IBM BigFix Protection

IBM® BigFix Protection delivers real-time antimalware functionality via protection methods such as file and web reputation, personal firewall, and behavior monitoring.

Note: IBM has announced the withdrawal of IBM BigFix Protection from marketing, effective December 16, 2016. You can no longer purchase this product directly from IBM on or after that date.

IBM has also announced End of Support for IBM BigFix Protection, effective December 31, 2017. If you previously purchased the product, you will still be able to get product support until that date. IBM also provided an option for all existing BigFix Protection customers to migrate from BigFix Protection to Trend Micro's OfficeScan product. Contact your IBM sales representative for more information.

To see the End of Marketing and End of Support announcement, go to http://www-01.ibm.com/common/ssi/ShowDoc.wss?docURL=/common/ssi/rep_ca/7/897/ENUS916-117/index.html&lang=en&request_locale=en.

IBM BigFix Protection helps to protect physical and virtual endpoints from damage caused by viruses, Trojan horses, worms, spyware, rootkits, web threats, and their new variants. It can help to reduce business disruptions that can result from endpoint infection, identity theft, data loss, network downtime, lost productivity, and compliance violations.

IBM BigFix Protection cross references threat information with a large, cloud-based database created and managed by Trend Micro and continuously updated via Trend Micro's Smart Protection Network for Microsoft Windows endpoints. The solution checks files and web addresses against this database for potential malicious activities in real time, in addition to delivering antimalware protection to Macintosh and Windows endpoints as needed.

IBM BigFix Protection provides security for both fixed, network connected endpoints and roaming, Internet-connected endpoints. Constant, agent based monitoring proves to be an effective way to combat the extreme vulnerability of roaming endpoints. A laptop used in an airport, for example, can receive cloud based protection from threats lurking on websites it visits or files it receives even though it is not connected to the network.