MC Press Online

Thursday, Mar 30th

Last updateThu, 30 Mar 2017 1pm

You are here: Home VIDEOS IBM Videos IBM Security
Thursday, 30 March 2017 09:39

Unified Endpoint Management For Dummies

Written by

How does anyone manage to support rapid device growth within their environment? Let alone provide their users with on-demand, secure access to enterprise data and resources? While remaining compliant with the latest data privacy regulations?

You’re probably juggling multiple MDM systems, EMM platforms, and client management tools, while looking for another solution to manage The Internet of Things. Unfortunately, this diversity is costly, time consuming, and most of all, ineffective.

What’s needed is a single platform that will integrate, manage, and secure all endpoints, end users, and everything in between.

Free 30-day Trial:

IBM Trusteer introduces phishing protection using machine learning and advanced analytics to help detect evolving phishing attacks. This new technology continuously analyzes data from millions of endpoints to identify thousands of phishing sites. This new cognitive approach to phishing protection can automatically block users from accessing malicious sites at a speed and scale like never before, protecting users within minutes of detection. Phishing protection using machine learning is a huge leap forward in the speed, accuracy, and volume of phishing detection.

Taylor’s company uses MaaS360 with Watson, IBM’s unified endpoint management platform with cognitive intelligence and analytical capabilities. Greg’s organization uses a traditional EMM solution, built for a simpler time, without any cognitive capabilities. Even though they have similar IT responsibilities, on a typical day, Taylor and Greg have a different “to-do” list. Join them for a standard day at the office, and decide which solution you’d rather use to help your business achieve its digital transformation.

AT&T CEO Randall Stephenson joins IBM CEO Ginni Rometty for her InterConnect 2017 keynote to outline how customers benefit from their business partnership. As Randall describes, it all begins with enrolling endpoints in IBM MaaS360 to enable secure access to proprietary data and network resources. Ginni adds that the insights that businesses can glean from in-depth analytics, and the security that can be achieved at high volume with the Internet of Things (IoT), are both imperative to client success.

In this presentation, IBM Product Security Brand Lead Paul Ionescu demonstrates how fixing cross-site scripting vulnerabilities is similar to the Whack-a-mole arcade game. Each time the developer enacts a potential fix, the hacker returns with a different payload to bypass the protection -- resulting in an ongoing cycle, or an endless game of Whack-a-mole.

To learn how IBM Security AppScan protects against cross-scripting and other web application attacks, please visit:

Ensuring users have proper access to apps and systems is critical to security, compliance and business success. While IT traditionally handles these identity governance and management activities, they are far from the only stakeholder that needs to be involved. Security groups, audit departments, and line of business leaders are also essential in deciding what users should go where in an IT environment. However, complexity of traditional identity systems with complex roles or IT entitlements has left these key players in the dark.

IBM Security Identity Governance and Intelligence uses business-centric activity data that all stakeholders can understand, leading to properly assigned access. When end users and line of business managers understand the nature of the access they are requesting and certifying, access is more compliant and secure.

To find out more about IBM’s leading solution, check out the 2017 Gartner Identity Governance and Administration Magic Quadrant

IBM Security Master Inventor, Mike Spisak and his son Evan develop a voice-enabled digital assistant for cybersecurity analysts using Watson technology.

Cognitive computing is about augmenting our traditional computing systems with an understanding of formerly opaque data such as natural human language, imagery, etc. In this video Jeb Linton, Chief Security Architect at IBM Watson Group, describes how marrying the worlds of structured and semi-structured machine data to the world of natural language provides a more complete picture of the security landscape.

To learn more, please visit:

IBM Security has launched a new team of global experts - IBM X-Force IRIS, to help clients prepare for and rapidly respond to security threats. Our seasoned experts and consultants deliver threat intelligence services, incident preparedness planning and onsite response services to help organizations stay ahead of the threat.

Wednesday, 23 November 2016 19:33

IBM X-Force Command Center

Written by

IBM X-Force Command Centers represent a quantum leap in IBM Security’s core capabilities and are built upon the latest era of cognitive security solutions and the industries top talent. By combining leading technology, industry proven processes, and the support of skilled security experts, IBM X-Force Command Centers help clients stay ahead of the most advanced threats.

With our move to X-Force Command Center we expand traditional security operation center (SOC) functions and to include threat management, threat hunting, SIEM services, cognitive and even cyber range functionality.

IBM X-Force Command Center introduces the first commercial cyber range built in a state-of-the-art facility that immerses clients/potential clients in a simulated SOC using tactics and protocols designed to anticipate and defend against current and future cyber threats. It will provide critical cyber security-related crisis leadership skills in a safe “live fire” environment where participants can experience the effects of live malware, DDoS, and other traditional and more advanced attacks. The participants will operate real tools, investigate active infections, and respond to internal and external cyber security events.

This cyber simulator provides clients with unique hands-on experience to understand the dynamics of a cyber attack. Not only does our cyber range emulate a training environment but also explores actual IP addresses of sites to uncover malware and mimics any industry to identify specific malware prone to attack so our centers can help defend against it. It empowers organizations to understand potential security tools and services needed, improves an organization’s skills regarding incident response and crisis management, and enhances collaboration and communication when responding to an attack.

Page 1 of 2