Security involves many activities: controlling user access, hardening applications, inspecting network traffic, patching systems, and monitoring databases, among others. IBM offers solutions for all of these. However, optimum security requires gaining insight by combining data from across your security infrastructure.
This live demonstration shows two simple realistic scenarios. In the first a user browses and then attacks an application. In the second, a privileged user manipulates a database. IBM Security detects and secures... [More]