MC Press Online

Tuesday, Jun 27th

Last updateTue, 27 Jun 2017 9am

You are here: Home VIDEOS IBM Videos IBM Security Newest
IBM Security
Monday, 17 April 2017 12:36

The Art of Threat Hunting

Written by

No matter how secure you think your organization is, determined attackers will find a way in. What's worse, is once they are in, they often go undetected for weeks, or even months. So how can you identify and disrupt these unknown attackers and threats? Cyber threat hunting. Cyber threat hunting is a new practice many mature organizations are now folding into their security strategy. It takes advantage of all available data sources, both internal and external, to generate a comprehensive understanding of your threat scape while developing actionable intelligence about how to counter or mitigate these threats. Tune in to our next Cyber Beat episode to learn more about cyber threat hunting, and how your organization can start proactively identifying your unknown cyber threats.

In Part 3 of this 3-part tech talk, Vlad Langman explains the phases of a Guardium upgrade to v10 and where to find diagnostics.

In Part 2 of this 3-part tech talk, Omar Raza gives guidance on how to prepare for an upgrade and what to expect during the upgrade.

In Part 1 of this 3-part tech talk, Vlad Langman describes planning considerations for upgrading to Guardium V10 and provides enterprise upgrade strategies for a variety of starting point environments.

IBM Trusteer incorporates cognitive technologies into its fraud solutions to help financial services organizations detect and prevent online fraud. These cognitive capabilities use machine learning and patented analytics that go well beyond the capacity of traditional security measures. Behavioral biometrics used in IBM Pinpoint Detect help to welcome in legitimate customers by understanding their behavior, in context, from login through logout. IBM Trusteer Rapport helps to protect your customers from phishing attacks at a speed and scale like never before. IBM Trusteer provides a holistic approach to help protect your organization and customers from cyber criminals.

Preventing phishing success with cognitive fraud detection:

Scott Forstie demonstrates Guardium V10 monitoring and reporting capabilities for IBM i (DB2 for i, iseries, etc).

Thursday, 30 March 2017 09:39

Unified Endpoint Management For Dummies

Written by

How does anyone manage to support rapid device growth within their environment? Let alone provide their users with on-demand, secure access to enterprise data and resources? While remaining compliant with the latest data privacy regulations?

You’re probably juggling multiple MDM systems, EMM platforms, and client management tools, while looking for another solution to manage The Internet of Things. Unfortunately, this diversity is costly, time consuming, and most of all, ineffective.

What’s needed is a single platform that will integrate, manage, and secure all endpoints, end users, and everything in between.

Free 30-day Trial:

IBM Trusteer introduces phishing protection using machine learning and advanced analytics to help detect evolving phishing attacks. This new technology continuously analyzes data from millions of endpoints to identify thousands of phishing sites. This new cognitive approach to phishing protection can automatically block users from accessing malicious sites at a speed and scale like never before, protecting users within minutes of detection. Phishing protection using machine learning is a huge leap forward in the speed, accuracy, and volume of phishing detection.

Taylor’s company uses MaaS360 with Watson, IBM’s unified endpoint management platform with cognitive intelligence and analytical capabilities. Greg’s organization uses a traditional EMM solution, built for a simpler time, without any cognitive capabilities. Even though they have similar IT responsibilities, on a typical day, Taylor and Greg have a different “to-do” list. Join them for a standard day at the office, and decide which solution you’d rather use to help your business achieve its digital transformation.

AT&T CEO Randall Stephenson joins IBM CEO Ginni Rometty for her InterConnect 2017 keynote to outline how customers benefit from their business partnership. As Randall describes, it all begins with enrolling endpoints in IBM MaaS360 to enable secure access to proprietary data and network resources. Ginni adds that the insights that businesses can glean from in-depth analytics, and the security that can be achieved at high volume with the Internet of Things (IoT), are both imperative to client success.

Page 1 of 2