IBM Security Products

2
IBM Security Product Set October 2015 Full Product Name Category Short name/abbreviation Description in roughly 10 words or less IBM Cloud Security Enforcer Cloud CSE Expands secure cloud app adoption, addressing shadow IT. Delivers SSO/policy enforcement. IBM Security QRadar Incident Forensics (SW, HW, VA) Security Intelligence QRIF Reduce time to investigate incidents, and remediate more thoroughly IBM Security QRadar Log Manager (SW, HW, VA, ) QRadar LM, Log Manager Turn-key log management, SMB to enterprise (upgradeable to SIEM) IBM Security QRadar QFlow Collector (SW, HW, VA) QFlow Layer 7 application monitoring of physical network traffic (includes VFlow) IBM Security QRadar Risk Manager (SW, HW, VA) QRM, Risk Manager Predictive threat modeling and simulation IBM Security QRadar SIEM (SW, HW, VA, ) QRadar SIEM, SIEM Integrated log, threat, risk and compliance management IBM Security QRadar Vulnerability Manager (SW, HW, VA) QVM Intelligent scanning - identifies and prioritizes vulnerabilities – integrates for prioritization insights IBM Security Trusteer Rapport (SW, ) Advanced Fraud Protection Rapport Client-based endpoint detection, mitigation/remediation against financial malware/ phishing attacks IBM Security Trusteer Pinpoint Malware Detection Advanced Edition Pinpoint Malware Detection Real-time detection of Man-in-the-Browser malware infected devices IBM Security Trusteer Pinpoint Criminal Detection Pinpoint Criminal Detection Provides conclusive detection of criminals and account takeover attempts IBM Security Trusteer Mobile Risk Engine Mobile Risk Engine Detects mobile and high risk mobile devices IBM Security Trusteer Mobile SDK (SW, ) Mobile SDK Android/iOS library for native mobile apps detect compromised/vulnerable devices IBM Security Trusteer Mobile Browser (SW, ) Mobile App Secure mobile browser for safe web access IBM Security Access Manager for ESSO (SW, VA, , ) Identity and Access Management (People) SAM ESSO SSO, password management, session management, compliance and user productivity gains IBM Security Access Manager (HW, VA) SAM All-in-one access appliance for web, mobile and cloud IBM Security Access Manager for Web (SW, HW, VA, , ) Access Manager, SAM for Web Web SSO, authentication, authorization and web application firewall IBM Security Access Manager for DataPower (SW) SAM for DataPower Web access management software module for IBM DataPower Gateways IBM Security Access Manager for Mobile (HW, VA, , ) SAM for Mobile Next generation mobile access management IBM Tivoli Federated Identity Manager (SW, , ) FIM Web and Federated SSO, authentication and authorization with risk-based access IBM Tivoli Federated Identity Manager Business Gateway (SW) FIM BG Federated SSO, risk-based access and built-in one-time password IBM Security Identity and Access Assurance (SW, VA – ESSO) IAA or SIAA Bundled offering of FIM, ISAM ESSO, ISIM, QRadar Log Manager IBM Security Identity and Access Manager (SW) SIAM PID for the packaging of ISAM for Web and ISIM IBM Security Identity Governance 1 (SW, VA) SIG Govern access and evaluation regulatory compliance – bring IT and LoBs together IBM Security Identity Governance and Administration (SW, VA) SIGA SIG and SIM packaged together, for complete identity governance/management IBM Security Identity Manager (VA 2 , ) Identity Manager or SIM Creates, modifies and terminates user privileges throughout user s’ lifecycles. IBM Security Privileged Identity Manager (VA 2 , , ) PIM Keeps admin (privileged user) ID usage tracked and under control IBM Security Directory Integrator (SW) SDI Real-time, event-driven, general-purpose data integration environment IBM Security Directory Server (SW) SDS LDAP-standard directory – multiple applications share common (often user) data IBM Tivoli Security Policy Manager (SW) TSPM Enterprise management of fine-grained authorization for numerous application environments Means of delivery indicated: Software (SW), hardware appliance (HW), virtual appliance (VA) or SaaS ( ). Also indicated are SoftLayer/IaaS availability ( ) and/or Bluemix/PaaS availability ( ). 1 Formerly CrossIdeas. 2 Latest versions (SIM V7.0 and PIM 2.0) are VA only. Available as SW in prior releases. indicates a bundle.

