Search

1 to 10 of 72
Sort by

Event
Webinar: Why SOAR is at the Core of the IBM Cloud Pak for Security Platform

In today’s “new normal,” security teams who were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as they work remotely, confront increasing threats and manage home demands. In this webinar, two of IBM Security’s product...

 Thu June 04, 2020 | 11:00 AM - 12:00 PM ET


Event
Webinar: Resilient v37 Release Report

This month we see the release of the latest version of the IBM Security Resilient SOAR platform: v37. Join the Resilient Offering Team as they take a deeper dive into the newest features and capabilities. Mike Lyons, Offering Manager for Resilient, will walk through each of these features and...

 Tue June 02, 2020 | 11:00 AM - 12:00 PM ET




Library Entry
Integration Update with IBM Security QRadar and Resilient with Mimecast

Why is the integration of your email and web security and SIEM/SOAR systems so critical? For one, the heavy use of email and web as attack vectors mean that these key preventive security systems can serve as a critical source of threat intelligence for your endpoints and your network controls....


Library Entry
Resilient Playbook Entry #1: Response to High-Volume Phishing Attacks

With the daily disruption into everyone's lives, there is naturally a surge in demand for the latest information and updates on the novel coronavirus (COVID-19). This has unfortunately translated into a significant increase in phishing campaigns and targeted email spam looking to exploit...


Library Entry
Integration Update with IBM Security QRadar and Resilient with Mimecast

Why is the integration of your email and web security and SIEM/SOAR systems so critical? For one, the heavy use of email and web as attack vectors mean that these key preventive security systems can serve as a critical source of threat intelligence for your endpoints and your network controls....



Blog Entry
Why Access to the Right Security Data is Critical to the SOC

For Security Operations Center (SOC) analysts or incident responders to do their jobs effectively, it is critical that they get access to the right data, exactly when needed. It is nearly impossible to continuously conduct threat detections, investigations, and to manage responses without the...