Welcome to the Media Center              

Presentations and Webinars regarding IBM Security partner offerings are listed here.

Topic Abstract Link

Strategies and Tips to Secure Mobile Devices

Securing mobile devices needs to provide flexibility and ease of use to enable users to login to the network and access the applications they need.  IBM’s Security Access Manager® and Aruba ClearPass provide a uniquely powerful way to extend risk-based access control across multiple application types for consistent security policies. Users can experience a single sign on for network and applications based on security policy and the context of the user access.  IBM Fiberlink MaaS360 Enterprise Mobility Manager and Aruba ClearPass work together to provide device level security for the mobile platform. Link to Webcast

Ensure applications availability and integrity with F5 BIG-IP Application Security Manager and IBM Security AppsScan

The Problem: Web applications represent a critical, if not the primary, customer interface for a growing number of organizations. In this environment, network firewalls are no longer sufficient to protect applications. Today’s multi-layer attacks increasingly target the application layer, where hidden vulnerabilities can be exploited with devastating effects on application availability, data security, customer confidence, and reputation, not to mention lost business and recovery costs.  Application scanners identify vulnerabilities, but correcting them takes time and resources while the vulnerabilities themselves remain open to exploit. Effective security requires the ability to not only identify weaknesses, but to immediately mitigate them to defeat emerging and opportunistic threats. Link to Webcast

End-to-End Mobile App Security: Build it Secure and Keep it Secure with IBM AppScan and Arxan

Annual revenues in the mobile based App Economy are estimated at $72 billion today and are expected to double to $151 billion by 2017. The fast adoption is driving rapid mobile app innovation, without understanding the security risks, and thereby providing attractive targets for compromising financial, IP and personal or confidential information. Link to Webcast

Webinar Recording Administrator Sessions with IBM Security Privileged Identity Manager and ObserveIT"

This webinar covered IBM Security Privilged Identity Manager and its integration with ObserveIT. Link to Webcast

RFISI - Program Update

Update on the Ready for Security Intelligence (RFISI) program Link to Webcast

RfISI Solution Series: Enhanced Authentication Solutions for IBM Security Access Manager for Web, from IBM Partners Entrust and Bio-Key International

The Ready for IBM Security Intelligence Program fosters a vibrant ecosystem that nurtures and supports Technology Partners’ integrations with specific IBM solutions.
Learn how Entrust, with Entrust IdentityGuard and Bio-Key, with ID Director increase identity assurance and enhance authentication mechanisms for IBM Security Access Manager for Web.
Link to webcast

RfISI Solution Series: Managing Unstructured Data with IBM Security Identity Manager (ISIM) and STEALTHbits StealthAUDIT technology

The Ready for IBM Security Intelligence Program fosters a vibrant ecosystem that nurtures and supports Technology Partners’ integrations with specific IBM solutions. Join the Webinar to learn how the newly validated solution, Data Governance for ISIM, from STEALTHbits Technologies enables IBM Security Identity Manager to provision and de-provision access to unstructured data (SharePoint, File Systems, SQL, etc). Data Governance for ISIM delivers the same automated access control of this unstructured data to ISIM, that you have come to know for application provisioning.
Link to webcast
Web application protection by using F5 solutions and  IBM Security AppScan. Safeguard your web applications by using F5 solutions to deploy policies that mitigate vulnerabilities identified by IBM Security AppScan. Link to webcast
Managing access to unstructured data assets such as file systems and Microsoft SharePoint portals. This new feature of STEALTHbits' flagship StealthAUDIT product enables organizations who have invested in IBM Security Identity Manager to leverage that investment for managing access to unstructured data assets such as file systems and Microsoft SharePoint portals. Link to webcast

Web Access Authentication Challenges and Persona-based Access

SecurIT will discuss how you can keep enterprise SSO alive and convenient, yet integrate and exploit strong authentication and transaction validation when security needs dictate.

Link to webcast

F5 BIG-IP Application Security Manager and IBM InfoSphere Guardium

Defend Your Data, Customers and Reputation: F5 BIG-IP Application Security Manager and IBM InfoSphere Guardium

Link to webcast
Ready for IBM Security Intelligence

Program Launch Presentation and Webcast

Link to Presentation

Link to Webcast