Identity & Access November 1, 2017 Accelerate the Value Gain With Identity Governance and Administration 4 min read - The B-2-C-12 formula enables security professionals to demonstrate the value gain of their identity governance and administration investments faster.
October 27, 2017 Future-Proof Your Access Management With Single Sign-On: A Lesson From Luxembourg 2 min read - Security professionals need an identity and access management solution that delivers single sign-on capabilities and can adapt to business change.
Data Protection October 23, 2017 Three Tips to Help Your Organization Hit Data Protection Out of the Park 5 min read - Although data protection is crucial to the success of any business, many employees still circumvent security policies they mistakenly deem superfluous.
October 19, 2017 Secure Your Endpoints With QRadar Content for Sysmon 3 min read - IBM QRadar Content for Sysmon enables security teams to detect advanced threats such as WannaCry as well as older, tried-and-true endpoint attacks.
Endpoint September 25, 2017 Worried About Apache Struts? Stay One Step Ahead of Endpoint Attacks 2 min read - Security teams needs advanced visibility into all endpoints across the organization to prevent endpoint attacks such as the recent Apache Struts exploit.
Security Services September 20, 2017 IBM Named a Leader in Latest IDC Worldwide MarketScape 3 min read - IBM was named a leader in the "IDC MarketScape: Worldwide Managed Security Services 2017 Vendor Assessment" for its ability to integrate MSS globally.
Artificial Intelligence September 15, 2017 Green Security Technology: The New Corporate Color? 4 min read - Companies all over the world are going green, but due to budgetary limitations and industry customs, many have yet to adopt green security technology.
Intelligence & Analytics September 8, 2017 A Basic Model to Measure SIEM Maturity 4 min read - Companies looking to improve their ability to protect, control and monitor their technology infrastructures should follow this basic SIEM maturity model.
Intelligence & Analytics September 5, 2017 Seven Steps to Improve Your Security Operations and Response 3 min read - Organizations can improve their security operations and response capabilities by adopting a multilayered approach driven by cognitive technology.
Artificial Intelligence August 31, 2017 Weighing the Benefits and Challenges of Cognitive Adoption 3 min read - While it promises to improve quality of life across the globe, many are resistant to widespread cognitive adoption due to fear of change and other factors.