Whitepaper

Manage Security and Risk

Compliance and !nancial risk used to be the driving concerns for security and risk management. Audits and governance processes were predictable events that IT attempted to minimize and automate. Risk was a fairly static concept. However, today the pace of threats—“low and slow” as targeted attacks or lightning fast as cyberactivism and malware outbreaks—demands that

Security Management 2.0: Time to Replace Your SIEM?

Is it time? Are you waving the white flag? Has your SIEM failed to meet expectations despite your significant investment? If you are questioning whether your existing product or service can get the job done, you are not alone. You likely have some battle scars from the difficulty of managing, scaling, and actually doing something

De kip of het ei?

Dit rapport bevat de belangrijkste uitkomsten van de benchmark over de productiviteit van IT afdelingen. Het onderzoek is afgenomen bij organisaties in diverse sectoren, onder meer in de zorg, het onderwijs, de lokale en provinciale overheid, IT, retail, zakelijke dienstverlening en industrie. Het merendeel van de respondenten heeft meer dan 750 werkplekken. Het onderzoek is

The Big Security Data Challenge – Make SIEM work for you

Big Data is not only a challenge for customer-facing organizations—but for security teams as well. Over the past decade, the demand for stronger security has driven the collection and analysis of increasingly larger amounts of event and security contextual data. Security Information and Event Management (SIEM) has long been the core tool that security teams

Focus On Five – Siem Requirements

SIEM: Solve for the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered mature. Capabilities such as event collection, correlation, alerting, and demonstrating compliance with regulatory mandates are table stakes, and most SIEM solutions address these needs. But the landscape is changing.

Back to basics: Fundamentals of test data management How to build and deliver high-quality applications fast using realistic test data

Business moves fast—which means that software development teams need to move even faster. The emergence of new software development models, such as the agile development process, has given organizations powerful tools for responding to events quickly and has helped organizations evolve through collaboration between self-organizing, cross-functional teams.

Business-driven data privacy policies Establish and enforce enterprise data privacy policies to support compliance and protect sensitive data

Enhancing information security is no longer solely a task for IT—it’s a strategic, enterprise-wide priority. According to interviews conducted by IBM with 138 security leaders, two-thirds of senior executives are paying closer attention to enterprise data privacy than they were two years ago. Recent statistics on data security breaches and data loss help explain why.

Maximizing the Value Provided by a Big Data Platform

Big Data is one of the key buzzwords for 2012; and for good reason. Thanks to our increasingly instrumented and interconnected world the data flows generated by today’s devices and sensors can provide significant insight into customer interactions, manufacturing facilities, railway infrastructures, and so much more. Or they would, if we were to capture, store,

Running at the speed of business

Meet real-world challenges with performance, availability and unprecedented affordability from IBM DB2. As big data builds into an avalanche of information, many organizations are finding themselves increasingly overwhelmed. But smart business leaders know that effectively collecting, processing and embedding this constantly growing stream of both structured and unstructured data into daily operations is key to