Open Cybersecurity Alliance: An Open Source Initiative for Enabling Improved Interoperability
3 min read - The Open Cybersecurity Alliance (OCA) project, an OASIS Open Project with IBM Security and others, aims to help security vendors more capably exchange threat information and improve interoperability.
KuppingerCole Analysts Zoom Out in New Report to Capture IT Landscape’s Complexity
3 min read - The IT landscape is becoming more complex every day. To manage this complexity, companies need integrated, best-of-breed data protection solutions that secure both structured and unstructured data.
3 Barriers to Identity and Access Management (IAM) Modernization
3 min read - Organizations of all sizes are struggling to modernize their identity and access management programs due to incomplete IAM strategies, poor alignment with the business, legacy systems and more.
UEM’s Sophomore Year: ‘2019 Gartner Magic Quadrant for Unified Endpoint Management Tools’
4 min read - IBM was named a Leader in the "2019 Gartner Magic Quadrant for Unified Endpoint Management" for its ability to execute and lead the entire field of vendors in its completeness of vision.
Gartner Releases 2019 Market Guide for SOAR Solutions
3 min read - In its new market guide for security orchestration and automation, Gartner predicted, "By year-end 2022, 30{30bfbf8d9f2833f0337133e196b4dc87825dfb7d33a3602d05ee876ecd6f1178} of organizations with a security team larger than five people will leverage SOAR tools."
The Digital Identity Trust Life Cycle: Onboarding and Deploying a Fraud Protection Vendor
5 min read - Digital trust expert Rob Rendell explains what components are important for a smooth kickoff and how to prepare both your team and your new fraud protection vendor's team.