WWPass External Authentication Solution Validated with IBM Security Access Manager 8.0 WWPass External Authentication Solution (EAS) provides strong hardware authentication and at the same time removes username/password pairs completely. WWPass EAS is a Web service which utilizes the ISAM External Authentication Interface (EAI) and is to be installed and configured as an ISAM External Authenticator junction. To learn more about this solution, follow this link.
Read this blog on creating a security stratgey to stay ahead of targetd attacks and advanced threats. Organizations need to be a step ahead in terms of their global threat intelligence and internal organizational intelligence. They also need the ability to establish complete internal visibility and control over targeted attacks. Security solutions deployed in the environment need to be specialists and experts at preventing specific types of attacks. More importantly, a strategic approach needs to be taken so that the entire... [More]
MP Associates of Westchester, Inc. provides Network Security for Power Systems running IBM i OS - Monitor and control network traffic accessing your system. SafeNet, a security product for IBM Power Systems, addresses IBM i OS® server access point security. This tool uses IBM i OS Exit Point programs to give full control over users who access your system via network connections, including the Internet. SafeNet protects your system by interrogating each client request and imposing rules that you set up. This controls who gets access and how... [More]
SAVP for QRadar is designed to enhance the experience of QRadar. With greater customization and visualization, you can use the QRadar platform to analyze your threats more effectively. SAVP for QRadar, a powerful tool that employs advanced analytics, presents a clear-cut picture of your state of security. For more information about this solution, follow this link.
The Trend Micro Deep Discovery threat protection platform enables you to detect, analyze, and respond to today’s stealthy, targeted attacks in real time. Deployed as individual components or as a complete cyber security platform, Deep Discovery provides advanced threat protection where it matters most to your organization. For more information about this solution, follow this link.
Join this session on the InterConnect conference,Thursday February 26 at 10:30-11:30 at the Mandalay Bay, Madalay Ballroom D Ready for IBM Security Intelligence: Real-Time Windows Security Intelligence with IBM QRadar; Rory Bray (IBM), Jonathan Sander (STEALTHbits Technologies) The QRadar "Ready for IBM Security Intelligence" partnership program enables tight integrations between QRadar SIEM and other security products to deliver deeper security intelligence. Learn about this program and how one such partnership,... [More]
By upgrading to an IBM Security Access Manager for Web appliance, an international retailing group will realize an estimated 30 - 40 percent annual savings in system and support costs and gain new out-of-the-box protection against threats to save staff several hundred labor hours annually. Find out more from these assets: Case Study PD F Case Study Slide
Make sure you take the opportunity at InterConnect to get familiar with our technology partner ObserveIT who provides a market leading app-centric user activity monitoring solution that provides IBM Security a competitive advantage when combining QRadar or Identity with ObserveIT for user specific visual forensics and granular session management for privileged accounts and business users. Customers like Cigna and Ally Bank are using ObserveIT to gain insight into user-based risk, and view ObserveIT as a must-have solution. As you may... [More]
Strengthen Application and Data Security Skills by Day, Celebrate With Aerosmith by Night at IBM InterConnect Come see the following presentations at IBM InterConnect involving our technology partners: IBM has significant expertise in risk management, mobile and cloud security. Leading up to IBM InterConnect 2015, we thought you’d like to consult the following blogs from thought leaders who will present at the event: Constantine Grancharov will co-present Session No. SAS-3428, titled, “Addressing Application Security: It’s a... [More]
STEALTHbits Wins 2015 IBM Beacon Award for Outstanding Security Solution HAWTHORNE, NJ – February 11, 2015 – STEALTHbits Technologies was named a winner of a 2015 IBM Beacon Award for Outstanding Security Solution. Each year, this honor is awarded to a select number of IBM Business Partners who have delivered exceptional solutions to drive business value and transform the way their clients and industries do business in the future. The 2015 awards recognize achievements across a wide-range of solution areas,... [More]
Vorstack’s Automation and Collaboration Platform unlocks additional value of investments made in IBM QRadar, increasing operational efficiency by automating the ingestion, research, response, and collaborative effort needed for discovering threats to allow rapid translation of Threat Intelligence into Incident Response For more information on this solution, follow this link.
ERPScan Security Monitoring Suite for SAP 3 has completed validation with QRadar SIEM. This software is specifically designed for enterprise systems to continuously monitor changes in multiple SAP systems. It makes threat identification an easy process. Helps in management via smart dashboards, has high-level trend analysis, risk management options and task delegation functionality, allows report generation in multiple formats and easily integrates with IT GRC and SIEM solutions. For more information on this solution,... [More]
SSH Communications Security CryptoAuditor 1.3 completes validation with QRadar SIEM. CryptoAuditor provides Transparent, Scalable and Secure Content Aware Privileged Access Control and linkage to Data Loss Prevention and other enterprise tools for preventative security measures. Key functionalities and benefits include: Monitoring and recording of encrypted data flows and remote access CryptoAuditor is an inline solution that preserves end to end security while decrypting and securely storing session traffic without requiring changes to... [More]
LOGbinder EX automatically manages the complicated process of requesting audit logs from Exchange every few minutes, watching for them to arrive by email, downloading the attachments & parsing the XML. LBEX translates cryptic admin & mailbox audit data into easy-to-understand messages & sends the results to Qradar. For more information on this solution, follow this link.