MC Press Online

Thursday, May 25th

Last updateMon, 22 May 2017 4pm

You are here: Home VIDEOS IBM Videos IBM Security Highest Rated
IBM Security
Wednesday, 23 November 2016 18:48

Insider Threat Protection Services from IBM

Written by

Are you taking the right steps to protect your organization from insider threats? IBM X-Force data shows that 60% of all attacks involved insiders in 2015, and 44.5% involved malicious, trusted users. Keeping your organization safe starts with your people – knowing who they are, and being able to predict or spot malicious behaviors.

IBM Security has launched a new team of global experts - IBM X-Force IRIS, to help clients prepare for and rapidly respond to security threats. Our seasoned experts and consultants deliver threat intelligence services, incident preparedness planning and onsite response services to help organizations stay ahead of the threat.

http://ibm.co/2cwsKOK

X-Force Command Center, IBM Security's global array of Security Operations Centers, protect 4,500 clients across 133 countries.
X-Force Command Centers serve as IBM Security’s global threat monitoring and intelligence centers, built with cognitive in mind. Acting as a single global entity, the command centers provide 24/7/365 security monitoring for IBM’s Managed Security Services clients. X-Force Command Centers currently handle over 20 billion security events per day, with the capability to scale to over 35 billion+ security events daily (or 1 TRILLION events each month.)
The 24x7 “watch floor” within the SOC incorporates state-of-the-art technology, programs, processes and facilities that increase collaboration and capacity to help our analysts work smarter.
Our analysts have access to tools like Watson for Cyber Security arming them with the ability to quickly synthesize large amounts of data and come to evidenced based recommendations and conclusions quickly for our clients.
Using the IBM X-Force Intelligence, the SOCs bring in 200 thousand new pieces of threat intelligence daily by leveraging insights from analysis of over 100 million web pages and images, collect data from 270 million endpoints, and pull in the expansive library of threat research from IBM’s X-Force Threat Intelligence team.

www.ibm.com/security/XForceCommand

Cognitive computing is about augmenting our traditional computing systems with an understanding of formerly opaque data such as natural human language, imagery, etc. In this video Jeb Linton, Chief Security Architect at IBM Watson Group, describes how marrying the worlds of structured and semi-structured machine data to the world of natural language provides a more complete picture of the security landscape.

To learn more, please visit: http://ibm.co/2eWAbfX

Wednesday, 23 November 2016 19:33

IBM X-Force Command Center

Written by

IBM X-Force Command Centers represent a quantum leap in IBM Security’s core capabilities and are built upon the latest era of cognitive security solutions and the industries top talent. By combining leading technology, industry proven processes, and the support of skilled security experts, IBM X-Force Command Centers help clients stay ahead of the most advanced threats.

With our move to X-Force Command Center we expand traditional security operation center (SOC) functions and to include threat management, threat hunting, SIEM services, cognitive and even cyber range functionality.

IBM X-Force Command Center introduces the first commercial cyber range built in a state-of-the-art facility that immerses clients/potential clients in a simulated SOC using tactics and protocols designed to anticipate and defend against current and future cyber threats. It will provide critical cyber security-related crisis leadership skills in a safe “live fire” environment where participants can experience the effects of live malware, DDoS, and other traditional and more advanced attacks. The participants will operate real tools, investigate active infections, and respond to internal and external cyber security events.

This cyber simulator provides clients with unique hands-on experience to understand the dynamics of a cyber attack. Not only does our cyber range emulate a training environment but also explores actual IP addresses of sites to uncover malware and mimics any industry to identify specific malware prone to attack so our centers can help defend against it. It empowers organizations to understand potential security tools and services needed, improves an organization’s skills regarding incident response and crisis management, and enhances collaboration and communication when responding to an attack.

www.ibm.com/security/XForceCommand

IBM Security Master Inventor, Mike Spisak and his son Evan develop a voice-enabled digital assistant for cybersecurity analysts using Watson technology.

Ensuring users have proper access to apps and systems is critical to security, compliance and business success. While IT traditionally handles these identity governance and management activities, they are far from the only stakeholder that needs to be involved. Security groups, audit departments, and line of business leaders are also essential in deciding what users should go where in an IT environment. However, complexity of traditional identity systems with complex roles or IT entitlements has left these key players in the dark.

IBM Security Identity Governance and Intelligence uses business-centric activity data that all stakeholders can understand, leading to properly assigned access. When end users and line of business managers understand the nature of the access they are requesting and certifying, access is more compliant and secure.

To find out more about IBM’s leading solution, check out the 2017 Gartner Identity Governance and Administration Magic Quadrant

http://ibm.co/2nabAw7

In this presentation, IBM Product Security Brand Lead Paul Ionescu demonstrates how fixing cross-site scripting vulnerabilities is similar to the Whack-a-mole arcade game. Each time the developer enacts a potential fix, the hacker returns with a different payload to bypass the protection -- resulting in an ongoing cycle, or an endless game of Whack-a-mole.

To learn how IBM Security AppScan protects against cross-scripting and other web application attacks, please visit:
https://www.ibm.com/us-en/marketplace...

AT&T CEO Randall Stephenson joins IBM CEO Ginni Rometty for her InterConnect 2017 keynote to outline how customers benefit from their business partnership. As Randall describes, it all begins with enrolling endpoints in IBM MaaS360 to enable secure access to proprietary data and network resources. Ginni adds that the insights that businesses can glean from in-depth analytics, and the security that can be achieved at high volume with the Internet of Things (IoT), are both imperative to client success.

Taylor’s company uses MaaS360 with Watson, IBM’s unified endpoint management platform with cognitive intelligence and analytical capabilities. Greg’s organization uses a traditional EMM solution, built for a simpler time, without any cognitive capabilities. Even though they have similar IT responsibilities, on a typical day, Taylor and Greg have a different “to-do” list. Join them for a standard day at the office, and decide which solution you’d rather use to help your business achieve its digital transformation.

Page 1 of 2