The Emergence of Virtual Reality and Augmented Reality in the Security Operations Center

New technologies like augmented and virtual reality may be the next big thing for security operations centers.

The post The Emergence of Virtual Reality and Augmented Reality in the Security Operations Center appeared first on Security Intelligence.

Continue reading The Emergence of Virtual Reality and Augmented Reality in the Security Operations Center

Game Over: Improving Your Cyber Analyst Workflow Through Gamification

Gamification is an engaging way to motivate security operations center analysts to develop their incident response skills and situational awareness.

The post Game Over: Improving Your Cyber Analyst Workflow Through Gamification appeared first on Security Intelligence.

Continue reading Game Over: Improving Your Cyber Analyst Workflow Through Gamification

Using Security Intelligence to Detect Insider Threats From Cloud-Based Applications

Security intelligence solutions such as QRadar UBA enable analysts to detect potentially malicious activity on Microsoft Office 365 cloud-based apps.

The post Using Security Intelligence to Detect Insider Threats From Cloud-Based Applications appeared first on Security Intelligence.

Continue reading Using Security Intelligence to Detect Insider Threats From Cloud-Based Applications

Unapplied Knowledge: Using Endpoint Intelligence to Earn an A-Plus in Security

Security professionals can now add the previously unapplied knowledge from IBM BigFix to the existing set of data available through QRadar.

The post Unapplied Knowledge: Using Endpoint Intelligence to Earn an A-Plus in Security appeared first on Security Intelligence.

Continue reading Unapplied Knowledge: Using Endpoint Intelligence to Earn an A-Plus in Security

Address Registry and File Activity Monitoring Requirements With the Snare Log Analysis App

The Snare Log Analysis App offers security analysts an extra pair of eyes to help them analyze SIEM logs and meet file activity monitoring requirements.

The post Address Registry and File Activity Monitoring Requirements With the Snare Log Analysis App appeared first on Security Intelligence.

Continue reading Address Registry and File Activity Monitoring Requirements With the Snare Log Analysis App

QRadar Waves From the Leader Position in the Forrester 2017 Security Analytics Wave

IBM Security was recognized as a leader in the first ever Forrester Security Analytics Wave, earning the highest scores in solution strength and vision.

The post QRadar Waves From the Leader Position in the Forrester 2017 Security Analytics Wave appeared first on Security Intelligence.

Continue reading QRadar Waves From the Leader Position in the Forrester 2017 Security Analytics Wave

Five Advantages of Cloud-Based SIEM for Security Intelligence and Operations

Moving SIEM to the cloud enables QRadar customers to increase time to value, address the IT skills shortage and maintain control of their infrastructures.

The post Five Advantages of Cloud-Based SIEM for Security Intelligence and Operations appeared first on Security Intelligence.

Continue reading Five Advantages of Cloud-Based SIEM for Security Intelligence and Operations

Five Advantages of Cloud-Based SIEM for Security Intelligence and Operations

Moving SIEM to the cloud enables QRadar customers to increase time to value, address the IT skills shortage and maintain control of their infrastructures.

The post Five Advantages of Cloud-Based SIEM for Security Intelligence and Operations appeared first on Security Intelligence.

Continue reading Five Advantages of Cloud-Based SIEM for Security Intelligence and Operations

Securing SAP Systems, Your Company’s ‘Tree of Souls’

Like the Na’vi guarded their “Tree of Souls,” the Onapsis Security Platform delivers the insights IT analysts need to protect their SAP systems.

The post Securing SAP Systems, Your Company’s ‘Tree of Souls’ appeared first on Security Intelligence.

Continue reading Securing SAP Systems, Your Company’s ‘Tree of Souls’