IBM® Security Server Protection offers multilayered protection against known and unknown threats. It protects servers running IBM AIX®, Linux, Solaris and Windows. IBM Security Server Protection enables compliance with host network security and system integrity monitoring and auditing capabilities. It helps protect against data breaches and provides tracking and reporting to help meet regulatory compliance.

IBM Security Server Protection:

  • Helps protect against network-borne attacks, including web application threats, embedded script attacks and attack traffic in secure sockets layer (SSL) traffic streams.
  • Combines multiple inspection technologies to offer protection at deep network levels.
  • Includes multiple monitoring technologies to help ensure data confidentiality and ease regulatory compliance.
  • Aids in reducing cost and complexity through centralized security management and extensive support for multiple operating systems.

Helps protect against network-borne attacks

  • Backed by the IBM X-Force® research and development team, IBM Security Server Protection offers proactive web application, Web 2.0 and database protection.
  • Adaptive threat protection technology provides deep packet inspection and data security capabilities
  • Incorporates antivirus enforcement to confirm that servers are receiving the latest antivirus updates and report non-compliant servers.
  • Supports mobility by maintaining persistent protection while traveling with the virtual machine.

Combines multiple inspection technologies

  • A firewall enables you to decrease the number of threats from external and internal sources.
  • An intrusion prevention system uses multiple layers of defense to provide accurate, preemptive protection.
  • IBM Virtual Patch® helps prevent known and unknown attacks regardless of whether a vulnerability patch has been issued.
  • Ability to inspect web transactions before they’re delivered to the web application.

Includes multiple monitoring technologies

  • System integrity monitoring alerts you of user interaction with the operating system.
  • File integrity monitoring meets intensive data integrity standards like Sarbanes-Oxley.
  • Registry integrity monitoring meets data integrity standards by monitoring and recording successful and failed actions.
  • Third-party log monitoring keeps track of events triggered by third-party applications.

Aids in reducing cost and complexity

  • Provides centralized command and control to simplify administration and improve efficiency and response.
  • Integrates with your existing IT infrastructure to preserve legitimate traffic flows without interruption.
  • Is a virtual environment ready to help you achieve the return on investment (ROI) that server virtualization offers.