Get recognized for your success delivering innovative, high-value solutions to clients worldwide. The IBM Beacon Awards were established more than a dozen years ago to recognize IBM Business Partners globally for their excellence and innovative solutions based on IBM offerings. In 2017, IBM will recognize Business Partner achievement across 18+ solution areas--including IBM Watson, Cloud and Analytics--that bring clients into the cognitive era.
Beacon Award winners and finalists are an elite group of Business Partners who exemplify what it means to be a trusted business advisor and provide true transformative value to clients. Winning a Beacon Award can put your firm in the spotlight for industry recognition and on a path to greater opportunity through increased visibility and promotional opportunities. Past winners have said the award helps create a competitive advantage, drive more business and raise their profile in the industry.
The IBM Beacon Awards are your opportunity to be recognized for your success in the marketplace. Nominations are open until Friday, November 18, 2016, 5:00 p.m. US Eastern Standard Time (New York). Visit PartnerWorld for all Beacon Award details and to nominate your solution(s).
Tom Mulvehill, Product Manager, demonstrates how to use IBM Security AppScan Source to identify security vulnerabilities in Android applications. Visit the demonstration on Youtube here For more information on IBM Security AppScan Source, go to http://www.ibm.com/software/rational/products/appsc
AppScan Source and AppScan Enterprise 8.6 evaluation images available for download. Evaluation images are now available for download , for the following solutions: AppScan Standard 8.6 (available since August 24th) AppScan Source for Analysis 188.8.131.52 (available since November 7th) AppScan Enterprise 184.108.40.206 (available since November 7th) Here are the relevant links: Security AppScan 8.6 evaluation images Rational AppScan pre-8.6 evaluation images
Register for the Webinar scheduled for Januarary 15, 2013 The Ready for IBM Security Intelligence Partner Offering leverages and propels our investment and support of our traditional technology partners, and provides specific support for our ISV/Technology communities. Jan 15, 2013 10:00AM-11:00AM Register: https://www-950.ibm.com/events/swgeer/swgeer06.nsf/signin?openform&seminar=kwoamoe8zkpv4&lang=en
Download this podcast from itunes or blogtalkradio and listen to a description of the security sessions planned at Pulse. http://www.blogtalkradio.com/calebbarlow http://itunes.apple.com/podcast/information-security-blog/id384369562
New Redguide: Protecting Data Assets by Deploying a Multi-Factor Authentication Solution with End-to-End Encryption Abstract The advent of the Internet revolutionized the consumer experience. From performing high-value transactions to accessing corporate networks remotely, consumers today have numerous options to conduct their business from anywhere in the world. To stay competitive in this fast growing field of e-commerce, organizations are constantly thinking of innovative ways to reach customers over the Internet. But, new... [More]
Form Number: REDP-4963-00 LINK: Managing Risk and Compliance for Privileged Users by Deploying a Centralized Provisioning and Single Sign-On Solution Every organization that deploys an IT infrastructure needs privileged users. Privileged users include administrators, operators, and managers. Privileged users are typically granted administrative or special rights to manage business-critical resources. These resources include operating systems; databases; network devices; ERP systems; and many other applications, systems, and... [More]
Security involves many activities: controlling user access, hardening applications, inspecting network traffic, patching systems, and monitoring databases, among others. IBM offers solutions for all of these. However, optimum security requires gaining insight by combining data from across your security infrastructure. This live demonstration shows two simple realistic scenarios. In the first a user browses and then attacks an application. In the second, a privileged user manipulates a database. IBM Security detects and secures these... [More]
See the blog post from Shane Weeden (Security Architect) about some of the highlights from Pulse 2013 (including some demo highlights). https://www-304.ibm.com/connections/blogs/sweeden/entry/pulse_2013?lang=en_us Cheers, Matthew
F5 Solution Architect Nojan Moshiri demonstrates the integration between BIG-IP ASM and IBM’s InfoSphere Guardium offering real time data security along with contextual meta data associated with the SQL data. Each enhances the other to provide both defense-in-depth protection and contextual security information.
Here is the link to the video.
11:30 AM Eastern Daylight, 8:30 AM Pacific Daylight Speakers: Daniel Perlov, L2 Support Manager and Abdiel Santos, L3 Support Engineer Learn how to manage multiple IBM InfoSphere Guardium appliances in heterogeneous environments and understand the recent additions of tools available for system self monitoring and system tuning. This session will cover best practices in maintaining, upgrading and expanding your InfoSphere Guardium environment Register here Flyer Materials for this event are here:
Webinar Highlights - Authentication in the real world - Case study: An enterprise approach to Web Access and strong authentication for 6 million users - Integration with Web Access Management layer and enterprise applications - Demo of versatile authentication including use of SmartPhone as 2nd factor - Q&A Here is the presentation . The presenters w er e : 1) Marc VanMaele - CEO and Founder of SecurIT 2) Daniel TumSuden, CISSP - SecurIT USA, Inc. For more information , refer to www.trustbuilder.us.com .
