Since 18 of December 2019 conferences.iaea.org uses Nucleus credentials. Visit our help pages for information on how to Register and Sign-in using Nucleus.

Information Management: Business Vulnerabilities

23 Oct 2014, 09:50
40m
Room M1 (M Building)

Room M1

M Building

Speaker

Hannes Stefko (IBM Austria)

Description

Sophisticated cybercrimes and advanced persistent threats are occurring at an alarming rate. Aided by new attack techniques,increased financial support and the ease of exploiting social connections, attackers are having more success than ever before. Traditional security solutions are no longer sufficient to defend against these escalating threats. IBM® Security QRadar® uses big data capabilities to help keep pace with advanced threats and prevent attacks before they happen. It helps uncover hidden relationships within massive amounts of security data, using proven analytics to reduce billions of security events to a manageable set of prioritized incidents. Forward-leaning organizations are exploring custom analytics that use additional big data technologies on a variety of unstructured data sources including email, social media feeds, business transactions and full network packet payloads. To meet this demand, IBM is integrating industry-leading security intelligence capabilities with the world-class analytics capabilities of IBM InfoSphere® BigInsights™ and related big data software and services. The combination offers a comprehensive solution — a security intelligence platform designed to detect and prioritize threats in real time, together with a mature Hadoop- based solution for custom data mining and analytics.
Country or International Organization IBM Austria

Primary author

Ruediger Gmach (IBM)

Presentation materials

There are no materials yet.