11 Posts

Rahul Agarwal

Portfolio Marketing Manager, IBM

Rahul Agarwal is a Portfolio Marketing Manager for Security Services on the IBM Security Marketing team. Rahul has over 12 years of experience in marketing, strategy pre-sales and software development. Having joined IBM 3 years ago, Rahul was responsible for marketing IBM Data Warehousing Software and Solutions before joining the Security team. Rahul is an alumni of the Indian Institute of Management, Kozhikode and is currently based out of Bangalore, India.

Written By Rahul Agarwal

‘All the Queen’s Horses’: A Real-World Use Case for Managing Insider Threats

On Sept. 6, director Kelly Richmond Pope will discuss a case in which a small town official stole $53 million in public funds over two decades to illustrate the importance of managing insider threats.

On the Hunt: Neutralize Malicious Actors With Proactive Threat Hunting

Threat hunting enables security teams to shift from simply responding to attacks to proactively identifying and mitigating threats before they hit enterprise networks.

Migrating to SAP HANA? How Can You Ensure Security of Your Business-Critical Data?

The move to SAP Business Suite 4 SAP HANA requires a thorough security impact assessment that addresses external threats, governance, risk management and other factors to ensure a secure migration.

Software-Defined Security With SD-WAN

It's no wonder organizations are embracing SD-WAN, which abstracts various connectivity options to provide a virtualized enterprise WAN.

Getting Ahead of SD-WAN Security With the Zero Trust Model

According to recent studies, security is the top concern among organizations implementing software-defined wide area network (SD-WAN) technology.

Five Steps to Propel Your Privileged Identity Management Strategy to the Next Level

Privileged accounts are among the juiciest targets for fraudsters. Follow these five simple steps to become a privileged identity management pro.

Abuse of Privileges: Common Barriers to Managing Privileged Accounts

Companies often face challenges related to shared IDs, third-party access, regulatory compliance and privilege creep when managing privileged accounts.

Privileged Identity Management for the Extended Enterprise

IT professionals are adopting privileged identity management solutions to monitor third-party access without sacrificing speed or ease of use.

Identify Vulnerabilities in Your IT Infrastructure, Policies and Procedures Before the Bad Guys Do

Penetration testing is one of the most effective ways to monitor the security of your IT environment and identify vulnerabilities.

Insider Threats in India: Is It Time to Focus on Privileged Users?

Insider threats can be even more devastating to an Indian organization than distributed denial-of-service (DDoS) or malware attacks.