Defend Your Data, Customers and Reputation: F5 BIG-IP Application Security Manager and IBM InfoSphere Guardium on April 4th, 2013. Here are some links to resources that might be of interest to you. • Download the Application and Database Security with F5 BIG-IP APM and IBM InfoSphere Guardium White Paper • Download the webinar slide deck • Visit the F5 Solutions page on IBM.com • Visit the IBM Solutions page on F5.com
Pirean received this years Beacon Award at the IBM PartnerWorld Leadership Conference. held in Las Vegas Feb 25 - Feb 28 for their AccessOne solution. See the award reception here http://www.livestream.com/ibmpartnerworld/video?clipId=pla_ab3b580b-999c-42e6-8f03-9b3f0e11e020&utm_source=lslibrary&utm_medium=ui-thumb
IBM Security at Infosec Europe 2013 - http://ibm.co/ZHvsDJ Our afternoon session was kicked off by Stephen Williams, Principle Software Consultant for our business partner Pirean and Jon Harry, a senior IT security specialist at IBM, providing a great analysis of "Identity and Access Management for the modern enterprise." Stephen set the scene by showing the audience why there is a requirement to move beyond authentication. He described how Identity and access management (IAM) needs to evolve to meet rapid and recent changes in... [More]
The IBM Security Systems Marketing team has established a web page that lists upcoming webinars. This is part of an ongoing series of insightful sessions for you to share with your customers. You can register Security Webinars for sessions aimed to inform them about solving security business issues.
Abstract Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. The need to be able to integrate security into those systems and the discussions with business functions and operations exists more than ever. This IBM® Redbooks® publication explores concerns that characterize security requirements of, and threats to, business and information technology (IT) systems. This book identifies many business drivers that illustrate these concerns,... [More]
Nader Nassar, Carlos Hoyos, Daniel J Anderson With the explosive growth in the mobile ecosystem, mobile application security is a huge concern. New mobile application designs require new ways of testing to ensure data safety. In this article, explore different aspects of mobile application security. With hands-on examples, learn to use IBM® Security AppScan® Standard with mobile user agents and with emulators and actual devices for Android and iOS. View this short video to learn more. Read the article here
It's time to submit content for the June 2013 Security Connect Newsletter! Please submit your content no later than END-OF-DAY Friday June 7th - or earlier if you can! The May issue will go out Tuesday June 11th. SUBMISSION INSTRUCTIONS (SUBMISSION FORM IN WORKS) Simply reply to this email, and for every item you want to submit please include: Title Abstract Content URL Any banners or graphics associated with the content. OTHER NOTES: 1. PLEASE SEND FRESH CONTENT. Please try to send me your latest and best. 2. As always: Choose compelling... [More]
Bio-key has issues a press release on its completion of validation with IBM Security Access Manager for Web. BIO-key International, Inc. (OTCQB: BKYI), a leader in fingerprint biometric identification technologies, mobile credentialing and identity verification solutions, today reported that IBM granted validation of BIO-key's finger biometric authentication solutions, for IBM ® Security Access Manager (ISAM) for Web. ISAM for Web provides an access control management solution to centralize network and... [More]
Entrust IdentityGuard is an award-winning software authentication platform that helps financial institutions and enterprises implement a single security framework to properly safeguard physical, logical, mobile and cloud access. Entrust has received Ready for IBM Security Intelligence validation for integration of IdentityGuard with IBM Security Access Manager for Web . Authentication of users accessing Web resources secured by ISAM for Web can now be handled by a variety of... [More]
Charismatics ® has completed Ready for IBM Security Intelligence validation of the Charismatics Smart Security Interface version 5 with IBM Security Access Manager for Enterprise Single Sign-On. Charismathics® smart security interface is a PKI middleware meant for strong authentication purposes sold as standalone license or in bundle with either plug’n’crypt® USB tokens or smart security cards, and integrated with IBM Security... [More]
Next generation Security Intelligence Identity and Access, meet Big Data From dashboards and reports to complex Security Incident and Event Management, Access: One has it all. Addressing today's strong authentication, audit and reporting challenges, Access: One has been developed with Security Intelligence in mind. Through integration with IBM QRadar, Access: One provides the most intelligent, integrated and automated Identity, Access, SIEM platform in the industry. For more information, refer to the... [More]