Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Microsoft/Windows
24/7/365 Network Uptime!
Average Rating:
Rate this article:  
IBM Beefs Up Big Data Security Offerings
IBM Beefs Up Big Data Security Offerings

By Jennifer LeClaire
January 30, 2013 1:36PM

    Bookmark and Share
For Security Intelligence with Big Data, IBM is touting real-time correlation and anomaly detection of diverse security and network data as one of the key capabilities. Other capabilities touted by IBM include high-speed querying of security intelligence data; flexible Big Data analytics; and forensics for deep visibility into security-related network activity.
 



In a move to help enterprises detect stealthy threats in Big Data, IBM just rolled out a new solution called Security Intelligence with Big Data. The new technology combines intelligence with analytics to take a deeper dive into this niche security need.

The idea is to help enterprises address the toughest security challenges, including advanced persistent threats, fraud and insider threats. The new solution aims to do this by combining real-time correlation for continuous insight, custom analytics across both unstructured data (e-mails, social media content, full packet information and business transactions) and structured data (security device alerts, operating system logs, DNS transactions and network flows).

IBM Security Intelligence with Big Data unites the real-time security correlation and anomaly detection capabilities of the IBM QRadar Security Intelligence Platform with the custom analysis and exploration of vast business data provided by IBM InfoSphere BigInsights.

A $39.5 Trillion Job

IBM is already getting a nod from some impressive organizations, including the Depository Trust and Clearing Corp., a financial services transaction clearing and settlement provider that handles more than 3.6 million securities from 122 countries and territories valued at $39.5 trillion.

"As the sophistication and technological means of cyber criminals increase, the financial industry and government need to move to a risk-based framework that incorporates the dynamic nature of the threat landscape," said Mark Clancy, chief information security officer and managing director of Technology Risk Management at DTCC.

"We need to move from a world where we 'farm' security data and alerts with various prevention and detection tools to a situation where we actively 'hunt' for cyber-attackers in our networks. IBM's Security Intelligence with Big Data solution gives us a practical way to gain visibility across our environment. We're gaining real-time security awareness and meaningful insight into historical activity across years of diverse data."

A Practical Solution

IBM is touting real-time correlation and anomaly detection of diverse security and network data as one of the key capabilities. Other key capabilities include high-speed querying of security intelligence data; flexible Big Data analytics across structured and unstructured data; a graphical front-end tool for visualizing and exploring Big Data; and forensics for deep visibility into network activity.

IIBM said the solution helps organizations answer questions they could never ask before by widening the scope of investigation to new data types. By analyzing structured, enriched security data alongside unstructured enterprise data, the solution helps find malicious activity hidden deep in the masses of an organization's data.

"Success today is too often defined as the absence of failure by the information security industry, instead of the demonstration of effectiveness," Clancy said. "We do a lot of things in our profession that are hard to observe and hard to quantify. But any time you can measure the success or failure in a provable way, you can produce a much better outcome."

IBM QRadar Security Intelligence Platform products and IBM Big Data Platform products, including IBM InfoSphere BigInsights, are available immediately.
 

Tell Us What You Think
Comment:

Name:





 Microsoft/Windows
1.   Win Phone 8.1 Update Already on Way
2.   Yammer Moved to Office 365
3.   Can One Size Windows OS Fit All?
4.   Microsoft CEO Sees 'Bold' Plan Ahead
5.   Future of Laid-Off MS Employees


advertisement
Microsoft CEO Sees 'Bold' Plan Ahead
With unified Windows for all platforms.
Average Rating:
Design Central to Microsoft Future
New ethos a break from functional past.
Average Rating:
Bing Lets Europeans Be 'Forgotten'
Following in Google's footsteps.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Researchers Working To Fix Tor Security Exploit
Developers for the Tor privacy browser are scrambling to fix a bug revealed Monday that researchers say could allow hackers, or government surveillance agencies, to track users online.
 
Wall Street Journal Hacked Again
Hacked again. That’s the story at the Wall Street Journal this week as the newspaper reports that the computer systems housing some of its news graphics were breached. Customers not affected -- yet.
 
Dropbox for Business Beefs Up Security
Dropbox is upping its game for business users. The cloud-based storage and sharing company has rolled out new security, search and other features to boost its appeal for businesses.
 

Enterprise Hardware Spotlight
Watson Gets His First Customer Service Gig
Since appearing on Jeopardy, IBM's Watson supercomputer has been making a living using his super-intelligent knowledge base for business verticals. Now, Watson's been hired for his first customer service job.
 
Tablet Giants Apple and Samsung Feel the Heat
When a company saturates its home market with a once-hot product, expect it to pump up efforts elsewhere. Apple, for its part, is now pushing iPads to big corporations and the enterprise market.
 
Microsoft Makes Design Central to Its Future
Over the last four years, Microsoft has doubled the number of designers it employs, putting a priority on fashioning devices that work around people's lives -- and that are attractive and cool.
 

Mobile Technology Spotlight
T-Mobile Calls 'BS' on AT&T's New Promotion
While Verizon Wireless is moving to throttle bandwidth hogs, a scrappy T-Mobile is taking on the giants with a limited-time promotion it hopes will drive up the churn rates of its wireless rivals.
 
Microsoft Update to Windows Phone 8.1 Already Coming
An update to Windows Phone 8.1 is on the way just weeks after the release of the product itself. Microsoft has begun detailing some of the update features to phone manufacturers.
 
Stanford Researchers Report Battery Breakthrough
Stanford researchers have found a way to use lithium in a battery's anode, a breakthrough that could triple capacity and has been described as the "holy grail of battery science."
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.