Hi [[ session.user.profile.firstName ]]

Security Intelligence

  • Date
  • Rating
  • Views
  • Avoiding the Front Page; Security Strategies to Stay Out of the Headlines
    Avoiding the Front Page; Security Strategies to Stay Out of the Headlines
    Chris Poulin, Security Systems Strategist, at IBM Security Division & Bola Rotibi, Founding Member (ISC)2 security board Recorded: Sep 12 2012 61 mins
    On September 26, 2012 Join hosts Chris Poulin, Security Systems Strategist, at IBM Security Division and Bola Rotibi, Founding Member (ISC)2 security board, to learn in depth how Security Intelligence really allows deep, insightful and most importantly real-time analysis to save your organization from being on the front page of the newspapers the next day a breach occurs.

    In this educational webinar, you will:

    - Gain tips on why context and situational awareness are necessary for advanced threat detection and behavioral analysis
    - Hear how other organizations are using security intelligence to combat insider threats and critical customer information
    - Learn how to detect threats that many security solutions miss
    - Providing a strategy to understand your own network and learn what to monitor efficiently
  • Making Security Intelligence Real: Delivering Insight with Agility
    Making Security Intelligence Real: Delivering Insight with Agility
    Michael Applebaum, Director Product Marketing, Q1 Labs, an IBM Company Recorded: Aug 9 2012 46 mins
    In addition to petty criminals and fraudulent insiders, hacktivists and advanced attackers now threaten many businesses. In response, organizations are using Security Intelligence (SI) to gain 360-degree visibility and achieve a more proactive security posture.

    The SI approach uses broader data and smarter analytics, such as anomaly detection, to deliver more accurate insights. Built with next-generation SIEM, Security Intelligence avoids the drawbacks of first-generation products: slow and expensive to deploy; difficult to manage; unable to evolve. Instead, it uses a modular and flexible approach, applying security-specific analytics to big security data in a highly manageable way. This session will share real-world Security Intelligence best practices and Q1 Labs customer successes.

Embed in website or blog