Transcript of IBM Security Products

Page 1: IBM Security Products

IBM Security Product Set October 2015

Full Product Name Category Short name/abbreviation Description in roughly 10 words or less

IBM Cloud Security Enforcer Cloud CSE Expands secure cloud app adoption, addressing shadow IT. Delivers SSO/policy enforcement. IBM Security QRadar Incident Forensics (SW, HW, VA)

Security

Intelligence

QRIF Reduce time to investigate incidents, and remediate more thoroughly IBM Security QRadar Log Manager (SW, HW, VA, ) QRadar LM, Log Manager Turn-key log management, SMB to enterprise (upgradeable to SIEM) IBM Security QRadar QFlow Collector (SW, HW, VA) QFlow Layer 7 application monitoring of physical network traffic (includes VFlow) IBM Security QRadar Risk Manager (SW, HW, VA) QRM, Risk Manager Predictive threat modeling and simulation IBM Security QRadar SIEM (SW, HW, VA, ) QRadar SIEM, SIEM Integrated log, threat, risk and compliance management IBM Security QRadar Vulnerability Manager (SW, HW, VA) QVM Intelligent scanning - identifies and prioritizes vulnerabilities – integrates for prioritization insights IBM Security Trusteer Rapport (SW, )

Advanced Fraud

Protection

Rapport Client-based endpoint detection, mitigation/remediation against financial malware/ phishing attacksIBM Security Trusteer Pinpoint Malware Detection Advanced Edition Pinpoint Malware Detection Real-time detection of Man-in-the-Browser malware infected devices IBM Security Trusteer Pinpoint Criminal Detection Pinpoint Criminal Detection Provides conclusive detection of criminals and account takeover attempts IBM Security Trusteer Mobile Risk Engine Mobile Risk Engine Detects mobile and high risk mobile devices IBM Security Trusteer Mobile SDK (SW, ) Mobile SDK Android/iOS library for native mobile apps detect compromised/vulnerable devices IBM Security Trusteer Mobile Browser (SW, ) Mobile App Secure mobile browser for safe web access IBM Security Access Manager for ESSO (SW, VA, , )

Identity and Access

Management (People)

SAM ESSO SSO, password management, session management, compliance and user productivity gains IBM Security Access Manager (HW, VA) SAM All-in-one access appliance for web, mobile and cloud IBM Security Access Manager for Web (SW, HW, VA, , ) Access Manager, SAM for Web Web SSO, authentication, authorization and web application firewall IBM Security Access Manager for DataPower (SW) SAM for DataPower Web access management software module for IBM DataPower Gateways IBM Security Access Manager for Mobile (HW, VA, , ) SAM for Mobile Next generation mobile access management IBM Tivoli Federated Identity Manager (SW, , ) FIM Web and Federated SSO, authentication and authorization with risk-based access IBM Tivoli Federated Identity Manager Business Gateway (SW) FIM BG Federated SSO, risk-based access and built-in one-time password IBM Security Identity and Access Assurance (SW, VA – ESSO) IAA or SIAA Bundled offering of FIM, ISAM ESSO, ISIM, QRadar Log Manager IBM Security Identity and Access Manager (SW) SIAM PID for the packaging of ISAM for Web and ISIM IBM Security Identity Governance1 (SW, VA) SIG Govern access and evaluation regulatory compliance – bring IT and LoBs together IBM Security Identity Governance and Administration (SW, VA) SIGA SIG and SIM packaged together, for complete identity governance/management IBM Security Identity Manager (VA2, ) Identity Manager or SIM Creates, modifies and terminates user privileges throughout user s’ lifecycles. IBM Security Privileged Identity Manager (VA2, , ) PIM Keeps admin (privileged user) ID usage tracked and under control IBM Security Directory Integrator (SW) SDI Real-time, event-driven, general-purpose data integration environment IBM Security Directory Server (SW) SDS LDAP-standard directory – multiple applications share common (often user) data IBM Tivoli Security Policy Manager (SW) TSPM Enterprise management of fine-grained authorization for numerous application environments

Means of delivery indicated: Software (SW), hardware appliance (HW), virtual appliance (VA) or SaaS ( ). Also indicated are SoftLayer/IaaS availability ( ) and/or Bluemix/PaaS availability ( ).

1Formerly CrossIdeas. 2Latest versions (SIM V7.0 and PIM 2.0) are VA only. Available as SW in prior releases.

indicates a bundle.

