Search

1 to 10 of 65
Sort by

Blog Entry
Safeguarding Data With Proactive Threat Detection

It’s a data-driven world and data is the new crown jewel that serves as one of the key assets for the growth of an organization. Data is also assisting organizations to discover new business insights, identify buying patterns, business trends, customer behavior and more—all of which are required...


Blog Entry
Social Login with LinkedIn on IBM Security Verify

Co-authored by Saloni Rathi . Social Login with LinkedIn on IBM Security Verify As a user if I am going to a website or application and the first thing application asks is for registration and lot of information. I don't want to share too much information while registration. I don't...


Blog Entry
How MaaS360 User Risk Management and Carbon Design are redefining UX

WHY USER RISK MANAGEMENT? The average cost of a data breach is $3.86M, according to a recent report by IBM Security. Remote work during COVID-19 is only expected to exacerbate the situation, increasing data breach costs, and incident response times. To combat this threat...


Blog Entry
QRadar App Management - support utilities, CLI, API - need-to-know

During the course of my troubleshooting experience i had to be aware of some “utility changes” regarding to app extension management and monitoring. According to the applied Release of QRadar and deployment scenario (AiO / Apphost as a managed host), you’ll have to keep in mind some ...


Blog Entry
The New Frontier of Fraud – Massive Mobile Emulator Fraudulent Operation

Co-authored by Ezra Maybruch. As the use of mobile devices grows exponentially in all industries, fraudsters are looking for innovative ways of exploiting this field. Consequently, IBM Security Trusteer Fraud Analytics has recently discovered a new large-scale mobile emulator-based fraud...


Blog Entry
Work Profile On Corporate Owned Android Devices

I hope that everyone is familiar with Android Enterprise and the various management styles that have been supported by MaaS360 since it's inception in Android 5.0 (if not, check out this link ): Work Profile (often referred to as Profile Owner or PO) - creates a work partition on the device...

Matt Shaver's profile image

Blog Entry
New Network Visibility Dashboards

By Holly Wright and Thomas Obremski. For those who haven’t yet tried out the new IBM Security QRadar Network Visibility Pulse dashboards available on the IBM X-Force App Exchange, here are some of the highlights. Overview Dashboard The overview dashboard provides an at-a...

Holly Wright's profile image

Blog Entry
What's New in QRadar 7.4.2

Core Platform Updates Operational Efficiency Easily adjust the number of MAC addresses that are allowed for a single asset! For users that log in from multiple wireless access points, or multiple users that log in remotely through a VPN, you can set the number of MAC addresses that are...

Sophia Sampath's profile image

Blog Entry
Identity and Access Management with IBM Security Verify

For decades IBM has been a key player in the Identity & Access Management (IAM) space, innovating on its solutions and adapting to new business challenges, compliance requirements and technologies. Throughout that evolution, IBM's IAM offerings have greatly evolved into a modern portfolio,...

Katherine Cola's profile image

Blog Entry
Using Shared Apple Devices With MaaS360

iOS device management has grown by leaps and bounds over the last few years. Apple seems to be taking user feedback more seriously and implementing features that both frustrate (deprecating strict features from non-supervised devices) and delight (non-DEP to DEP conversion) admins across the...

Matt Shaver's profile image