IBM Security Systems Technical Showcase 2013

Published on July 2016 | Categories: Types, Research | Downloads: 35 | Comments: 0 | Views: 312
of 1
Download PDF   Embed   Report

Join us for an exclusive briefing and demonstrations of key security solutions - an opportunity tounderstand our comprehensive security framework, see our newest security solutions in action andnetwork with leading security experts and peers

Comments

Content

IBM Security Systems Technical Showcase 2013
The explosion of data and the proliferation of devices it resides on combined with the evolving IT landscape, the sophistication of attacks and a tight budget make security, risk and compliance management more challenging than ever. However, addressing a security breach once it has happened can be significantly more expensive than it would have been to implement controls to prevent it in the first place. Organisations are seeking to become more aware of their security posture and proactive in managing risk and vulnerabilities, leveraging Security Intelligence to optimize enterprise security. At IBM, we believe that security is intrinsic to business processes, development and daily operations. It continues to be a priority topic for the experts in the IT department, right through to execs at boardroom level. Backed by our Institute for Advanced Security and the X-Force R&D team, IBM’s Security Systems Division delivers solutions spanning the four key security domains: People, Data, Applications, and Infrastructure. Critical to your success and our security framework is the acquisition of Q1 Labs which provides Security Intelligence for each key domain. Join us for an exclusive briefing and demonstrations of key security solutions - an opportunity to understand our comprehensive security framework, see our newest security solutions in action and network with leading security experts and peers. If you are a Security Architect, manager or infrastructure specialist, you’ll be interested in hearing about the latest IBM technologies that will support the shift towards higher levels of security intelligence and a heightened organisational security posture. Why Attend § Understand how IBM can address the latest security challenges: increased attack sophistication and frequency; endpoint and patch management, next generation firewalls, network intrusion prevention application security and securing data and user access in an automated and proactive approach. § Discover a complete integrated framework that spans the full spectrum of compliance, audit and risk management techniques required in today’s world of ever-increasing security complexity. § See demonstrations given by our local ANZ technology specialists, understand where and how these solutions can be applied to your business and gaps that may exist within your own organisation.

WELLINGTON – 23rd April 2013
Watson Senior Boardroom, Level 11 Majestic Centre, 100 Willis Street, Wellington 2:00pm 2:10pm 2:15pm 3:30pm 5:00pm Arrival and drinks Welcome – Jason Burn, Business Unit Executive A/NZ, IBM Security Systems Division Security Systems Division overview & capability review, David Edwards, Security Solution Architect A/NZ Afternoon Tea with Q&A and expert demonstrations Event concludes

RSVP by Friday 19th April to Louisa Partridge at [email protected] The briefing will highlight our capabilities, and then enable you to engage directly with our hands-on demonstrations up close, as we showcase the following security solution areas: • Application Vulnerability Scanning - how secure are your web applications? Do you have vulnerable applications that are open to attack? Watch IBM Rational AppScan perform both static source code analysis and dynamic web application scanning and reporting. Mobile Security with OAuth, strong authentication and risk-based access - balancing secure authentication and context-specific authorization requirements with an unobtrusive user experience has never been more important than on the mobile platform. Understand how IBM Security Federated Identity Manager can be used to secure both native and hybrid mobile applications, providing a seamless one-time registration process for low level authentication assurance, and stepup authentication to one-time-password for higher-risk transactions. Security Information and Event Manager - a common thread in compliance regulations is the need for effective security information and event management; the ability to quickly respond to attack attempts and to have the analytics to detect complex multi-vector attack types. Experience our latest IBM QRadar solution for SIEM and security analytics.





Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close