IBM Brings Cyber Threat Analytics to The Cloud
Delivers Power of QRadar Security Intelligence as a Cloud Service, New Managed Services Bring Added Skills, Expertise and Flexibility
ARMONK, NY - 21 Apr 2015: IBM (NYSE: IBM) today announced it is bringing its market-leading Security Intelligence technology, IBM QRadar®, to the cloud, giving companies the ability to quickly prioritize real threats and free up critical resources to fight cyberattacks. The new services are available to clients through a cloud-based Software as a Service (SaaS) model, with optional IBM Security Managed Services to provide deeper expertise and flexibility for security professionals.
- IBM Security Intelligence on Cloud – helps organizations determine if security-related events are simple anomalies or potential threats. Built as a cloud service using IBM QRadar, enterprises can quickly correlate security event data with threat information from over 500 supported data sources for devices, systems, and applications. This is complemented by more than 1500 pre-defined reports for use cases such as compliance, vulnerability management and security incident response. Also, the integration of QRadar with IBM’s recently announced cloud-based X-Force Exchange gives security teams volumes of historical and real time threat intelligence.
- Intelligent Log Management on Cloud - designed to simplify security and compliance data collection and reporting needs. Powered by IBM QRadar® technology, Intelligent Log Management uses analytics and a hosted, multi-tenant technology to rapidly deliver comprehensive compliance with powerful real-time correlation and anomaly detection capabilities. Through support for more than 400 platforms, security managers can also capture logs from nearly any device in their security operation.
“Organizations are facing a security data tsunami that can overwhelm even the most sophisticated enterprise’s security program,” said Jason Corbin, Vice President, Product Management and Strategy, IBM Security. “Security leaders are telling us they want increased visibility through the cloud and control throughout their hybrid IT environments. The option of doing predictive analytics via the cloud gives security teams the flexibility to bring in skills, innovation and information on demand across all of their security environments.”
Next Generation IBM Managed Services for Cloud Security
These new offerings are backed and delivered through IBM’s next-generation platform of managed security services, handling over 15 billion security events per day for over 4,000 clients around the world. IBM Security experts, located in ten global security operations centers (SOCs), are available on demand 24x7. These IBM analysts and engineers help clients detect and protect themselves from security risks often before software fixes are released to the market—giving IBM clients an additional edge when it comes to safeguarding their computers, networks and corporate “crown jewels.”
The unique IBM capabilities consolidate diverse security environments across existing platforms, as well as private, public and hybrid clouds under a “single pane of glass”— helping customers transform and optimize their overall security operations. This approach helps businesses better integrate security threat intelligence, big data and analytics with customized services. Also, clients can experience improved threat response times, while potentially reducing overall security costs by an average of 55 percent. This also significantly improves threat detection, helping clients automatically triage up to 95 percent of their security events.
About IBM Security
IBM’s security platform provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. IBM operates one of the world’s broadest security research and development, and delivery organizations. For more information, please visitwww.ibm.com/security, follow @IBMSecurity on Twitter or visit the IBM Security Intelligenceblog.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.