Clients around the globe are struggling to get security intelligence about authentication events from their Microsoft platforms. In this video, Jonathan Sanders, Strategy and Research Office from STEALTHbits Technologies discusses how the integration between STEALTHbits StealthINTERCEPT and IBM QRadar Security Information and Event Management (SIEM), enables the concentration and correlation of these events, resulting in actionable security intelligence.
Matching the level of identity assurance, to the value of the resource being accessed, is of paramount importance in lowering business risk. Increasing the level of identity assurance requires the use of an authentication mechanism, stronger than username and password. In this video Jim Skidmore, Senior VP, Global Sales and Channels for BIO-key, discusses how BIO-key satisfies industry specific strong authentication requirements, with numerous integrations between BIO-key ID Director and the IBM Security access management portfolio.
See the blog post from Shane Weeden (Security Architect) about some of the highlights from Pulse 2013 (including some demo highlights). https://www-304.ibm.com/connections/blogs/sweeden/entry/pulse_2013?lang=en_us Cheers, Matthew
Register for the Webinar scheduled for Januarary 15, 2013 The Ready for IBM Security Intelligence Partner Offering leverages and propels our investment and support of our traditional technology partners, and provides specific support for our ISV/Technology communities. Jan 15, 2013 10:00AM-11:00AM Register: https://www-950.ibm.com/events/swgeer/swgeer06.nsf/signin?openform&seminar=kwoamoe8zkpv4&lang=en
Incman-NG is a Technology Platform for SOC and CSIRT Orchestration and Forensics Investigations, to enable collaborative and automated real-time incident management, threat and data breach response. Incman-NG also allows Incident Intelligence Sharing through a secure cloud-based user community, and advanced visual analytics. With this QRadar ‘right-click’ integration users can use QRadar Events and Flow to create and update incidents in Incman-NG. Demo: http://youtu.be/b2DV1yC8CF0 Ready for IBM Security Intelligence Solution... [More]
Strategies and Tips to Secure Mobile Devices Securing mobile devices needs to provide flexibility and ease of use to enable users to login to the network and access the applications they need. IBM’s Security Access Manager® and Aruba ClearPass provide a uniquely powerful way to extend risk-based access control across multiple application types for consistent security policies. Users can experience a single sign on for network and applications based on security policy and the context of the user access. IBM Fiberlink... [More]
Mainframes, DBs and system protected by Active directory comprise the bulk of the data that hackers are after. Here we describe the case for using agents (zSecure, Guardium and Intercept (from STEALTHbits) to avoid the cost, pain and inefficiency of collecting logs and have a better visibility, blocking capabilities as well as enhanced reporting for compliance. See the video here.
Industry: Healthcare The Need: MUHC security staff wanted to more quickly identify and assess potential threats and security exposures. The Solution: A security intelligence solution based on IBM and Trend Micro software helps MUHC rapidly detect and respond to attacks, and offers a platform to reduce the time and cost of vulnerability management The Benefit: The platform currently analyzes 700 events per second, correlating network noise into a coherent story that helps staff uncover and stop approximately five major security... [More]
SSH Communications Security CryptoAuditor 1.3 completes validation with QRadar SIEM. CryptoAuditor provides Transparent, Scalable and Secure Content Aware Privileged Access Control and linkage to Data Loss Prevention and other enterprise tools for preventative security measures. Key functionalities and benefits include: Monitoring and recording of encrypted data flows and remote access CryptoAuditor is an inline solution that preserves end to end security while decrypting and securely storing session traffic without requiring changes to... [More]
Recorded Future Cyber helps you visualize future, present, and past threats and become proactive with deep insight into upcoming attacks.Scan the horizon for upcoming cyber security events and quickly filter down and categorize insights relevant to your organization, industry or geography. Boost your team’s security effectiveness and productivity by easily sharing flash reports on emerging threats. Enrich your security information with Web context with our integration with IBM QRadar SIEM. For more information on this solution,... [More]
Vectra provides a critical set of features and capabilities that compliment any QRadar deployment. The system provides a unique perspective into the network and its traffic that reveals a variety of threats that are virtually impossible to detect with signatures and flow analysis. Read more about this integrated solution here.
IBM® Security App Exchange allows customers, developers and business partners to share applications, security app extensions and enhancements to IBM Security products With IBM Security App Exchange, you can: Obtain apps that extend the capabilities of IBM Security solutions Share best practices and learn from others Find solutions in near real-time Learn more here.
Charismatics ® has completed Ready for IBM Security Intelligence validation of the Charismatics Smart Security Interface version 5 with IBM Security Access Manager for Enterprise Single Sign-On. Charismathics® smart security interface is a PKI middleware meant for strong authentication purposes sold as standalone license or in bundle with either plug’n’crypt® USB tokens or smart security cards, and integrated with IBM Security... [More]