Pages

Saturday, 22 February 2014

IBM Security QRadar Incident Forensics uncovers criminal trail more easily

IBM has launched a new solution to help organisations defend their networks against sophisticated external attacks and unauthorised insider activities. QRadar Incident Forensics is a new software module for the IBM QRadar Security Intelligence Platform which can help security teams retrace the step-by-step actions of cybercriminals. 

According to the IBM X-Force Threat Intelligence Quarterly, more than half a billion records of personally identifiable information were leaked through a number of attacks against strategic targets in 2013. By detecting malicious activity earlier, organisations can more stop or reduce the potential loss of data before the damage can significantly impact the business.

"Every breach is a race against time. This new forensics module further expands the breadth and depth of IBM's security intelligence capabilities," said Brendan Hannigan, general manager of IBM Security Systems. “QRadar Incident Forensics further helps IT staff prevent emerging threats and better determine the impact of any intrusion."   

This solution is just one of IBM's new initiatives to expand its security intelligence capabilities. In the second quarter of 2014, IBM will introduce new capabilities to help organisations better understand the threat landscape. IBM Advanced Cyberthreat Intelligence Service will provide customers with insight into the threat landscape, targeted attacks and attacker tools, tactics and practices, incorporating IBM's own research with that of strategic partners specialising in threat visibility.

Additionally, IBM's Active Threat Assessment leverages technical assessment capabilities and best-of-breed tools to identify previously unrealised, active threats while also modelling threats to unmitigated vulnerabilities in an enterprise environment.

IBM Security QRadar Incident Forensics is expected to be available in the second quarter of 2014. 


IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. For more information, visit www.ibm.com/security.

No comments:

Post a Comment