QFlow and VFlow slides
2 IBM Security
 Layer 7 traffic capture and analysis
for deep application insight
 Network, application and user
activity monitoring
 Full integration with QRadar SIEM
and QRadar Risk Manager
QRadar QFlow and QRadar VFlow Overview
QRadar QFlow monitors traffic in physical
environments and QRadar VFlow in virtual / cloud
environments to provide advanced flow collection and
analysis for Layer 7 visibility, via deep packet
inspection and stateful application classification
Key Capabilities Benefits
 Reduce the risk and severity of
security breaches
 Ensure regulatory and internal
policy compliance
 Perform more complete and
accurate forensic investigations
Network and Application Visibility
 Layer 7 application monitoring
 Content capture
Network and Application Visibility
 Layer 7 application monitoring
 Content capture
Network and Application Visibility
 Layer 7 application monitoring
 Content capture
Network and Application Visibility
 Layer 7 application monitoring
 Content capture
3 IBM Security
QRadar QFlow & VFlow: Application Layer visibility and content awareness
• Provides Layer 7 visibility and stateful
classification of applications and protocols
• Uses Deep Packet Inspection (DPI)
technology to sample payload content and
identify malicious transfers
• Passive activity monitoring helps identify
and automatically configure new hosts,
assets and services within QRadar SIEM
Core Features
 VFlow delivers application layer visibility
of all virtual network traffic
 Runs as virtual host software on the
virtual server, not requiring additional
hardware
 Analyzes port mirrored traffic for a
physical network switch bridging gap
between physical and virtual realm
4 IBM Security
 Network traffic doesn’t lie. Attackers can stop logging and
erase their tracks, but can’t cut off the network (flow data)
• Deep packet inspection for Layer 7 flow data
• Pivoting, drill-down and data mining on flow sources for advanced
detection and forensics
 Helps detect anomalies that might otherwise get missed
 Enables visibility into attacker communications
Differentiated by network flow analytics
5 IBM Security
 Helps detect zero-day attacks that have no signature
 Enables policy monitoring and rogue server identification
 Provides visibility into all attacker communications
 Uses passive monitoring to build asset profiles and classify hosts
 Improves network visibility and helps resolve traffic problems
Flows provide context for true network intelligence
© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products
and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service
marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your
enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.
No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,
products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products
or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
FOLLOW US ON:
THANK YOU

IBM Security QFlow & Vflow

  • 1.
  • 2.
    2 IBM Security Layer 7 traffic capture and analysis for deep application insight  Network, application and user activity monitoring  Full integration with QRadar SIEM and QRadar Risk Manager QRadar QFlow and QRadar VFlow Overview QRadar QFlow monitors traffic in physical environments and QRadar VFlow in virtual / cloud environments to provide advanced flow collection and analysis for Layer 7 visibility, via deep packet inspection and stateful application classification Key Capabilities Benefits  Reduce the risk and severity of security breaches  Ensure regulatory and internal policy compliance  Perform more complete and accurate forensic investigations Network and Application Visibility  Layer 7 application monitoring  Content capture Network and Application Visibility  Layer 7 application monitoring  Content capture Network and Application Visibility  Layer 7 application monitoring  Content capture Network and Application Visibility  Layer 7 application monitoring  Content capture
  • 3.
    3 IBM Security QRadarQFlow & VFlow: Application Layer visibility and content awareness • Provides Layer 7 visibility and stateful classification of applications and protocols • Uses Deep Packet Inspection (DPI) technology to sample payload content and identify malicious transfers • Passive activity monitoring helps identify and automatically configure new hosts, assets and services within QRadar SIEM Core Features  VFlow delivers application layer visibility of all virtual network traffic  Runs as virtual host software on the virtual server, not requiring additional hardware  Analyzes port mirrored traffic for a physical network switch bridging gap between physical and virtual realm
  • 4.
    4 IBM Security Network traffic doesn’t lie. Attackers can stop logging and erase their tracks, but can’t cut off the network (flow data) • Deep packet inspection for Layer 7 flow data • Pivoting, drill-down and data mining on flow sources for advanced detection and forensics  Helps detect anomalies that might otherwise get missed  Enables visibility into attacker communications Differentiated by network flow analytics
  • 5.
    5 IBM Security Helps detect zero-day attacks that have no signature  Enables policy monitoring and rogue server identification  Provides visibility into all attacker communications  Uses passive monitoring to build asset profiles and classify hosts  Improves network visibility and helps resolve traffic problems Flows provide context for true network intelligence
  • 6.
    © Copyright IBMCorporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions FOLLOW US ON: THANK YOU