IBM has launched a new solution to help organisations defend their networks against sophisticated
external attacks and unauthorised insider activities. QRadar Incident Forensics
is a new software module for the IBM QRadar Security Intelligence
Platform which can help security teams retrace the step-by-step actions of cybercriminals.
According to
the IBM X-Force Threat
Intelligence Quarterly, more than half a billion records of personally identifiable
information were leaked through a number of attacks against strategic
targets in 2013. By detecting malicious activity earlier, organisations can more
stop or reduce the potential loss of data before the damage can significantly impact
the business.
"Every breach is a race against
time. This new forensics module further expands the breadth and depth of
IBM's security intelligence capabilities," said Brendan Hannigan,
general manager of IBM Security Systems. “QRadar Incident Forensics
further helps IT staff prevent emerging threats and better determine the
impact of any intrusion."
This solution is just one of IBM's new
initiatives to expand its security intelligence capabilities. In the second
quarter of 2014, IBM will introduce new capabilities to help organisations
better understand the threat landscape. IBM Advanced Cyberthreat Intelligence
Service will provide customers with insight into the threat landscape,
targeted attacks and attacker tools, tactics and practices, incorporating
IBM's own research with that of strategic partners specialising in threat
visibility.
Additionally, IBM's
Active Threat Assessment
leverages technical assessment capabilities and best-of-breed
tools to identify previously unrealised, active threats while also modelling
threats to unmitigated vulnerabilities in an enterprise environment.
IBM Security QRadar Incident Forensics
is expected to be available in the second quarter of 2014.
IBM offers solutions for
identity and access management, security information and event management,
database security, application development, risk management, endpoint management,
next-generation intrusion protection and more. For more information, visit www.ibm.com/security.
No comments:
Post a Comment