Security involves many activities: controlling user access, hardening applications, inspecting network traffic, patching systems, and monitoring databases, among others. IBM offers solutions for all of these. However, optimum security requires gaining insight by combining data from across your security infrastructure.
This live demonstration shows two simple realistic scenarios. In the first a user browses and then attacks an application. In the second, a privileged user manipulates a database. IBM Security detects and secures these activities. The information is correlated; yielding Security Intelligence. The demonstration can be found HERE.
The demonstrated products are:
IBM Security QRadar
IBM Security Web Gateway
IBM Security Network Intrusion Prevention System
IBM InfoSphere Guardium
IBM Endpoint Manager
IBM Security AppScan Enterprise
The content is a short slide presentation followed by a live demonstration by David Druker.