Tom Mulvehill, Product Manager, demonstrates how to use IBM Security AppScan Source to identify security vulnerabilities in Android applications. Visit the demonstration on Youtube here For more information on IBM Security AppScan Source, go to http://www.ibm.com/software/rational/products/appsc
Register for the Webinar scheduled for Januarary 15, 2013 The Ready for IBM Security Intelligence Partner Offering leverages and propels our investment and support of our traditional technology partners, and provides specific support for our ISV/Technology communities. Jan 15, 2013 10:00AM-11:00AM Register: https://www-950.ibm.com/events/swgeer/swgeer06.nsf/signin?openform&seminar=kwoamoe8zkpv4&lang=en
11:30 AM Eastern Daylight, 8:30 AM Pacific Daylight Speakers: Daniel Perlov, L2 Support Manager and Abdiel Santos, L3 Support Engineer Learn how to manage multiple IBM InfoSphere Guardium appliances in heterogeneous environments and understand the recent additions of tools available for system self monitoring and system tuning. This session will cover best practices in maintaining, upgrading and expanding your InfoSphere Guardium environment Register here Flyer Materials for this event are here:
Abstract: The Ready for IBM Security Intelligence Program fosters a vibrant ecosystem that nurtures and supports Technology Partners’ integrations with specific IBM solutions. Join the Webinar to learn how the newly validated solution, Data Governance for ISIM, from STEALTHbits Technologies enables IBM Security Identity Manager to provision and de-provision access to unstructured data (SharePoint, File Systems, SQL, etc). Data Governance for ISIM... [More]
Abstract: The Ready for IBM Security Intelligence Program fosters a vibrant ecosystem that nurtures and supports Technology Partners’ integrations with specific IBM solutions. Learn how Entrust, with Entrust IdentityGuard and Bio-Key, with ID Director increase identity assurance and enhance authentication mechanisms for IBM Security Access Manager for Web. Click Here!!
This webinar covered IBM Security Privilged Identity Manager and its integration with ObserveIT. The recording is posted here: Link to recording , The presentation slides are posted here. Here was the agenda: Background: the problem of insider threat IBM Security Privileged Identity Manager solution Introducing the ObserveIT partnership ObserveIT overview Demo Contacts/Resources Q&A
Join Tom Mulvehill (Senior Product Manager, IBM AppScan) and Jonathan Carter (Technical Director, Arxan) for a discussion on protecting mobile applications from security vulnerabilities and run time protection. Register here : Appscan Webinar New attack vectors in the mobile application threat landscape, resulting from the transition of web to app world, requires the evolution of application risk management framework. Even “flawless” code can be cracked and modified. So, it is important to not... [More]
Annual revenues in the mobile based App Economy are estimated at $72 billion today and are expected to double to $151 billion by 2017. The fast adoption is driving rapid mobile app innovation, without understanding the security risks, and thereby providing attractive targets for compromising financial, IP and personal or confidential information. View this webinar to learn more about protecting applications from security vulnerabilities and integrity protection.
The Problem: Web applications represent a critical, if not the primary, customer interface for a growing number of organizations. In this environment, network firewalls are no longer sufficient to protect applications. Today’s multi-layer attacks increasingly target the application layer, where hidden vulnerabilities can be exploited with devastating effects on application availability, data security, customer confidence, and reputation, not to mention lost business and recovery costs. Application scanners identify vulnerabilities,... [More]
Increase the Value of QRadar® Security Intelligence Deployments with StealthINTERCEPT™ Join STEALTHbits and IBM for this live, interactive webinar, where we will demonstrate and discuss how: IBM Security QRadar® provides a unified security intelligence platform for collecting, correlating, querying and reporting on security incidents and alerts, combining sophisticated analytics with out-of-the-box rules, reports, and dashboards. StealthINTERCEPT™ provides real-time activity information that includes specifics on Active... [More]
REGISTER FOR THIS EVENT Join STEALTHbits and IBM for this live, interactive webinar, where we will demonstrate and discuss how: IBM Security QRadar® provides a unified security intelligence platform for collecting, correlating, querying and reporting on security incidents and alerts, combining sophisticated analytics with out-of-the-box rules, reports, and dashboards. StealthINTERCEPT™ provides real-time activity information that includes specifics on Active Directory changes (including GPOs), File Activity... [More]
Staying Ahead in Mobile Security ------------------------------------------------------------------------------------------ User mobility and the proliferation of devices introduce new security threats that can place your business at risk. You need an easier way to detect and take action on security threats on your network, but turning the security data from network devices into “actionable” data is very difficult. It is risky too, because the malware you cannot see might continue to operate with impunity. Join us for this webcast... [More]