John Grady, IDC analyst said that the all new IBM XGS 5000 security appliance product line is intended on continuing the advancement of infringement prevention systems. He also mentioned that some firewalls have made it clear that there is a requirement of dealing with integrated malware when we are using web features like Facebook. International Business Machines Corp.(NYSE:IBM) line takes this to the next step.
These days, employees are constantly using the web at workplaces. IT departments are required to go that extra mile to protect their systems against constantly developing malware. IBM declared a new segment of network security systems that are believed to help control such risks.
Get Instant News on IBM Here
The new line of IBM security products are described by the company as the next gen intrusion prevention device. The product line will offers simplified interface and rather granular view of security conditions. Users will be able to see what applications are being used on a specific computer network, the websites that people are visiting, etc. The system will also provide the power of controlling such activities, including security against ‘zero day’ abuses.
The first device of this all new product like is the IBM Security Netwrork Protection XGS 5000. This device uses core features that are found in IBM’s Security Netwrok Intrusion Prevention System. It will provide 2.5 GBPS throughput and will be capable of operating on as many as 8 network modules.
Overall strategy followed by XGS 5000 is to explore what all are being accessed and identify any sort of misuse and henceforth implement applicable policies. The device will be available by the third quarter. It incorporates the universal threat intelligence from IBM’s X-Force Research and includes a specialized Web Filter database having more than 15 million web addresses recorded.
How Should Investors IBM, Get Free Trend Analysis
In the opinion of General Manager of IBM’s Security Systems Division, Brendan Hannigan, with the steady increase in targeted attacks and adoption of technologies like social media and clouds, companies need to take help of new approaches.