Search

1 to 6 of 6
Sort by


Blog Entry
Extend user attribute management in Verify for complex use cases with IBM Cloud Functions

It is very unlikely that user repositories, such as Active Directory or Security Directory Server, will contain all data associated with the user. It is also less likely that these directories have the data in the right format that applications expect. To normalize data in an IAM tool is a...

Adam Case's profile image

Blog Entry
How to Troubleshoot Missing Traffic in Guardium

Missing Traffic You're a Guardium admin. It's Monday morning. One of your stakeholders tells you the email they usually get from the Guardium audit process never arrived, or it arrived but there is no data at all in the report, or there is some data but important data is missing. What can you...

John Adams's profile image

Blog Entry
Join the IBM Security Experts at Virtual Master Skills University, Sept. 21-24 — Register now!

I’m thrilled to announce that registration is now open for the IBM Security Virtual Master Skills University, happening Sept. 21-24, 2020! The thousands of IBM Security clients who have attended past Master Skills University events know that this is not your typical tech conference. And...

Bob Kalka's profile image

Blog Entry
Keeping up-to-date on QRadar log source management

Keeping up-to-date on QRadar log source management can be a daunting task, and our new educational material is here to refine your skills and extend your capabilities. The IBM Security Learning Academy has recently published several new QRadar log source related assets. The IBM Security QRadar...

Axel Buecker's profile image