Download - cases for IBM xgs5000 (5.0) demo
![Page 1: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/1.jpg)
© 2013 IBM Corporation
IBM Security Systems
IBM Next Generation IPS (XGS5000) demo
![Page 2: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/2.jpg)
© 2013 IBM Corporation
IBM Security Systems
XGS5000 demo setup
Hacker
InternetInternet
Server UserDesktop
XGS5000
![Page 3: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/3.jpg)
© 2013 IBM Corporation
IBM Security Systems
XGS5000 demo setup – firmware, xpu, url & web db
![Page 4: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/4.jpg)
© 2013 IBM Corporation
IBM Security Systems
XGS5000 demo setup – inline blocking
![Page 5: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/5.jpg)
© 2013 IBM Corporation
IBM Security Systems
XGS5000 demo setup – leverage on X-Force default signature & blocking
![Page 6: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/6.jpg)
© 2013 IBM Corporation
IBM Security Systems
XGS5000 demo setup – fixpacks
![Page 7: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/7.jpg)
© 2013 IBM Corporation
IBM Security Systems
Test cases
1. Blocking Web Application attacks2. Blocking malicious files3. Application control
• Blocking uploads4. URL control5. Enforcing user authentication6. Identifying applications and users
• Application that takes up the most bandwidth• Top users of a specific application• Breakdown of network and application traffic for a specific user• Breakdown of Web traffic category
![Page 8: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/8.jpg)
© 2013 IBM Corporation
IBM Security Systems
IBM X-Force detailed information on web applications, URLs
![Page 9: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/9.jpg)
© 2013 IBM Corporation
IBM Security Systems
Blocking Web Application attacks – vulnerable web server
![Page 10: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/10.jpg)
© 2013 IBM Corporation
IBM Security Systems
Blocking Web Application attacks – attempting XSS injection attack
![Page 11: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/11.jpg)
© 2013 IBM Corporation
IBM Security Systems
Blocking Web Application attacks – page cannot load
![Page 12: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/12.jpg)
© 2013 IBM Corporation
IBM Security Systems
Blocking Web Application attacks – XGS blocks attack
![Page 13: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/13.jpg)
© 2013 IBM Corporation
IBM Security Systems
Blocking Web Application attacks – XGS blocks attack
![Page 14: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/14.jpg)
© 2013 IBM Corporation
IBM Security Systems
Blocking malicious files – attempt to download file from server
![Page 15: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/15.jpg)
© 2013 IBM Corporation
IBM Security Systems
Blocking malicious files – download disrupted
![Page 16: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/16.jpg)
© 2013 IBM Corporation
IBM Security Systems
Blocking malicious files – XGS blocks malicious file download
![Page 17: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/17.jpg)
© 2013 IBM Corporation
IBM Security Systems
Blocking malicious files – XGS blocks malicious file download
![Page 18: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/18.jpg)
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads
![Page 19: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/19.jpg)
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – create new rule
![Page 20: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/20.jpg)
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – create web application object
![Page 21: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/21.jpg)
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – control uploading of data
![Page 22: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/22.jpg)
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – deploy changes
![Page 23: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/23.jpg)
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – add web application object to the rule
![Page 24: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/24.jpg)
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – policy deployed
![Page 25: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/25.jpg)
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – user logs in to email
![Page 26: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/26.jpg)
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – user compose email
![Page 27: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/27.jpg)
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – user attempt to upload file as attachment in the email
![Page 28: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/28.jpg)
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads - uploading
![Page 29: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/29.jpg)
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – upload fail
![Page 30: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/30.jpg)
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – XGS blocks upload via email
![Page 31: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/31.jpg)
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – XGS blocks upload via email
![Page 32: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/32.jpg)
© 2013 IBM Corporation
IBM Security Systems
Blocking uploads – XGS blocks upload via email
![Page 33: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/33.jpg)
© 2013 IBM Corporation
IBM Security Systems
URL control – create a new rule
![Page 34: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/34.jpg)
© 2013 IBM Corporation
IBM Security Systems
URL control – deploy changes
![Page 35: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/35.jpg)
© 2013 IBM Corporation
IBM Security Systems
URL control – create new URL list
![Page 36: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/36.jpg)
© 2013 IBM Corporation
IBM Security Systems
URL control – add URL to block in the list
![Page 37: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/37.jpg)
© 2013 IBM Corporation
IBM Security Systems
URL control – deploy changes
![Page 38: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/38.jpg)
© 2013 IBM Corporation
IBM Security Systems
URL control – URL list to rule
![Page 39: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/39.jpg)
© 2013 IBM Corporation
IBM Security Systems
URL control – deploy changes
![Page 40: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/40.jpg)
© 2013 IBM Corporation
IBM Security Systems
URL control – user attempt to access URL
![Page 41: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/41.jpg)
© 2013 IBM Corporation
IBM Security Systems
URL control – user redirected to XGS
![Page 42: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/42.jpg)
© 2013 IBM Corporation
IBM Security Systems
URL control – user redirected to XGS
![Page 43: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/43.jpg)
© 2013 IBM Corporation
IBM Security Systems
URL control – XGS display warning message, URL has been blocked
![Page 44: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/44.jpg)
© 2013 IBM Corporation
IBM Security Systems
URL control – XGS blocks URL
![Page 45: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/45.jpg)
© 2013 IBM Corporation
IBM Security Systems
URL control – XGS blocks URL
![Page 46: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/46.jpg)
© 2013 IBM Corporation
IBM Security Systems
URL control – XGS blocks URL
![Page 47: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/47.jpg)
© 2013 IBM Corporation
IBM Security Systems
URL control – access to other URL in the same domain is allowed
![Page 48: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/48.jpg)
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – create group and user objects
![Page 49: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/49.jpg)
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – create group and user objects
![Page 50: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/50.jpg)
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – create group
![Page 51: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/51.jpg)
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – create group and user objects
![Page 52: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/52.jpg)
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – user object
![Page 53: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/53.jpg)
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – user object
![Page 54: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/54.jpg)
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – specify group membership
![Page 55: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/55.jpg)
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – specify group membership
![Page 56: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/56.jpg)
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – specify group membership
![Page 57: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/57.jpg)
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – object created
![Page 58: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/58.jpg)
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – create rule, source = unauthenticated users
![Page 59: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/59.jpg)
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – deploy changes
![Page 60: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/60.jpg)
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – create web application object
![Page 61: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/61.jpg)
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – specify granular control for YouTube
![Page 62: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/62.jpg)
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – deploy changes
![Page 63: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/63.jpg)
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – add object to rule
![Page 64: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/64.jpg)
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – deploy changes
![Page 65: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/65.jpg)
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – set action to Authenticate
![Page 66: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/66.jpg)
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – deploy changes
![Page 67: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/67.jpg)
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – user attempt to access youtube
![Page 68: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/68.jpg)
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – user attempt to load a video on YouTube
![Page 69: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/69.jpg)
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – user redirected to authentication page
![Page 70: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/70.jpg)
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – user fills in credentials
![Page 71: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/71.jpg)
© 2013 IBM Corporation
IBM Security Systems
Enforcing user authentication – user redirected to YouTube video
![Page 72: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/72.jpg)
© 2013 IBM Corporation
IBM Security Systems
Application that takes up the most bandwidth
![Page 73: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/73.jpg)
© 2013 IBM Corporation
IBM Security Systems
Application that takes up the most bandwidth
![Page 74: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/74.jpg)
© 2013 IBM Corporation
IBM Security Systems
Application that takes up the most bandwidth
![Page 75: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/75.jpg)
© 2013 IBM Corporation
IBM Security Systems
Top users of a specific application
![Page 76: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/76.jpg)
© 2013 IBM Corporation
IBM Security Systems
Top users of a specific application
![Page 77: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/77.jpg)
© 2013 IBM Corporation
IBM Security Systems
Top users of a specific application
![Page 78: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/78.jpg)
© 2013 IBM Corporation
IBM Security Systems
Breakdown of network and application traffic for a specific user
![Page 79: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/79.jpg)
© 2013 IBM Corporation
IBM Security Systems
Breakdown of network and application traffic for a specific user
![Page 80: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/80.jpg)
© 2013 IBM Corporation
IBM Security Systems
Breakdown of network and application traffic for a specific user
![Page 81: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/81.jpg)
© 2013 IBM Corporation
IBM Security Systems
Breakdown of Web traffic category
![Page 82: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/82.jpg)
© 2013 IBM Corporation
IBM Security Systems
Breakdown of Web traffic category
![Page 83: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/83.jpg)
© 2013 IBM Corporation
IBM Security Systems
Breakdown of Web traffic category
![Page 84: cases for IBM xgs5000 (5.0) demo](https://reader030.vdocuments.net/reader030/viewer/2022032421/55a78f711a28ab30478b4577/html5/thumbnails/84.jpg)
© 2013 IBM Corporation
IBM Security Systems
ibm.com/security
© Copyright IBM Corporation 2013. All rights reserved. The information contained in these materials is provided for informational purposesonly, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the useof, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating anywarranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreementgoverning the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available inall countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s solediscretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in anyway. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the UnitedStates, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and responseto improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriatedor can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secureand no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed tobe part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems,products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THEMALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.