Vous êtes sur la page 1sur 1

IBM Security Systems Product Set

Full Product Name

Category

Short name/abbrev.

March 2014

Description in 10 words or less

IBM Security QRadar Log Manager (SW, HW, VA)

QRadar LM, Log Manager

Turn-key log management, SMB to enterprise (upgradeable to SIEM)

IBM Security QRadar Network Anomaly Detection (HW)

QNAD

Adds flow/vulnerability behavioral analytics. Can feed into SiteProtector.

QFlow

Layer 7 application monitoring of physical network traffic (includes VFlow)

QRM, Risk Manager

Predictive threat modeling and simulation

IBM Security QRadar SIEM (SW, HW, VA)

QRadar SIEM, SIEM

Integrated log, threat, risk and compliance management

IBM Security QRadar Vulnerability Manager (SW, HW, VA)

QVM

Intelligent scanning - identifies and prioritizes vulnerabilities integrates for prioritization insights

IBM Security Trusteer Rapport (SW,


)
IBM Security Trusteer Pinpoint ATO (Account Takeover)

Rapport
Pinpoint ATO

Client-based endpoint detection, mitigation/remediation against financial malware/ phishing attacks


Conclusive detection of account takeover attempts and tagging criminal devices

Pinpoint Malware Detection

Real-time detection of Man-in-the-Browser malware infected devices

Security
Intelligence

IBM Security QRadar QFlow Collector (SW, HW, VA)


IBM Security QRadar Risk Manager (SW, HW, VA)

IBM Security Trusteer Pinpoint Malware Detection


IBM Security Trusteer Mobile Risk Engine
IBM Security Trusteer Mobile Out-of-Band Authentication1 (SW,
IBM Security Trusteer Mobile SDK (SW,

IBM Security Trusteer Mobile App (Secure Browser) (SW,


IBM Security Trusteer Apex (SW,

Advanced
Fraud
Protection

IBM Security Access Manager for Enterprise Single Sign-On (SW, VA)
IBM Security Access Manager for Web (SW, HW, VA,
P)
IBM Security Access Manager for Mobile (HW, VA,

P)

Mobile Risk Engine

Detects mobile and high risk mobile devices

Mobile OOB Authentication

Out-of-band secure transaction and login authorization

Mobile SDK

Android/iOS library for native mobile apps detect compromised/vulnerable devices

Mobile App

Secure mobile browser for safe web access

Apex

Protects employees from advanced malware - stops 0-day exploits / data exfiltration

SAM ESSO
Access Manager, SAM for Web

SSO, password management, session management, compliance and user productivity gains
Web SSO, authentication, authorization and web application firewall

SAM for Mobile

Next generation mobile access management

FIM

Web and Federated SSO, authentication and authorization with risk-based access

IBM Tivoli Federated Identity Manager Business Gateway (SW)

FIM BG

Federated SSO, risk-based access and built-in one-time password

IBM Security Identity and Access Assurance (SW, VA ESSO)


IBM Security Identity and Access Manager (SW)

IAA or SIAA

Bundled offering of FIM, ISAM ESSO, ISIM, QRadar Log Manager

SIAM

PID for the packaging of ISAM for Web and ISIM

Identity Manager or SIM

Creates, modifies and terminates user privileges throughout user s lifecycles.

PIM

Keeps admin (privileged user) ID usage tracked and under control

IBM Security Web Gateway AMP 5100 Appliance (HW)

Web Gateway (Appliance)

Access Manager for Web offered on an appliance form factor

IBM Security zSecure suite2 (SW)

zSecure suite

Solution to improve administration, audit, and compliance for System z

IBM Security Directory Integrator (SW)

SDI

Real-time, event-driven, general-purpose data integration environment

IBM Security Directory Server (SW)

SDS

LDAP-standard directory multiple applications share common (often user) data

IBM Tivoli Security Policy Manager (SW)

TSPM

Enterprise management of fine-grained authorization for numerous application environments

IBM InfoSphere Guardium family2 (SW, HW, VA)


IBM Security Key Lifecycle Manager (SW)

Guardium
SKLM

Real time data activity monitoring, masking, encryption and vulnerability assessment
Enterprise management of encryption keys (key server on distributed platforms)

IBM Security Key Lifecycle Manager for z/OS (SW)

SKLM for z/OS

Enterprise management of encryption keys (key server on mainframe)

IBM Security AppScan Enterprise (SW)


IBM Security AppScan Source (SW)
IBM Security AppScan Standard (SW)

AppScan Enterprise
AppScan Source

Enterprise dynamic (unattended, parallel) app scanning and reporting


Static testing of application source code for vulnerabilities

AppScan Standard

Dynamic testing of running web applications for vulnerabilities

MaaS360
Content Analysis SDK

Enterprise mobility platform delivering security/management for applications/documents/email/devices


SDK offering access to IBMs web page, image, email filters

IBM Tivoli Federated Identity Manager (SW,

IBM Security Identity Manager (SW,

P)

P)

IBM Security Privileged Identity Manager (SW)

Identity and
Access
Management
(People)

Data Security
Application
Security

Fiberlink MaaS360
IBM Security Content Analysis Software Development Kit (SW)
IBM Security Host Protection family2 (SW)
IBM Security Network Intrusion Prevention System (HW)
IBM Security Network Protection (HW)
IBM Security SiteProtector System (HW, SW)
IBM Security Virtual Server Protection for VMware (SW)

Infrastructure
Security
(Network,
Server and
Endpoint)

Host Protection

Threat mitigation, data security and compliance across Windows, Linux, UNIX

Network IPS or NIPS

Analyzes network protocols/traffic to detect attacks includes virtual patch

Network Protection (XGS 5000)

Full protocol, content and application-aware protection

SiteProtector

Admin tool for IBM Threat Protection - command, control, correlation, reporting

VSP for VMware

Threat protection for VMware includes VM discovery and rootkit detection

IBM Endpoint Manager for Core Protection (SW)

EM-CP

Protects physical and virtual endpoints from malware and data loss

IBM Endpoint Manager for Security and Compliance (SW)

EM-SC

Provides real-time visibility, enforcement and continuous compliance for all endpoints

Means of delivery indicated: Software (SW), hardware appliance (HW), virtual appliance (VA), via the Cloud (

) and/or Cloud Partner (

P)

1
2

Packaged with Trusteer Mobile App


Multiple products

Vous aimerez peut-être aussi