Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
Computing
Tame your scariest paperwork. Find Out How
Average Rating:
Rate this article:  
IBM Talks Security Intelligence To Beat the Bad Guys
IBM Talks Security Intelligence To Beat the Bad Guys

By Jennifer LeClaire
February 24, 2012 10:27AM

Bookmark and Share
"What we hear loud and clear from our clients," says Michael Applebaum of IBM's Security Systems Division, "is they're locked in an intelligence arms race and they're looking for tools that can bridge the silos of information. It's not just about getting more data to find these threats; it's about what you can do with the data to ferret out the risks that matter."
 


Earlier this week, IBM showed of the first fruits of its Q1 Labs acquisition, rolling out the QRadar Security Intelligence platform based on technology it acquired last fall.

QRadar serves as a control center that integrates real-time security intelligence data from more than 400 different sources. One of the significant planned integrations for the QRadar platform is IBM's X-Force Intelligence Threat Feed, which is based on the real-time monitoring of 13 billion security events per day, on average, for nearly 4,000 clients in more than 130 countries. The QRadar platform will have visibility into the latest security trends worldwide to help protect enterprises against emerging risks.

We caught up with Michael Applebaum, Director of Product Marketing at IBM Security Systems Division, to discuss the QRadar approach to security and how it differs from other security platforms on the market.

Q: The threats are definitely escalating. It seems like the bad guys are moving faster than the good guys.

That's precisely the challenge with traditional security approaches. The volume and variety of attacks of exploit techniques is going to continue growing unabated. You can't catch up simply by trying to plug the gaps and the vulnerabilities that you discover every week. You have to step back and look at the situation holistically. How can we detect and prioritize what's going on across our organization in a unified way? Because the current approaches just don't scale and they don't work.

Q: How is IBM's approach different from competing security platforms?

It's about bringing more integration and automation to bear across a spaghetti, patchwork approach that most organizations have built in. Most security products fulfill a very specific but limited role, but attacks and threats today are multi-faceted. You might see a glimmer of an attack in one part of your enterprise and you might see a glimmer of that attack somewhere else.

But putting the pieces together and connecting the dots is very difficult to do. That's why compromises so often take months to be detected. And once detected, an organization rarely knows what's actually been compromised in terms of data and so on.

What we hear loud and clear from our clients is they're locked in an intelligence arms race and they're looking for tools that can bridge the silos of information. It's not just about getting more data to find these threats; it's about what you can do with the data and how you can apply intelligence to ferret out the risks that matter from the ones that don't. (continued...)

1  |  2  |  Next Page >

 

Tell Us What You Think
Comment:

Name:



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Computing
1.   New Technology Defeats Privacy Efforts
2.   Lenovo Still in Small Windows Tablets
3.   Cisco Woos More Devs with DevNet
4.   How Chrome Eats Your Battery Life
5.   Investor Wants EMC To Spin Off VMware


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
34 European Banks Hit by Android-Skirting Malware
Criminals have been finding gaping holes in Android-based two-factor authentication systems that banks around the world are using. The result: 34 banks in four European countries have been hit.
 
New Web Tracking Technologies Defeat Privacy Protections
Recently developed Web tracking tools are able to circumvent even the best privacy defenses, according to a new study by researchers at Princeton and the University of Leuven in Belgium.
 
Juniper DDoS Solution Aims at High-IQ Networks
In the face of more complex attacks, Juniper Networks is boosting its DDoS Secure solution to help companies mitigate the threats with more effective security intelligence throughout the network fabric.
 

Enterprise Hardware Spotlight
Contrary to Report, Lenovo's Staying in Small Windows Tablets
Device maker Lenovo has clarified a report that indicated it is getting out of the small Windows tablet business -- as in the ThinkPad 8 and the 8-inch Miix 2. But the firm said it is not exiting that market.
 
Seagate Unveils Networked Drives for Small Businesses
Seagate is out with five new networked attached storage products aimed at small businesses. The drives are for companies with up to 50 workers, and range in capacity from two to 20 terabytes.
 
Another Day, Another Internet of Things Consortium Is Born
In the emerging Internet of Things, zillions of devices will be talking to each other. Samsung, Intel and Dell just formed a consortium to ensure each thing can understand what others are saying.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.