Resources
See latest resources »
IBM Security Analysis

IBM Security Analysis

Source:

Security and protection is at the top of every IT manager's list of priorities. IBM have put together a full package of research and analysis looking at every aspect of enterprise security management. Research includes Security Intelligence, Advanced Threat Protection, Application Security, and Identity and Access.

Click below to register and download each research package.

Security Intelligence

  • IBM QRadar Security Intelligence: Perception Capture Study - Ponemon Institute showcase their results from interviews with QRadar clients.
  • Securosis paper: Security Management 2.5: Replacing Your SIEM Yet? - Securosis, analyst paper discuss the changing needs for SIEM and how the overall platform has evolved to include deeper forensics and analytics.
  • IBM Security QRadar Incident Forensics - In this white paper, we go into detail on IBM Security QRadar Incident Forensics and how the solution provides detailed analytical capabilities for organizations to be able to do detailed forensics on potential attacks.
  • Building a security incident response plan that works - Top ten mistakes security organizations make with their Computer Security Incident Response Plans.

Click here to access the research package 


Advanced Threat Protection

  • Tolly Test Report: IBM Security Network IPS GX7800 - Tolly Group evaluates the security and performance of the IBM Security Network IPS GX7800 vs. a standard signature-based platform.
  • Info-Tech Vendor Landscape: Intrusion Detection & Prevention Systems - Info-tech: Vendor Landscape: Intrusion Detection and Prevention Systems
  • Forrester: Supporting the Zero Trust Model of Information Security - In this Forrester Research paper, analyst John Kindervag, will discusses the “zero trust” model for security and best practices to combat these new generation of threats.

Click here to access the research package


Application Security

  • What can you do differently to guard against threats from rapidly evolving mobile malware? - Mobile security is more than protecting the device. It is protecting applications on the device and preventing data leakage in the enterprise. IBM Security AppScan helps determine vulnerabilities early in the application development cycle to eliminate vulnerabilities malware can exploit.
  • Five critical steps to achieving an effective application security program - This white paper provides five practical steps organizations can incorporate into every phase of the development process to improve their application security postures, as well as an overview of application threats and the types of risks they need to prioritize and remediate.
  • Info-Tech Vendor Landscape: Intrusion Detection & Prevention Systems - In this analyst report, Info-Tech detail out how the vendor landscape and how to reduce risks to critical systems and data with IDPS-enabled visibility and responsiveness. IBM can be found in the champion zone of the landscape.
  • Gartner Magic Quadrant for Application Security - Gartner has just published the results of their Magic Quadrant (MQ) on the Application Security Testing (AST) market and IBM was rated as the leader. According to Gartner, to be positioned in the Leaders Quadrant for Application Security Testing (AST), vendors must demonstrate both "completeness of vision" and an "ability to execute."

Click here to access the research package


Identity and Access

  • EMA: Identity and Access Intelligence - In this IBM-sponsored paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution.
  • IDC Product Flash: IBM Releases Threat-Aware and Identity Life-Cycle Management for Mobile, Cloud, and Enterprise - Industry analyst firm IDC reviews the latest release of IBM Security identity and access management (IAM) solutions. Download the report to learn how IBM IAM solutions provide: · Simplified user interface and dashboards · Context-aware mobile user access · Stronger auditing and privacy controls
  • Stay ahead of insider threats with predictive, intelligent security - It has become more important to secure critical information and related assets from insider threats. IBM has the ability to identify and protect against internal threats through a distinctive combination of robust foundational controls and intelligent reporting and management tools.

Click here to access the research package

Comments: (0)

Analysis resources
See all Analysis resources »
What’s Next for Nordic Payments?
/analysis

What’s Next for Nordic Payments?

The Rise of Real-Time and cross-Border, by Peter Larsson, Principal Solutions Consultant, Real-Time Payments - Europe & North America

T2/T2S Consolidation: Can digital transformation be an opportunity for liquidity management?
/analysis

T2/T2S Consolidation: Can digital transformation be an opportunity for liquidity management?

The Eurosystem project to consolidate TARGET2 and T2S and to meet changing market needs by enabling a truly real-time 24x7 settlement infrastructure for cash, securities and collateral aims at increasing efficiencies and optimising liquidity management across all TARGET Services.

SCA exemption: the perfect storm for machine learning
/analysis

SCA exemption: the perfect storm for machine learning

The payments community is well used to the abundance of acronyms that has become its legislation of late, but less so to the grey overlaps between various directives and standards - least of all Strong Customer Authentication (SCA) within the online and e-commerce payment experience.