Subscribe free to our newsletters via your
. Nuclear Energy News .




TECH SPACE
IBM expands cyber-security solutions
by Richard Tomkins
Armonk, N.Y. (UPI) May 5, 2013


disclaimer: image is for illustration purposes only

New security software and services to help protect the critical data of organizations from cyber-intrusion were introduced Monday by IBM.

The IBM Threat Protection System utilizes security intelligence and behavioral analytics to disrupt attacks across the entire attack chain -- from break-in to exfiltrate. IBM's Critical Data Protection Program security consulting services is based on the company's data-centric security model, under which IBM deploys assets to help protect a business' critical information.

"Advanced persistent threats have fundamentally changed the way organizations have to approach data security," said Brendan Hannigan, general manager, IBM Security Systems.

"Today, defending against cyber-attacks requires more than a signature-based or perimeter approach. Deep analytic capabilities and forensics are vital and need to include endpoint prevention, perimeter protection and the ability to guard against attacks before they can do damage."

IBM said its Threat Protection System includes an end-to-end architecture of analytic and forensics software to continuously prevent, detect and respond to ongoing and sophisticated cyber-attacks. Included is an enhanced QRadar security intelligence platform with new capabilities for detection, new incident forensics, and expanded emergency response services.

The Critical Data Protection Program helps safeguard critical data -- a corporation's "Crown Jewels" -- which may include data assets on acquisition and divestiture plans, executive and board deliberations and intellectual property. According to IBM, such information accounts for an estimated 70 percent of the value of a publicly traded corporation.

"Concerns over the ability to protect critical data from cyber-attacks have moved center stage in the board room," said Kris Lovejoy, general manager, IBM Security Services. "Cyber attacks and loss of data have the ability to impact brand reputation, reduce shareholder value and open an organization to litigation. IBM's new software and services are designed to provide these executives with a unique solution that lets them keep their focus on the day-to-day needs of their customers and driving business revenue."

.


Related Links
Space Technology News - Applications and Research






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








TECH SPACE
Big data poses great challenges and opportunities for databases
Beijing, China (SPX) Apr 27, 2014
Advances in the technology frontier have resulted in major disruptions and transformations in the massive data processing infrastructures. For the past three decades, classical database management systems, data warehousing and data analysis technologies have been well recognized as effective tools for data management and analysis. More recently, data from different sources and in different forma ... read more


TECH SPACE
SE Asia palm oil problems could hit consumers worldwide

Fueling aviation with hardwoods

ACCESS II Alternative Jet Fuel Flight Tests Begin May 7, 2014

Ozone levels drop 20 percent with switch from ethanol to gasoline

TECH SPACE
Tennessee utility to add more solar power to grid

Sun sets on Spaniards' solar power dreams

JinkoSolar to Supply 100 MW Solar PV Modules for Two Projects in Chile

EnerTech and Morgan to sell Solar CPV Technology to Kuwait and Middle East

TECH SPACE
Offshore wind supported with U.S. federal funding

GDF Suez, others, selected to build offshore wind farms

U.S. moves closer to first-ever offshore wind farm

970-MW wind farm off the Isle of Wight considered

TECH SPACE
Germany now EU's worst polluter as CO2 emissions rise

US House approves major Africa power bid

Geothermal Industry celebrates Awareness Day as sector readies for Summit

Energy-subsidy reform can be achieved with proper preparation, outside pressure

TECH SPACE
DNO ramps up deliveries from Kurdish oil field

Baker Hughes counts increased rig activity in United States

Vietnam sea spat part of China's larger strategy: experts

Alaska governor signs natural gas bill pipeline measure

TECH SPACE
Length of Exoplanet Day Measured for First Time

Spitzer and WISE Telescopes Find Close, Cold Neighbor of Sun

Alien planet's rotation speed clocked for first time

Seven Samples from the Solar System's Birth

TECH SPACE
US concerned at sale of French warships to Russia

Penny contract given to ESCO Marine for dismantiling of aircraft carrier

Hollande says sale of warships to Russia still on 'for now'

Manned and unmanned maritime combat vessel going on display

TECH SPACE
NASA's Curiosity Rover Drills Sandstone Slab on Mars

Nonprofit says: fire missiles at Mars to dig for signs of life

ISS research shows that hardy little space travelers could colonize Mars

Target on Mars Looks Good for NASA Rover Drilling




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.