Page 2: IBM Security Products

IBM Security Product Set October 2015

Full Product Name Category Short name/abbreviation Description in roughly 10 words or less

IBM Guardium DB Activity Monitor (SW, HW, VA)

Data Security

Guardium DAM Real time data activity monitoring with blocking/masking capabilities IBM Guardium Vulnerability Assessment (SW, HW, VA) Guardium VA Vulnerability assessment for databases IBM Guardium for Applications (SW, HW, VA) Guardium for Apps Dynamic web application data masking IBM Guardium Data Encryption (SW, HW, VA) Guardium Data Encryption DBMS encryption (Oracle, SQL Server, DB2, IMS, …) and file encryption IBM Guardium Data Redaction (SW, HW, VA) Guardium Data Redaction Protects sensitive data in documents and forms from unintentional disclosure IBM Security Key Lifecycle Manager (SW) SKLM Enterprise management of encryption keys (key server on distributed platforms) IBM Security Key Lifecycle Manager for z/OS (SW) SKLM for z/OS Enterprise management of encryption keys (key server on mainframe) IBM Security AppScan Enterprise (SW )

Application

Security

AppScan Enterprise Enterprise dynamic (unattended, parallel) app scanning and reporting IBM Security AppScan Source (SW ) AppScan Source Static testing of application source code for vulnerabilities IBM Security AppScan Standard (SW ) AppScan Standard Dynamic testing of running web applications for vulnerabilities IBM Security AppScan Mobile Analyzer AppScan Mobile Analyzer Identifies security vulnerabilities in mobile apps noIBM Security AppScan Dynamic Analyzer AppScan Dynamic Analyzer Secures web applications deployed on IBM Bluemix Arxan Application Protection for IBM Solutions (SW) Arxan Harden and build run-time protection into mobile applications Virtual Forge CodeProfiler for IBM Security AppScan Source (SW) Virtual Forge CodeProfiler Identify and remediate vulnerabilities in ABAP source code IBM MobileFirst Protect SaaS (MaaS360)

Infrastructure Security

(Network, Server and Endpoint)

MaaS360 SaaS Enterprise mobile platform - security/management for applications/documents/email/devices IBM MobileFirst Protect (MaaS360) (SW) MaaS360 on Premise Enterprise mobile platform - security/management for applications/documents/email/devices IBM Security Content Analysis Software Development Kit (SW) Content Analysis SDK SDK offering access to IBM’s web page, image, email filters IBM Security Network Intrusion Prevention System (HW) Network IPS or NIPS Analyzes network protocols/traffic to detect attacks – includes virtual patch IBM Security Network Protection (HW) Network Protection (XGS 5000) Full protocol, content and application-aware protection IBM Security SiteProtector System (HW, SW) SiteProtector Admin tool for IBM Threat Protection - command, control, correlation, reporting IBM BigFix Compliance (SW) BigFix Compliance Protect endpoints. Better meet security compliance. Reduce costs and enhance agility. IBM BigFix Protection (SW) BigFix Protection Near real-time protection from malware and other malicious threats. IBM BigFix Patch (SW) BigFix Patch Server management – lifecycle management; security and compliance and server automation IBM BigFix Inventory (SW) BigFix Inventory Software asset management - discover all licensed/unlicensed software for all devices IBM BigFix Lifecycle (SW) BigFix Lifecycle Find/fix endpoint problems - connected or not, fixed or mobile, virtual or physical. IBM Security Trusteer Apex Advanced Malware Protection (SW, ) Apex Protects employees’ from advanced malware - stops 0-day exploits / data exfiltration IBM Security zSecure Admin (SW) zSecure Admin Solution to improve administration, audit, and compliance for System z IBM Security zSecure Audit (SW) zSecure Audit Provides highly customizable reporting and analysis of audit records IBM Security zSecure Visual (SW) zSecure Visual Windows based GUI modernizes and helps with RACF consumability IBM Security zSecure Alert (SW) zSecure Alert Real-time threat monitoring extending RACF/ACF2 real-time notification capabilities IBM Security zSecure Command Verifier (SW) zSecure Command Verifier Controls compliance – prevents erroneous or out-of-policy RACF commands IBM Security zSecure CICS Toolkit (SW) zSecure CICS Toolkit Access RACF commands & APIs from CICS -> additional administrative flexibility IBM Security zSecure Adapters for QRadar SIEM (SW) zSecure SIEM Adapters Sends enriched mainframe SMF audit records to QRadar SIEM IBM Security zSecure Administration (SW) zSecure Administration Bundle Bundle of zSecure Admin and zSecure Visual IBM Security zSecure Compliance and Auditing (SW) zSecure Compliance and Auditing Bundle of zSecure Audit, zSecure Alert and zSecure Command Verifier

Means of delivery indicated: Software (SW), hardware appliance (HW), virtual appliance (VA) or SaaS ( ). Also indicated are SoftLayer/IaaS availability ( ) and/or Bluemix/PaaS availability ( ).

indicates a bundle.