MC Press Online

Wednesday, Jun 28th

Last updateTue, 27 Jun 2017 9am

You are here: Home VIDEOS IBM Videos IBM Security Reverse Alphabetic
IBM Security

AT&T CEO Randall Stephenson joins IBM CEO Ginni Rometty for her InterConnect 2017 keynote to outline how customers benefit from their business partnership. As Randall describes, it all begins with enrolling endpoints in IBM MaaS360 to enable secure access to proprietary data and network resources. Ginni adds that the insights that businesses can glean from in-depth analytics, and the security that can be achieved at high volume with the Internet of Things (IoT), are both imperative to client success.

Thursday, 30 March 2017 09:39

Unified Endpoint Management For Dummies

Written by

How does anyone manage to support rapid device growth within their environment? Let alone provide their users with on-demand, secure access to enterprise data and resources? While remaining compliant with the latest data privacy regulations?

You’re probably juggling multiple MDM systems, EMM platforms, and client management tools, while looking for another solution to manage The Internet of Things. Unfortunately, this diversity is costly, time consuming, and most of all, ineffective.

What’s needed is a single platform that will integrate, manage, and secure all endpoints, end users, and everything in between.

Free 30-day Trial:

IBM Trusteer introduces phishing protection using machine learning and advanced analytics to help detect evolving phishing attacks. This new technology continuously analyzes data from millions of endpoints to identify thousands of phishing sites. This new cognitive approach to phishing protection can automatically block users from accessing malicious sites at a speed and scale like never before, protecting users within minutes of detection. Phishing protection using machine learning is a huge leap forward in the speed, accuracy, and volume of phishing detection.

Monday, 17 April 2017 12:36

The Art of Threat Hunting

Written by

No matter how secure you think your organization is, determined attackers will find a way in. What's worse, is once they are in, they often go undetected for weeks, or even months. So how can you identify and disrupt these unknown attackers and threats? Cyber threat hunting. Cyber threat hunting is a new practice many mature organizations are now folding into their security strategy. It takes advantage of all available data sources, both internal and external, to generate a comprehensive understanding of your threat scape while developing actionable intelligence about how to counter or mitigate these threats. Tune in to our next Cyber Beat episode to learn more about cyber threat hunting, and how your organization can start proactively identifying your unknown cyber threats.

In Part 3 of this 3-part tech talk, Vlad Langman explains the phases of a Guardium upgrade to v10 and where to find diagnostics.

In Part 2 of this 3-part tech talk, Omar Raza gives guidance on how to prepare for an upgrade and what to expect during the upgrade.

In Part 1 of this 3-part tech talk, Vlad Langman describes planning considerations for upgrading to Guardium V10 and provides enterprise upgrade strategies for a variety of starting point environments.

IBM Security Master Inventor, Mike Spisak and his son Evan develop a voice-enabled digital assistant for cybersecurity analysts using Watson technology.

Wednesday, 23 November 2016 18:48

Insider Threat Protection Services from IBM

Written by

Are you taking the right steps to protect your organization from insider threats? IBM X-Force data shows that 60% of all attacks involved insiders in 2015, and 44.5% involved malicious, trusted users. Keeping your organization safe starts with your people – knowing who they are, and being able to predict or spot malicious behaviors.

IBM Security has launched a new team of global experts - IBM X-Force IRIS, to help clients prepare for and rapidly respond to security threats. Our seasoned experts and consultants deliver threat intelligence services, incident preparedness planning and onsite response services to help organizations stay ahead of the threat.

Page 1 of 2