Data-Deposit-Box-DataDepositBox-Online-Backup-Cloud-Data-Remote-Backup

Delivers Power of QRadar Security Intelligence as a Cloud Service, New Managed Services Bring Added Skills, Expertise and Flexibility

ARMONK, NY – 21 Apr 2015 — /BackupReview.info/ — IBM (NYSE: IBM)  today announced it is bringing its market-leading Security Intelligence technology, IBM QRadar®, to the cloud, giving companies the ability to quickly prioritize real threats and free up critical resources to fight cyberattacks. The new services are available to clients through a cloud-based Software as a Service (SaaS) model, with optional IBM Security Managed Services to provide deeper expertise and flexibility for security professionals.

According to the 2014 IBM Cyber Index, organizations globally deal with an average of 91 million potential security events every year, creating vast volumes of data that need to be stored and analyzed. Cloud-based threat monitoring and analytics provides the simplicity of a hosted deployment, combined with advanced analytics capabilities and the proven expertise from a security services provider needed to monitor today’s hybrid IT environments.

The two new cloud-based services are:

  • IBM Security Intelligence on Cloud – helps organizations determine if security-related events are simple anomalies or potential threats. Built as a cloud service using IBM QRadar, enterprises can quickly correlate security event data with threat information from over 500 supported data sources for devices, systems, and applications.  This is complemented by more than 1500 pre-defined reports for use cases such as compliance, vulnerability management and security incident response.  Also, the integration of QRadar with IBM’s recently announced cloud-based X-Force Exchange gives security teams volumes of historical and real time threat intelligence.
  • Intelligent Log Management on Cloud - designed to simplify security and compliance data collection and reporting needs. Powered by IBM QRadar® technology, Intelligent Log Management uses analytics and a hosted, multi-tenant technology to rapidly deliver comprehensive compliance with powerful real-time correlation and anomaly detection capabilities. Through support for more than 400 platforms, security managers can also capture logs from nearly any device in their security operation.

“Organizations are facing a security data tsunami that can overwhelm even the most sophisticated enterprise’s security program,” said Jason Corbin, Vice President, Product Management and Strategy, IBM Security. “Security leaders are telling us they want increased visibility through the cloud and control throughout their hybrid IT environments. The option of doing predictive analytics via the cloud gives security teams the flexibility to bring in skills, innovation and information on demand across all of their security environments.”

Next Generation IBM Managed Services for Cloud Security
These new offerings are backed and delivered through IBM’s next-generation platform of managed security services, handling over 15 billion security events per day for over 4,000 clients around the world.  IBM Security experts, located in ten global security operations centers (SOCs), are available on demand 24×7.  These IBM analysts and engineers help clients detect and protect themselves from security risks often before software fixes are released to the market—giving IBM clients an additional edge when it comes to safeguarding their computers, networks and corporate “crown jewels.”

The unique IBM capabilities consolidate diverse security environments across existing platforms, as well as private, public and hybrid clouds under a “single pane of glass”— helping customers transform and optimize their overall security operations. This approach helps businesses better integrate security threat intelligence, big data and analytics with customized services.  Also, clients can experience improved threat response times, while potentially reducing overall security costs by an average of 55 percent.  This also significantly improves threat detection, helping clients automatically triage up to 95 percent of their security events.

For more information, please visit http://www.ibm.com/security

About IBM Security
IBM’s security platform provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. IBM operates one of the world’s broadest security research and development, and delivery organizations. For more information, please visit www.ibm.com/security, follow @IBMSecurity on Twitter or visit the IBM Security Intelligence blog.

Contact(s) information
Michael Rowinski
IBM Media Relations
1 (917) 691-9761
rowinski@us.ibm.com

Kelly Kane
IBM Media Relations
1 (413) 297-2668
kkane@us.ibm.com

Source: IBM

 

General Tags: online backup companies, compare online backups, SaaS, online backup services, CEO interviews, online data backup, online backup, data storage, backing up online, data security, online backup reviews, online backup news, online file storage, online backup providers directory, top rated online backups, software as a service, online file backup, cloud computing

Like us on Facebook




===========================
Do you like this post? Subscribe to our RSS feed ===========================

Sponsored Links:

Data Deposit Box

Asigra

Bacula Systems


Cloud-based-Online-Backup-Disaster-Recovery-Data-Storage-by-Bacula-Systems-in-Switzerland

Share/Save/Bookmark

Related posts:

  1. IBM Advances Fight against Cyber Threats with Comprehensive Threat Protection System and Critical Data Protection Services
  2. IBM Security Tackles Insider Threats with User Behavior Analytics
  3. SecureWorks Counter Threat Platform Brings New Security Layer to Customer Workloads on AWS with Expanded Monitoring Capabilities
  4. Check Point and IBM Security Form Threat Prevention Alliance
  5. Dell Simplifies Advanced Threat Prevention for Small Businesses with Dell Data Protection | Threat Defense
  6. IBM Announces Security Forensics Capabilities to Help Protect Critical Data
  7. Cyber Essentials Scheme will Have Pivotal Role in Protecting Against 2015’s Cyber-Attacks
  8. F-Secure’s New Service Pits Man and Machine Against Targeted Cyber Attacks

Tags: