IBM DT-POL-1 Folheto
Z125-7848-01 10/2008
Page 1 of 2
Service Description
IBM X-Force® Threat Analysis Service
1.
Scope of Services
IBM X-Force Threat Analysis Service (called “XFTAS” or “Service”) is a security intelligence service that is
designed to deliver customized information about a variety of threats that could affect Customer network
security.
designed to deliver customized information about a variety of threats that could affect Customer network
security.
The Service provides threat information collected from the Security Operations Centers (“SOCs”), trusted
security intelligence from the IBM X-Force® research and development team, and the IBM Global Threat
Operations Center, and secondary research from other public and private resources. This combination of
information helps to identify the nature and severity of external Internet threats. In addition to alerts and
X-Force intelligence, each Customer registered security contact will receive detailed information regarding
real-time Internet port metrics, worms and virus activity, as well as daily analysis of identified Internet
threat conditions.
security intelligence from the IBM X-Force® research and development team, and the IBM Global Threat
Operations Center, and secondary research from other public and private resources. This combination of
information helps to identify the nature and severity of external Internet threats. In addition to alerts and
X-Force intelligence, each Customer registered security contact will receive detailed information regarding
real-time Internet port metrics, worms and virus activity, as well as daily analysis of identified Internet
threat conditions.
The details of Customer’s order (for example, the services requested, contract period, and charges) will
be specified in an Order.
be specified in an Order.
Definitions of Service-specific terminology can be found at
www.ibm.com/services/iss/wwcontracts
2. IBM
Responsibilities
2.1
Deployment and Initiation
During deployment and initiation, IBM will enable Customer to access the Virtual-SOC, and will work with
Customer to activate XFTAS.
Customer to activate XFTAS.
An assigned IBM deployment specialist will contact the Customer to request one name and e-mail
address for each XFTAS subscription purchased. The individuals identified by the Customer will be the
Customer’s registered security contacts.
address for each XFTAS subscription purchased. The individuals identified by the Customer will be the
Customer’s registered security contacts.
IBM will send each Customer registered security contact a welcome e-mail with a user ID and temporary
password. The user will be required to change the password on the first login.
password. The user will be required to change the password on the first login.
2.2
Ongoing Management and Support
After XFTAS has been established, and during any renewal contract period, IBM will provide XFTAS on a
24 hours/day by 7 days/week basis.
24 hours/day by 7 days/week basis.
2.2.1 Licensing
XFTAS can be purchased with one of the following types of licenses:
Individual
The individual license entitles a single person in an organization to login to the Virtual-SOC and
customize the delivery of XFTAS content. This person is entitled to view information in the portal and to
receive e-mail notifications configured in the portal. The individual is not authorized to share or distribute
XFTAS information. Although an organization can transfer an individual license from one person to
another if needed, an individual license cannot be shared.
customize the delivery of XFTAS content. This person is entitled to view information in the portal and to
receive e-mail notifications configured in the portal. The individual is not authorized to share or distribute
XFTAS information. Although an organization can transfer an individual license from one person to
another if needed, an individual license cannot be shared.
Distribution
The distribution license entitles a person with an individual license to distribute his/her customized content
from the XFTAS to others in the organization. For example, an organization might designate a single
person to be the administrator of security information for the company. This person would be responsible
for customizing the information received from XFTAS, and then distributing that content to all affected
parties at the company. The individual license would act as the number of “customized” versions of
XFTAS information. The distribution license would act as the total number of recipients of the
information, minus the individual licenses.
from the XFTAS to others in the organization. For example, an organization might designate a single
person to be the administrator of security information for the company. This person would be responsible
for customizing the information received from XFTAS, and then distributing that content to all affected
parties at the company. The individual license would act as the number of “customized” versions of
XFTAS information. The distribution license would act as the total number of recipients of the
information, minus the individual licenses.
2.2.2 Key
Features
The key features of XFTAS include:
a.
Daily assessment and critical issues e-mail notifications