QRadar Multiple Address Domain and Shared Infrastructure (v3)
QRadar Multiple Address Domain and Shared Infrastructure (v3)
Feb, 2015
Disclaimer
IBM’s statements regarding its plans, directions, and intent are subject to change or
withdrawal without notice at IBM ’s sole discretion.
Overview
3
IBM Confidential © 2015 IBM Corporation
IBM Security Systems
• Master console
• Single monitoring and management console for multiple consoles
• Multi-tenant capability
• Overlapping IP support, Address Domains, Security
Regional
NOC / SOC Team
7.2.5
• Centralized health view
and system monitoring
7.2.5 +
• Centralized offense view
and management
• Content Management
• Log Source Management
• Rules
• Reports
• Saved Searches
• Dashboards
• User Accounts
• Federated Search
• Seat Management
Console
Local
Collectors
Processors + Processors +
Data Nodes Data Nodes
Customer/Unit/Region A
VPN
VPN
Y Local
Collectors
Collectors
z
Shared
Services Customer/Unit/Region B
6
IBM Confidential © 2015 IBM Corporation
IBM Security Systems
7
IBM Confidential © 2015 IBM Corporation
IBM Security Systems
Event
Collector
Event
Collector/Processor
Console
Client A
LS
IDS
Client B
Event
Collector
Event
Collector/Processor
Console
Client A
LS
LS
Event
Collector
Client B
Event
Collector
Client A
Event
Processor
Console
Event
Collector
Client B
©14
2015 IBM Corporation
IBM Confidential © 2012 IBM Corporation
IBM Security Systems
16
IBM Confidential © 2015 IBM Corporation
IBM Security Systems
Correlation engine
Automatically
recognizes domains
E.g. won’t correlate
the same IP
addresses from
different domains
• Security profile
• Asset Profiling
• Offenses
• Vulnerability management
©18
2015 IBM Corporation
IBM Confidential © 2012 IBM Corporation
IBM Security Systems
Vulnerability Manager
Summary
23
IBM Confidential © 2015 IBM Corporation
IBM Security Systems
ibm.com/security
© Copyright IBM Corporation 2012. All rights reserved. The information contained in these materials is provided for informational purposes only, and is
provided AS IS w ithout w arranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherw ise related to,
these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any w arranties or representations from IBM or its
suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM so ftw are. References in these materials
to IBM products, programs, or services do not imply that they w ill be available in all countries in w hich IBM operates. Product release dates and/or capabilities
referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a
commitment to future product or feature availability in any w ay. IBM, the IBM logo, and other IBM products and services are trademarks of the International
Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of
others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper
access from w ithin and outside your enterprise. Improper access can result in information being altered, destroyed or misappr opriated or can result in damage to
or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure
can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensiv e security approach, w hich w ill
24 necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT ©WARRANT2015 IBM Corporation
THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.