Search

1 to 10 of 17
Sort by

Blog Entry
Identity Linking in IBM Security Verify

Introduction IBM Security Verify offers an unique feature to link various user accounts of an user as one identity. This will help to have same user experience for an user although he login using his / her different authentication provider. Configuration 1. Tenant administrator...

Nilesh Atal's profile image

Event
No Security Data Left Behind - How To Make Sense Of Data?

In cybersecurity, data is critical – for gaining intelligence from the threat vectors as well as for AI-processing to accelerate detection and response. This is where the cybersecurity paradigm of "no data left behind” comes in. Whether it is audit data, security data or simple log data, each...

 Thu May 20, 2021 | 03:00 PM - 04:00 PM IST


Blog Entry
New Feature Alert: User Risk Management for identifying top risky users with endpoint management

As an Info-Sec manager, Do you find it challenging to identity top risky users in your organization? Do you have visibility of incidents that termed them as risky users? Does your endpoint manager give you the ability to configure risk rules? This is where User Risk...

Vijay Lele's profile image




Blog Entry
Plenty of Room in Z Security for "New-Collar" Developers…and for You Gamers, Plenty of Weapons

By Marilyn Thornton I’m going to be right up front with you, dear readers. This is a recruiting blog. It’s likely that if you are reading this in the IBM Security Community space, you already have a role in an IT security discipline, but there are young men and women out there who may not have...

Marilyn Thornton's profile image


Blog Entry
View IBM Redbooks about SAP on IBM Power - published in 2020

The following Redbooks for SAP related topics have been published by different IBM teams (OM, Storage and SAP HANA on Power) in 2020 till Dec 15th: SUSE and IBM Power Systems for SAP HANA IBM Power Systems H922 and H924 Technical Overview and Introduction IBM Power Systems Planning and...

Wera Stoeckel's profile image

Blog Entry
Cloud and Cloud-Native Security (Part 1): Security Advantages of Container Orchestration Platforms

It’s safe to say that many long-time IBM Aspera customers look at our transport technology as more than just the fastest way to move data over commodity IP networks. Security is in our DNA, as the fasp (Fast Adaptive Secure Protocol) implies. From the lowest level, Aspera ensures the...

James Wilson's profile image