Since the acquisition of Q1 Labs in 2011, IBM has sold its QRadar Security software management technology in the traditional way, through which customers pay one price and download the version they want. However, the company launched two new cloud services that make the technology is available through a software-as-a-service model. The new cloud solutions…

Many organizations have adopted cloud computing, BYOD practices and expanded the use of social media, all of which require new technologies and security policies. Without changes, the security of a company is probably inadequate. Companies are concerned about managing and privacy of data entrusted to service providers. It is unclear whether this is due to…

The evolution of global standardization bodies and government policy is paving the way for businesses and government agencies benefit from the use of the cloud. Each region of the world adopts different approaches to policy development, formulation of guidelines and best practices for using cloud safely within the limits of their respective laws and slightly…

While companies always move more activity in the cloud, they must remain vigilant on potential security vulnerabilities in their systems. It is on the basis of this observation that IBM has developed a range of services to secure cloud operations of enterprises with the same level of rigor as that applied for transactions carried out…

The experience gained by the company alongside the users of the enterprise and cloud service providers of cloud computing adds an important perspective on the challenges of security in cloud, big data and Internet of Things (IoT) environments. The non-profit Cloud Security Alliance (CSA) that aims to promote the use of best practices to ensure…

During the past year, the demand for SIEM (Security Information and Event Management) technology remained strong. The widespread adoption of the SIEM technology is driven both by the need for security and compliance with regulations. Most of security needs is the effective detection of targeted attacks and violations. Organizations are failing at early breach detection,…

Organizations are dedicating increasing resources to security and risk. Security and risk leaders need to fully engage with the latest technology trends if they are to define, achieve and maintain effective security and risk management programmes that simultaneously enable business opportunities and manage risk. Gartner Security & Risk Management Summit is the only time when…

The market for cloud security market is growing over the next five years with an average of 15 percent per year to 8.71 billion in 2019, reports research firm MarketsandMarkets. The report “Cloud Security Market (Cloud IAM/IDAASS, DLP, Web Security, Email Security, Cloud IDS/IPS, SIEM, Encryption Services, BCDR, Network Security, Cloud Database Security, Virtualization Security)…

Users spend most of their digital lives on smartphones and tablet mobile platforms thus making it an increasingly attractive target for cybercriminals. According to IDC, mobile devices are overtaking PCs as the preferred access point to the Internet and over the next four years, the number of people using their computer to go online will…

IBM is developing a cloud service for the security of data transmissions over mobile networks. This allows developers to develop applications in which data is always protected. IBM won a patent called, “Pushing secure notifications to mobile computing devices,” for a cloud-based security protocol that will help developers create apps that enable organizations to safely…