25 April 2018
Visit www.nextgenbanking.co.uk

IBM Security Analysis

30 June 2014  |  32209 views  |  0 IBM Logo

Security and protection is at the top of every IT manager's list of priorities. IBM have put together a full package of research and analysis looking at every aspect of enterprise security management. Research includes Security Intelligence, Advanced Threat Protection, Application Security, and Identity and Access.

Click below to register and download each research package.

Security Intelligence

  • IBM QRadar Security Intelligence: Perception Capture Study - Ponemon Institute showcase their results from interviews with QRadar clients.
  • Securosis paper: Security Management 2.5: Replacing Your SIEM Yet? - Securosis, analyst paper discuss the changing needs for SIEM and how the overall platform has evolved to include deeper forensics and analytics.
  • IBM Security QRadar Incident Forensics - In this white paper, we go into detail on IBM Security QRadar Incident Forensics and how the solution provides detailed analytical capabilities for organizations to be able to do detailed forensics on potential attacks.
  • Building a security incident response plan that works - Top ten mistakes security organizations make with their Computer Security Incident Response Plans.

Click here to access the research package 

Advanced Threat Protection

  • Tolly Test Report: IBM Security Network IPS GX7800 - Tolly Group evaluates the security and performance of the IBM Security Network IPS GX7800 vs. a standard signature-based platform.
  • Info-Tech Vendor Landscape: Intrusion Detection & Prevention Systems - Info-tech: Vendor Landscape: Intrusion Detection and Prevention Systems
  • Forrester: Supporting the Zero Trust Model of Information Security - In this Forrester Research paper, analyst John Kindervag, will discusses the “zero trust” model for security and best practices to combat these new generation of threats.

Click here to access the research package

Application Security

  • What can you do differently to guard against threats from rapidly evolving mobile malware? - Mobile security is more than protecting the device. It is protecting applications on the device and preventing data leakage in the enterprise. IBM Security AppScan helps determine vulnerabilities early in the application development cycle to eliminate vulnerabilities malware can exploit.
  • Five critical steps to achieving an effective application security program - This white paper provides five practical steps organizations can incorporate into every phase of the development process to improve their application security postures, as well as an overview of application threats and the types of risks they need to prioritize and remediate.
  • Info-Tech Vendor Landscape: Intrusion Detection & Prevention Systems - In this analyst report, Info-Tech detail out how the vendor landscape and how to reduce risks to critical systems and data with IDPS-enabled visibility and responsiveness. IBM can be found in the champion zone of the landscape.
  • Gartner Magic Quadrant for Application Security - Gartner has just published the results of their Magic Quadrant (MQ) on the Application Security Testing (AST) market and IBM was rated as the leader. According to Gartner, to be positioned in the Leaders Quadrant for Application Security Testing (AST), vendors must demonstrate both "completeness of vision" and an "ability to execute."

Click here to access the research package

Identity and Access

  • EMA: Identity and Access Intelligence - In this IBM-sponsored paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution.
  • IDC Product Flash: IBM Releases Threat-Aware and Identity Life-Cycle Management for Mobile, Cloud, and Enterprise - Industry analyst firm IDC reviews the latest release of IBM Security identity and access management (IAM) solutions. Download the report to learn how IBM IAM solutions provide: · Simplified user interface and dashboards · Context-aware mobile user access · Stronger auditing and privacy controls
  • Stay ahead of insider threats with predictive, intelligent security - It has become more important to secure critical information and related assets from insider threats. IBM has the ability to identify and protect against internal threats through a distinctive combination of robust foundational controls and intelligent reporting and management tools.

Click here to access the research package

Comments: (0)

Comment on this story (membership required)

Related company information

IBM Financial Services

Related blogs

Create a blog about this story (membership required)

Solution source

Search by company or single key word