IBM and Partner integrated Solutions and Customer success stories University of New Brunswick: IBM Security and Trend Micro Trend Micro: Prevent, Detect, Respond with Deep Discovery, IPS and QRadar OnWire's OnCloud: IBM Identity and Access Management in the Cloud Prolifics: Insights on Identity Governance Chapman University and Pontis Research: Identity Management in Higher Education Blue Bay Technologies Strengthening Clients Security Posture with IBM Security Solutions Blue Bay Technologies on Holistic Security BIO-key Multi-factor... [More]
STEALTHbits, an RFISI technology partner, with integrations with QRadar and IBM Security Identity Manager, share their thought leadership on data access governance (DAG) on SecurityIntelligence.com 3 Steps to Getting Data Access Governance Off Your To-Do List
Adaptive Two-Factor Authentication Join us for a Webinar on May 9 Space is limited. Reserve your Webinar seat now at: https://www1.gotomeeting.com/ register/387574848 Join us for an informative webinar discussing customers demand for flexible yet strong authentication. Learn how BIO-key supports biometric, prox cards, PINs and knowledge based / challenge response modalities. Title: Adaptive Two-Factor Authentication Date: Friday, May 9, 2014 Time: 2:00 PM - 3:00 PM EDT After... [More]
Abstract: The Ready for IBM Security Intelligence Program fosters a vibrant ecosystem that nurtures and supports Technology Partners’ integrations with specific IBM solutions. Join the Webinar to learn how the newly validated solution, Data Governance for ISIM, from STEALTHbits Technologies enables IBM Security Identity Manager to provision and de-provision access to unstructured data (SharePoint, File Systems, SQL, etc). Data Governance for ISIM... [More]
11:30 AM Eastern Daylight, 8:30 AM Pacific Daylight Speakers: Daniel Perlov, L2 Support Manager and Abdiel Santos, L3 Support Engineer Learn how to manage multiple IBM InfoSphere Guardium appliances in heterogeneous environments and understand the recent additions of tools available for system self monitoring and system tuning. This session will cover best practices in maintaining, upgrading and expanding your InfoSphere Guardium environment Register here Flyer Materials for this event are here:
F5 Solution Architect Nojan Moshiri demonstrates the integration between BIG-IP ASM and IBM’s InfoSphere Guardium offering real time data security along with contextual meta data associated with the SQL data. Each enhances the other to provide both defense-in-depth protection and contextual security information.
Here is the link to the video.
See the blog post from Shane Weeden (Security Architect) about some of the highlights from Pulse 2013 (including some demo highlights). https://www-304.ibm.com/connections/blogs/sweeden/entry/pulse_2013?lang=en_us Cheers, Matthew
Security involves many activities: controlling user access, hardening applications, inspecting network traffic, patching systems, and monitoring databases, among others. IBM offers solutions for all of these. However, optimum security requires gaining insight by combining data from across your security infrastructure. This live demonstration shows two simple realistic scenarios. In the first a user browses and then attacks an application. In the second, a privileged user manipulates a database. IBM Security detects and secures these... [More]
Register for the Webinar scheduled for Januarary 15, 2013 The Ready for IBM Security Intelligence Partner Offering leverages and propels our investment and support of our traditional technology partners, and provides specific support for our ISV/Technology communities. Jan 15, 2013 10:00AM-11:00AM Register: https://www-950.ibm.com/events/swgeer/swgeer06.nsf/signin?openform&seminar=kwoamoe8zkpv4&lang=en
AppScan Source and AppScan Enterprise 8.6 evaluation images available for download. Evaluation images are now available for download , for the following solutions: AppScan Standard 8.6 (available since August 24th) AppScan Source for Analysis 18.104.22.168 (available since November 7th) AppScan Enterprise 22.214.171.124 (available since November 7th) Here are the relevant links: Security AppScan 8.6 evaluation images Rational AppScan pre-8.6 evaluation images
Tom Mulvehill, Product Manager, demonstrates how to use IBM Security AppScan Source to identify security vulnerabilities in Android applications. Visit the demonstration on Youtube here For more information on IBM Security AppScan Source, go to http://www.ibm.com/software/rational/products/appsc