© 2013 IBM Corporation
IBM Security Systems
IBM Next Generation IPS (XGS5000) demo
© 2013 IBM Corporation
IBM Security Systems
XGS5000 demo setup
Hacker
InternetInternet
Server
User
Desktop
XGS5000
© 2013 IBM Corporation
IBM Security Systems
XGS5000 demo setup – firmware, xpu, url & web db
© 2013 IBM Corporation
IBM Security Systems
XGS5000 demo setup – inline blocking
© 2013 IBM Corporation
IBM Security Systems
XGS5000 demo setup – leverage on X-Force default signature & blocking
© 2013 IBM Corporation
IBM Security Systems
XGS5000 demo setup – fixpacks
© 2013 IBM Corporation
IBM Security Systems
Test cases
1. Blocking Web Application attacks
2. Blocking malicious files
3. Application control
• Blocking uploads
4. URL control
5. Enforcing user authentication
6. Identifying applications and users
• Application that takes up the most bandwidth
• Top users of a specific application
• Breakdown of network and application traffic for a specific user
• Breakdown of Web traffic category
© 2013 IBM Corporation
IBM Security Systems
IBM X-Force detailed information on web applications, URLs
© 2013 IBM Corporation
IBM Security Systems
Blocking Web Application attacks – vulnerable web server
© 2013 IBM Corporation
IBM Security Systems
Blocking Web Application attacks – attempting XSS injection attack
© 2013 IBM Corporation
IBM Security Systems
Blocking Web Application attacks – page cannot load
© 2013 IBM Corporation
IBM Security Systems
Blocking Web Application attacks – XGS blocks attack
© 2013 IBM Corporation
IBM Security Systems
Blocking Web Application attacks – XGS blocks attack
© 2013 IBM Corporation
IBM Security Systems
Blocking malicious files – attempt to download file from server
© 2013 IBM Corporation
IBM Security Systems
Blocking malicious files – download disrupted
© 2013 IBM Corporation
IBM Security Systems
Blocking malicious files – XGS blocks malicious file download
© 2013 IBM Corporation
IBM Security Systems
Blocking malicious files – XGS blocks malicious file download
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – create new rule
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – create web application object
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – control uploading of data
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – deploy changes
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – add web application object to the rule
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – policy deployed
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – user logs in to email
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – user compose email
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – user attempt to upload file as attachment in the email
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads - uploading
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – upload fail
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – XGS blocks upload via email
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – XGS blocks upload via email
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – XGS blocks upload via email
© 2013 IBM Corporation
IBM Security Systems
URL control – create a new rule
© 2013 IBM Corporation
IBM Security Systems
URL control – deploy changes
© 2013 IBM Corporation
IBM Security Systems
URL control – create new URL list
© 2013 IBM Corporation
IBM Security Systems
URL control – add URL to block in the list
© 2013 IBM Corporation
IBM Security Systems
URL control – deploy changes
© 2013 IBM Corporation
IBM Security Systems
URL control – URL list to rule
© 2013 IBM Corporation
IBM Security Systems
URL control – deploy changes
© 2013 IBM Corporation
IBM Security Systems
URL control – user attempt to access URL
© 2013 IBM Corporation
IBM Security Systems
URL control – user redirected to XGS
© 2013 IBM Corporation
IBM Security Systems
URL control – user redirected to XGS
© 2013 IBM Corporation
IBM Security Systems
URL control – XGS display warning message, URL has been blocked
© 2013 IBM Corporation
IBM Security Systems
URL control – XGS blocks URL
© 2013 IBM Corporation
IBM Security Systems
URL control – XGS blocks URL
© 2013 IBM Corporation
IBM Security Systems
URL control – XGS blocks URL
© 2013 IBM Corporation
IBM Security Systems
URL control – access to other URL in the same domain is allowed
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – create group and user objects
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – create group and user objects
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – create group
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – create group and user objects
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – user object
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – user object
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – specify group membership
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – specify group membership
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – specify group membership
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – object created
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – create rule, source = unauthenticated users
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – deploy changes
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – create web application object
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – specify granular control for YouTube
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – deploy changes
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – add object to rule
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – deploy changes
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – set action to Authenticate
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – deploy changes
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – user attempt to access youtube
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – user attempt to load a video on YouTube
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – user redirected to authentication page
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – user fills in credentials
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – user redirected to YouTube video
© 2013 IBM Corporation
IBM Security Systems
Application that takes up the most bandwidth
© 2013 IBM Corporation
IBM Security Systems
Application that takes up the most bandwidth
© 2013 IBM Corporation
IBM Security Systems
Application that takes up the most bandwidth
© 2013 IBM Corporation
IBM Security Systems
Top users of a specific application
© 2013 IBM Corporation
IBM Security Systems
Top users of a specific application
© 2013 IBM Corporation
IBM Security Systems
Top users of a specific application
© 2013 IBM Corporation
IBM Security Systems
Breakdown of network and application traffic for a specific user
© 2013 IBM Corporation
IBM Security Systems
Breakdown of network and application traffic for a specific user
© 2013 IBM Corporation
IBM Security Systems
Breakdown of network and application traffic for a specific user
© 2013 IBM Corporation
IBM Security Systems
Breakdown of Web traffic category
© 2013 IBM Corporation
IBM Security Systems
Breakdown of Web traffic category
© 2013 IBM Corporation
IBM Security Systems
Breakdown of Web traffic category
© 2013 IBM Corporation
IBM Security Systems
ibm.com/security
© Copyright IBM Corporation 2013. All rights reserved. The information contained in these materials is provided for informational purposes
only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use
of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any
warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement
governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in
all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole
discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any
way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United
States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response
to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated
or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure
and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to
be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems,
products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE
MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

cases for IBM xgs5000 (5.0) demo

  • 1.
