Global Security Forum

Welcome to our IBM Security User Community. Our mission is to provide clients like you with a world-class user group experience and a forum for you to exchange information, experiences and best practices among each other as well as with our IBM subject matter experts to maximize the value of our solutions for our clients and partners.

We invite you to participate here as well as in our specialized product groups (see below) and our local/regional groups. Should you have any questions, please contact support@communitysite.ibm.com.

Search Group

Latest Posts

  • Hi Mitch, The Outlook for iOS/Android app generally sets off a lot of security alerts when it comes to MDM and managing Activesync connections. We'd need to know more about the client environment to pinpoint the exact issue, but some of them that ...

  • In any good machine, there are many quantifiable parts that make up the collective, often operating "behind the curtain" to make the process that people see on the surface appear seamless. Here at the IBM Command Center, we want to bring you into our ...

  • My customer has Cloud Extender configured for the sole purpose of ensuring only devices enrolled in MaaS can connect to their Exchange infrastructure. I am seeing a large number of users making ActiveSync connections using the Outlook for iOS app, These ...

Latest Articles

  • The Security Operations Center (SOC) of an enterprise — the heart of cybersecurity for a company — typically processes thousands of alerts each day, battling phishing attacks, injection attempts, malware and ransomware on the front lines. These monitoring ...

  • Today, with cybercrime continuing to grow exponentially, the world is in need of more efficacious , diverse , skilled cyber warriors. We need more professionals who, like you, view cybersecurity as a passion and have enthusiasm for the ...

    4 people recommend this.
  • Virtual Private Network (VPN) allows you to have a safe connection to the network. It may be applied to access region-restricted sites, shield your browsing logs and keep yourself unreachable to cybercriminals. Like many other technologies, ...

    1 person recommends this.

Latest Files