7 Posts

Satyakam Jyotiprakash

Portfolio Marketing Manager, Security Operations and Response Solutions, IBM Security

Satyakam Jyotiprakash is the worldwide Portfolio Marketing Manager for IBM Security Operations and Response (SOAR) solutions. In his previous role, he was the Offering Management and Alliance Leader for IBM Security Services in India/South Asia. With overall 12 years of experience in IT Security marketing, strategy and alliance management roles, he is passionate about developing superior strategies and tactics to collaborate with partners and win against competition. He specializes in communicating the market trends and business values of security solutions in the era of cloud and cognitive IT.

Written By Satyakam Jyotiprakash

Five Advantages of Cloud-Based SIEM for Security Intelligence and Operations

Moving SIEM to the cloud enables QRadar customers to increase time to value, address the IT skills shortage and maintain control of their infrastructures.

Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks

By integrating phishing intelligence with an SIEM solution, security analysts can proactively monitor APTs and manage risks related to phishing attacks.

Mobile Security: The Casino Bouncer Who Sniffs the Mobile IDs

Are you attending Insight 2015 because you are worried about your highly fragmented IT security posture? Mobile security could be causing this concern.

Secure Access Powered by Intelligence: Are You Ready?

An effective access management solution must be powered by intelligence to prevent illegitimate access, identify anomalies and proactively reduce risk.

See Clearly in the Cloud Through Self-Service Security

Depending on which type of cloud model they use, organizations must provide different types of security to keep their enterprises safe from threats.

Secure, Convenient Mobile Access: The Impossible Dream?

Mobile devices are vulnerable to attacks. It's critical for businesses to ensure mobile identities are not compromised and mobile access is secure.

People Access: The Weakest Link in Security

In this era of mobile, cloud and social, have you done enough to secure access to your most critical business resources? Security is as strong as its weakest link, and the weakest link these days is people, your users who access your business...