    © 2013 IBMCorporation IBM Security Systems IBM Next Generation IPS (XGS5000) demo
  • 2.
    © 2013 IBMCorporation IBM Security Systems XGS5000 demo setup Hacker InternetInternet Server User Desktop XGS5000
  • 3.
    © 2013 IBMCorporation IBM Security Systems XGS5000 demo setup – firmware, xpu, url & web db
  • 4.
    © 2013 IBMCorporation IBM Security Systems XGS5000 demo setup – inline blocking
  • 5.
    © 2013 IBMCorporation IBM Security Systems XGS5000 demo setup – leverage on X-Force default signature & blocking
  • 6.
    © 2013 IBMCorporation IBM Security Systems XGS5000 demo setup – fixpacks
  • 7.
    © 2013 IBMCorporation IBM Security Systems Test cases 1. Blocking Web Application attacks 2. Blocking malicious files 3. Application control • Blocking uploads 4. URL control 5. Enforcing user authentication 6. Identifying applications and users • Application that takes up the most bandwidth • Top users of a specific application • Breakdown of network and application traffic for a specific user • Breakdown of Web traffic category
  • 8.
    © 2013 IBMCorporation IBM Security Systems IBM X-Force detailed information on web applications, URLs
  • 9.
    © 2013 IBMCorporation IBM Security Systems Blocking Web Application attacks – vulnerable web server
  • 10.
    © 2013 IBMCorporation IBM Security Systems Blocking Web Application attacks – attempting XSS injection attack
  • 11.
    © 2013 IBMCorporation IBM Security Systems Blocking Web Application attacks – page cannot load
  • 12.
    © 2013 IBMCorporation IBM Security Systems Blocking Web Application attacks – XGS blocks attack
  • 13.
    © 2013 IBMCorporation IBM Security Systems Blocking Web Application attacks – XGS blocks attack
  • 14.
    © 2013 IBMCorporation IBM Security Systems Blocking malicious files – attempt to download file from server
  • 15.
    © 2013 IBMCorporation IBM Security Systems Blocking malicious files – download disrupted
  • 16.
    © 2013 IBMCorporation IBM Security Systems Blocking malicious files – XGS blocks malicious file download
  • 17.
    © 2013 IBMCorporation IBM Security Systems Blocking malicious files – XGS blocks malicious file download
  • 18.
    © 2013 IBMCorporation IBM Security Systems Blocking uploads
  • 19.
    © 2013 IBMCorporation IBM Security Systems Blocking uploads – create new rule
  • 20.
    © 2013 IBMCorporation IBM Security Systems Blocking uploads – create web application object
  • 21.
    © 2013 IBMCorporation IBM Security Systems Blocking uploads – control uploading of data
  • 22.
    © 2013 IBMCorporation IBM Security Systems Blocking uploads – deploy changes
  • 23.
    © 2013 IBMCorporation IBM Security Systems Blocking uploads – add web application object to the rule
  • 24.
    © 2013 IBMCorporation IBM Security Systems Blocking uploads – policy deployed
  • 25.
    © 2013 IBMCorporation IBM Security Systems Blocking uploads – user logs in to email
  • 26.
    © 2013 IBMCorporation IBM Security Systems Blocking uploads – user compose email
  • 27.
    © 2013 IBMCorporation IBM Security Systems Blocking uploads – user attempt to upload file as attachment in the email
  • 28.
    © 2013 IBMCorporation IBM Security Systems Blocking uploads - uploading
  • 29.
    © 2013 IBMCorporation IBM Security Systems Blocking uploads – upload fail
  • 30.
    © 2013 IBMCorporation IBM Security Systems Blocking uploads – XGS blocks upload via email
  • 31.
    © 2013 IBMCorporation IBM Security Systems Blocking uploads – XGS blocks upload via email
  • 32.
    © 2013 IBMCorporation IBM Security Systems Blocking uploads – XGS blocks upload via email
  • 33.
    © 2013 IBMCorporation IBM Security Systems URL control – create a new rule
  • 34.
    © 2013 IBMCorporation IBM Security Systems URL control – deploy changes
  • 35.
    © 2013 IBMCorporation IBM Security Systems URL control – create new URL list
  • 36.
    © 2013 IBMCorporation IBM Security Systems URL control – add URL to block in the list
  • 37.
