Search for tag: "ibm security"

Does IDaaS Really Have To Be Complicated_

The fewer points of access you have, the easier it is to manage and secure identities across your business. As cloud applications, mobile devices, and IoT devices are added to the mix, identity and…

From  50QHPYU842 50QHPYU842 on December 5th, 2019 0 plays

IBM Cloud Identity Demo- Reporting and Analytics

IBM Cloud Identity is a born-in-the-cloud identity and access management platform for single sign on, multifactor authentication, and user lifecycle management.

From  50QHPYU842 50QHPYU842 on December 5th, 2019 0 plays

IBM Security for AWS

Journey to AWS and hybrid cloud confidently with IBM Security

From  5500021X6T 5500021X6T on December 2nd, 2019 16 plays

Up, Up and Away! Best practices for securing data in the hybrid multicloud environments

Yearning for a better understanding on multi-cloud environments? Listen to this IBM webinar to promote our multi-cloud data protection story across the data protection portfolio

From  50QHPYU842 50QHPYU842 on November 19th, 2019 3 plays

IBM Security's Cyber Tactical Operations Center (C-TOC)

The IBM® X-Force® Command Cyber Tactical Operations Center (C-TOC) provides the industry’s first mobile cyber range and watch floor, with 23 tons of cyber capabilities on wheels,…

From  310000A57G 310000A57G on November 7th, 2019 38 plays

ISF Annual World Congress Dublin - 2019 - IBM Session with Laurance Dine

Laurance Dine, EMEA Lead X-Force Iris speaks at the 30th ISF Annual World Congress in Dublin about the cost of a data breach in 2019, based on the Cost of a Data Breach 2019 Report by the Ponemon…

From  50QHPYU842 50QHPYU842 on November 7th, 2019 0 plays

IBM Cloud Pak for Security in two minutes

IBM Cloud Pak for security is an enterprise-ready containerized software solution that helps organizations integrate their existing security tools for better insights into threats and risks in their…

From  310000A57G 310000A57G on October 30th, 2019 1,236 plays

Quantum Impact on Data Risk

Nowadays, quantum computers are still in infancy, but once realized, computational complexity enabled by quantum computing should have positive impacts on the world in areas like chemical modeling…

From  5500021X6T 5500021X6T on October 21st, 2019 179 plays

MITRE ATT&CK Framework and Incident Response(1)

MITRE ATT&CK™ is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the…

From  50QHPYU842 50QHPYU842 on September 26th, 2019 48 plays

How Security Automation can help organizations mature their SOC capabilities

A recent Gartner market guide (Market Guide for Security Orchestration, Automation and Response Solutions, Gartner, June 2019) recommended that security leaders should consider Security Automation,…

From  50QHPYU842 50QHPYU842 on September 26th, 2019 12 plays

Episodio I - La amenaza

Santiago Cavanna, IBM Security Client Executive

From  50QHPYU842 50QHPYU842 on September 17th, 2019 5 plays

Episodio V - El valor de la seguridad para el negocio

María Iribarne, CMO IBM Argentina & Fernando Abadín Country Counsel IBM Argentina

From  50QHPYU842 50QHPYU842 on September 16th, 2019 3 plays

Episodio VIII - El cierre

Roberto Alexander, Gerente General IBM Argentina.

From  50QHPYU842 50QHPYU842 on September 13th, 2019 0 plays

Episodio VII - Una arquitectura integrada de seguridad

Juan Diego Mercader, IBM Security Client Executive.

From  50QHPYU842 50QHPYU842 on September 13th, 2019 1 plays

Episodio II - El ataque

Gastón Rodriguez, IBM Security Architect.

From  50QHPYU842 50QHPYU842 on September 13th, 2019 5 plays

Episodio VI - Protocolo de emergencia

Pablo Acevedo Areco, IBM Security Architect

From  50QHPYU842 50QHPYU842 on September 13th, 2019 2 plays