email
  • 33. © 2013 IBM Corporation IBM Security Systems URL control – create a new rule
  • 34. © 2013 IBM Corporation IBM Security Systems URL control – deploy changes
  • 35. © 2013 IBM Corporation IBM Security Systems URL control – create new URL list
  • 36. © 2013 IBM Corporation IBM Security Systems URL control – add URL to block in the list
  • 37. © 2013 IBM Corporation IBM Security Systems URL control – deploy changes
  • 38. © 2013 IBM Corporation IBM Security Systems URL control – URL list to rule
  • 39. © 2013 IBM Corporation IBM Security Systems URL control – deploy changes
  • 40. © 2013 IBM Corporation IBM Security Systems URL control – user attempt to access URL
  • 41. © 2013 IBM Corporation IBM Security Systems URL control – user redirected to XGS
  • 42. © 2013 IBM Corporation IBM Security Systems URL control – user redirected to XGS
  • 43. © 2013 IBM Corporation IBM Security Systems URL control – XGS display warning message, URL has been blocked
  • 44. © 2013 IBM Corporation IBM Security Systems URL control – XGS blocks URL
  • 45. © 2013 IBM Corporation IBM Security Systems URL control – XGS blocks URL
  • 46. © 2013 IBM Corporation IBM Security Systems URL control – XGS blocks URL
  • 47. © 2013 IBM Corporation IBM Security Systems URL control – access to other URL in the same domain is allowed
  • 48. © 2013 IBM Corporation IBM Security Systems Enforcing user authentication – create group and user objects
  • 49. © 2013 IBM Corporation IBM Security Systems Enforcing user authentication – create group and user objects
  • 50. © 2013 IBM Corporation IBM Security Systems Enforcing user authentication – create group
  • 51. © 2013 IBM Corporation IBM Security Systems Enforcing user authentication – create group and user objects
  • 52. © 2013 IBM Corporation IBM Security Systems Enforcing user authentication – user object
  • 53. © 2013 IBM Corporation IBM Security Systems Enforcing user authentication – user object
  • 54. © 2013 IBM Corporation IBM Security Systems Enforcing user authentication – specify group membership
  • 55. © 2013 IBM Corporation IBM Security Systems Enforcing user authentication – specify group membership
  • 56. © 2013 IBM Corporation IBM Security Systems Enforcing user authentication – specify group membership
  • 57. © 2013 IBM Corporation IBM Security Systems Enforcing user authentication – object created
  • 58. © 2013 IBM Corporation IBM Security Systems Enforcing user authentication – create rule, source = unauthenticated users
  • 59. © 2013 IBM Corporation IBM Security Systems Enforcing user authentication – deploy changes
  • 60. © 2013 IBM Corporation IBM Security Systems Enforcing user authentication – create web application object
  • 61. © 2013 IBM Corporation IBM Security Systems Enforcing user authentication – specify granular control for YouTube
  • 62. © 2013 IBM Corporation IBM Security Systems Enforcing user authentication – deploy changes
  • 63. © 2013 IBM Corporation IBM Security Systems Enforcing user authentication – add object to rule
  • 64. © 2013 IBM Corporation IBM Security Systems Enforcing user authentication – deploy changes
  • 65. © 2013 IBM Corporation IBM Security Systems Enforcing user authentication – set action to Authenticate
  • 66. © 2013 IBM Corporation IBM Security Systems Enforcing user authentication – deploy changes
  • 67. © 2013 IBM Corporation IBM Security Systems Enforcing user authentication – user attempt to access youtube
  • 68. © 2013 IBM Corporation IBM Security Systems Enforcing user authentication – user attempt to load a video on YouTube
  • 69. © 2013 IBM Corporation IBM Security Systems Enforcing user authentication – user redirected to authentication page
  • 70. © 2013 IBM Corporation IBM Security Systems Enforcing user authentication – user fills in credentials
  • 71. © 2013 IBM Corporation IBM Security Systems Enforcing user authentication – user redirected to YouTube video
  • 72. © 2013 IBM Corporation IBM Security Systems Application that takes up the most bandwidth
  • 73. © 2013 IBM Corporation IBM Security Systems Application that takes up the most bandwidth
  • 74. © 2013 IBM Corporation IBM Security Systems Application that takes up the most bandwidth
  • 75. © 2013 IBM Corporation IBM Security Systems Top users of a specific application
  • 76. © 2013 IBM Corporation IBM Security Systems Top users of a specific application
  • 77. © 2013 IBM Corporation IBM Security Systems Top users of a specific application
  • 78. © 2013 IBM Corporation IBM Security Systems Breakdown of network and application traffic for a specific user
  • 79. © 2013 IBM Corporation IBM Security Systems Breakdown of network and application traffic for a specific user
  • 80. © 2013 IBM Corporation IBM Security Systems Breakdown of network and application traffic for a specific user
  • 81. © 2013 IBM Corporation IBM Security Systems Breakdown of Web traffic category
  • 82. © 2013 IBM Corporation IBM Security Systems Breakdown of Web traffic category
  • 83. © 2013 IBM Corporation IBM Security Systems Breakdown of Web traffic category
  • 84. © 2013 IBM Corporation IBM Security Systems ibm.com/security © Copyright IBM Corporation 2013. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.