Bringing our clients and partners together to tackle one of the greatest challenges of today.
Join the community
Ask a question or answer one – join the conversation
Network locally and connect globally
Read up on the latest tips, tricks, and techniques
Develop your security skills and access training courses
Start interacting with your colleagues! Join the community →
Contending with so many devices – plus apps, content, and data – unified endpoint management (UEM) may seem spooky to some. The powerful combo of UEM + AI may make you brave enough to enter what once seemed ...
10-23-2018 | 14:00 - 15:00 ET
Could you be getting more value from your IBM Application Security solutions? Your local user group offers a great chance to meet up with your peers who are working with the same technology. To register ...
10-24-2018 | 08:30 - 15:00 ET Cambridge MA
When AI meets unified endpoint management (UEM) UEM delivers IT & Security leaders the technology needed to manage and secure smartphones, tablets, laptops, desktops, wearables, and the Internet of Things ...
10-25-2018 | 09:00 - 12:00 AU Sydney
The Resilient Add-On supports Splunk and Splunk ES. The Add-On provides the capability of escalating a Splunk alert or Splunk ES notable event to a Resilient incident. Resilient Add-On features include:
The Resilient Email Connector is a flexible component that enables organizations to easily integrate the Resilient platform with a variety of processes and systems that are generating security alerts.
In this video, Resilient's @Hugh Pyle illustrates how SOCs can leverage IBM's partner ecosystem to quickly and easily integrate their security tools and automate and orchestrate response with Resilient's
This video will show you how the integration enables security teams to enrich IOCs, query endpoint data, and remediate security incidents from directly within the Resilient Incident Response Platform -
Phishing attacks account for one-third of security events, according to IBM data. With the Resilient Incident Response platform, your security analysts can quickly respond to, investigate, and stop phishing