    © 2013 IBMCorporation IBM Security Systems URL control – deploy changes
  • 38.
    © 2013 IBMCorporation IBM Security Systems URL control – URL list to rule
  • 39.
    © 2013 IBMCorporation IBM Security Systems URL control – deploy changes
  • 40.
    © 2013 IBMCorporation IBM Security Systems URL control – user attempt to access URL
  • 41.
    © 2013 IBMCorporation IBM Security Systems URL control – user redirected to XGS
  • 42.
    © 2013 IBMCorporation IBM Security Systems URL control – user redirected to XGS
  • 43.
    © 2013 IBMCorporation IBM Security Systems URL control – XGS display warning message, URL has been blocked
  • 44.
    © 2013 IBMCorporation IBM Security Systems URL control – XGS blocks URL
  • 45.
    © 2013 IBMCorporation IBM Security Systems URL control – XGS blocks URL
  • 46.
    © 2013 IBMCorporation IBM Security Systems URL control – XGS blocks URL
  • 47.
    © 2013 IBMCorporation IBM Security Systems URL control – access to other URL in the same domain is allowed
  • 48.
    © 2013 IBMCorporation IBM Security Systems Enforcing user authentication – create group and user objects
  • 49.
    © 2013 IBMCorporation IBM Security Systems Enforcing user authentication – create group and user objects
  • 50.
    © 2013 IBMCorporation IBM Security Systems Enforcing user authentication – create group
  • 51.
    © 2013 IBMCorporation IBM Security Systems Enforcing user authentication – create group and user objects
  • 52.
    © 2013 IBMCorporation IBM Security Systems Enforcing user authentication – user object
  • 53.
    © 2013 IBMCorporation IBM Security Systems Enforcing user authentication – user object
  • 54.
    © 2013 IBMCorporation IBM Security Systems Enforcing user authentication – specify group membership
  • 55.
    © 2013 IBMCorporation IBM Security Systems Enforcing user authentication – specify group membership
  • 56.
    © 2013 IBMCorporation IBM Security Systems Enforcing user authentication – specify group membership
  • 57.
    © 2013 IBMCorporation IBM Security Systems Enforcing user authentication – object created
  • 58.
    © 2013 IBMCorporation IBM Security Systems Enforcing user authentication – create rule, source = unauthenticated users
  • 59.
    © 2013 IBMCorporation IBM Security Systems Enforcing user authentication – deploy changes
  • 60.
    © 2013 IBMCorporation IBM Security Systems Enforcing user authentication – create web application object
  • 61.
    © 2013 IBMCorporation IBM Security Systems Enforcing user authentication – specify granular control for YouTube
  • 62.
    © 2013 IBMCorporation IBM Security Systems Enforcing user authentication – deploy changes
  • 63.
    © 2013 IBMCorporation IBM Security Systems Enforcing user authentication – add object to rule
  • 64.
    © 2013 IBMCorporation IBM Security Systems Enforcing user authentication – deploy changes
  • 65.
    © 2013 IBMCorporation IBM Security Systems Enforcing user authentication – set action to Authenticate
  • 66.
    © 2013 IBMCorporation IBM Security Systems Enforcing user authentication – deploy changes
  • 67.
    © 2013 IBMCorporation IBM Security Systems Enforcing user authentication – user attempt to access youtube
  • 68.
    © 2013 IBMCorporation IBM Security Systems Enforcing user authentication – user attempt to load a video on YouTube
  • 69.
    © 2013 IBMCorporation IBM Security Systems Enforcing user authentication – user redirected to authentication page
  • 70.
    © 2013 IBMCorporation IBM Security Systems Enforcing user authentication – user fills in credentials
  • 71.
    © 2013 IBMCorporation IBM Security Systems Enforcing user authentication – user redirected to YouTube video
  • 72.
    © 2013 IBMCorporation IBM Security Systems Application that takes up the most bandwidth
  • 73.
    © 2013 IBMCorporation IBM Security Systems Application that takes up the most bandwidth
  • 74.
    © 2013 IBMCorporation IBM Security Systems Application that takes up the most bandwidth
  • 75.
    © 2013 IBMCorporation IBM Security Systems Top users of a specific application
  • 76.
    © 2013 IBMCorporation IBM Security Systems Top users of a specific application
  • 77.
    © 2013 IBMCorporation IBM Security Systems Top users of a specific application
  • 78.
    © 2013 IBMCorporation IBM Security Systems Breakdown of network and application traffic for a specific user
  • 79.
    © 2013 IBMCorporation IBM Security Systems Breakdown of network and application traffic for a specific user
  • 80.
    © 2013 IBMCorporation IBM Security Systems Breakdown of network and application traffic for a specific user
  • 81.
    © 2013 IBMCorporation IBM Security Systems Breakdown of Web traffic category
  • 82.
    © 2013 IBMCorporation IBM Security Systems Breakdown of Web traffic category
  • 83.
    © 2013 IBMCorporation IBM Security Systems Breakdown of Web traffic category
  • 84.
    © 2013 IBMCorporation IBM Security Systems ibm.com/security © Copyright IBM Corporation 2013. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.