WWPass External Authentication Solution Validated with IBM Security Access Manager 8.0
WWPass External Authentication Solution Validated with IBM Security Access Manager 8.0 WWPass External Authentication Solution (EAS) provides strong hardware authentication and at the same time removes username/password pairs completely. WWPass EAS is a Web service which utilizes the ISAM External Authentication Interface (EAI) and is to be installed and configured as an ISAM External Authenticator junction. To learn more about this solution, follow this link.
Tags:  wwpass people isam validated rfisi |
Creating a Security Strategy to Stay Ahead of Targeted Attacks and Advanced Threats
Read this blog on creating a security stratgey to stay ahead of targetd attacks and advanced threats. Organizations need to be a step ahead in terms of their global threat intelligence and internal organizational intelligence. They also need the ability to establish complete internal visibility and control over targeted attacks. Security solutions deployed in the environment need to be specialists and experts at preventing specific types of attacks. More importantly, a strategic approach needs to be taken so that the entire... [More]
|
SafeNet for IBM i OS Version 9.0 validated with QRadar
MP Associates of Westchester, Inc. provides Network Security for Power Systems running IBM i OS - Monitor and control network traffic accessing your system. SafeNet, a security product for IBM Power Systems, addresses IBM i OS® server access point security. This tool uses IBM i OS Exit Point programs to give full control over users who access your system via network connections, including the Internet. SafeNet protects your system by interrogating each client request and imposing rules that you set up. This controls who gets access and how... [More]
Tags:  rfisi mp_associates safenet security_intelligence validated qradar |
Aujas Security Analytics and Visualization Platform (SAVP) for IBM QRadar validated with QRadar
SAVP for QRadar is designed to enhance the experience of QRadar. With greater customization and visualization, you can use the QRadar platform to analyze your threats more effectively. SAVP for QRadar, a powerful tool that employs advanced analytics, presents a clear-cut picture of your state of security. For more information about this solution, follow this link.
Tags:  security_intelligence aujas rfisi qradar validated |
Trend Micro Deep Discovery Inspector 3.7 validated with Threat Protection System
The Trend Micro Deep Discovery threat protection platform enables you to detect, analyze, and respond to today’s stealthy, targeted attacks in real time. Deployed as individual components or as a complete cyber security platform, Deep Discovery provides advanced threat protection where it matters most to your organization. For more information about this solution, follow this link.
Tags:  security_intelligence deep_discovery rfisi validated trend infrastructure qradar |
STEALTHbits Technologies 2015 Beacon Award Winner
View the video below to learn more about STEALTHbits award winning solution with IBM Security.
|
Learn about the integration of StealthBits with Qradar for Windows security
Join this session on the InterConnect conference,Thursday February 26 at 10:30-11:30 at the Mandalay Bay, Madalay Ballroom D Ready for IBM Security Intelligence: Real-Time Windows Security Intelligence with IBM QRadar; Rory Bray (IBM), Jonathan Sander (STEALTHbits Technologies) The QRadar "Ready for IBM Security Intelligence" partnership program enables tight integrations between QRadar SIEM and other security products to deliver deeper security intelligence. Learn about this program and how one such partnership,... [More]
|
An international retailing group Protecting user access and improving efficiencies while reducing costs 30 - 40 percent annually
By upgrading to an IBM Security Access Manager for Web appliance, an international retailing group will realize an estimated 30 - 40 percent annual savings in system and support costs and gain new out-of-the-box protection against threats to save staff several hundred labor hours annually. Find out more from these assets: Case Study PD F Case Study Slide
Tags:  rfisi isam success_stories palmetto asset |
Visit and Get To Know ObserverIT at IBM InterConnect
Make sure you take the opportunity at InterConnect to get familiar with our technology partner ObserveIT who provides a market leading app-centric user activity monitoring solution that provides IBM Security a competitive advantage when combining QRadar or Identity with ObserveIT for user specific visual forensics and granular session management for privileged accounts and business users. Customers like Cigna and Ally Bank are using ObserveIT to gain insight into user-based risk, and view ObserveIT as a must-have solution. As you may... [More]
Tags:  rfisi observeit interconnet |
STRENGTHEN APPLICATION AND DATA SECURITY SKILLS BY DAY, CELEBRATE WITH AEROSMITH BY NIGHT AT IBM INTERCONNECT
Strengthen Application and Data Security Skills by Day, Celebrate With Aerosmith by Night at IBM InterConnect Come see the following presentations at IBM InterConnect involving our technology partners: IBM has significant expertise in risk management, mobile and cloud security. Leading up to IBM InterConnect 2015, we thought you’d like to consult the following blogs from thought leaders who will present at the event: Constantine Grancharov will co-present Session No. SAS-3428, titled, “Addressing Application Security: It’s a... [More]
|
Congratulations to STEALTHbits on winning the 2015 Beacon Award
STEALTHbits Wins 2015 IBM Beacon Award for Outstanding Security Solution HAWTHORNE, NJ – February 11, 2015 – STEALTHbits Technologies was named a winner of a 2015 IBM Beacon Award for Outstanding Security Solution. Each year, this honor is awarded to a select number of IBM Business Partners who have delivered exceptional solutions to drive business value and transform the way their clients and industries do business in the future. The 2015 awards recognize achievements across a wide-range of solution areas,... [More]
Tags:  qradar stealthbits rfisi |
Vorstack Automation and Collaboration Platform (ACP) validated with QRadar SIEM
Vorstack’s Automation and Collaboration Platform unlocks additional value of investments made in IBM QRadar, increasing operational efficiency by automating the ingestion, research, response, and collaborative effort needed for discovering threats to allow rapid translation of Threat Intelligence into Incident Response For more information on this solution, follow this link.
Tags:  validated rfisi vorstack qradar security_intelligence |
ERPScan Security Monitoring Suite for SAP 3 valdiated with QRadar SIEM
ERPScan Security Monitoring Suite for SAP 3 has completed validation with QRadar SIEM. This software is specifically designed for enterprise systems to continuously monitor changes in multiple SAP systems. It makes threat identification an easy process. Helps in management via smart dashboards, has high-level trend analysis, risk management options and task delegation functionality, allows report generation in multiple formats and easily integrates with IT GRC and SIEM solutions. For more information on this solution,... [More]
Tags:  qradar sap siem security_intelligence validated rfisi erpscan |
SSH Communications Security CryptoAuditor 1.3 completes validation with QRadar SIEM
SSH Communications Security CryptoAuditor 1.3 completes validation with QRadar SIEM. CryptoAuditor provides Transparent, Scalable and Secure Content Aware Privileged Access Control and linkage to Data Loss Prevention and other enterprise tools for preventative security measures. Key functionalities and benefits include: Monitoring and recording of encrypted data flows and remote access CryptoAuditor is an inline solution that preserves end to end security while decrypting and securely storing session traffic without requiring changes to... [More]
Tags:  ssh security_intelligence qradar validated rfisi siem |
Monterey Technology Group, Inc LOGbinder EX validated with QRadar SIEM
LOGbinder EX automatically manages the complicated process of requesting audit logs from Exchange every few minutes, watching for them to arrive by email, downloading the attachments & parsing the XML. LBEX translates cryptic admin & mailbox audit data into easy-to-understand messages & sends the results to Qradar. For more information on this solution, follow this link.
Tags:  qradar rfisi siem logbinder monterey validated security_intelligence |