Making an SIEM Dance With Docker

IBM added Docker containerization technology to its QRadar SIEM platform to provide the agility, stability and robustness needed to fight evolving threats.

The post Making an SIEM Dance With Docker appeared first on Security Intelligence.

Continue reading Making an SIEM Dance With Docker

The Power of Network Insights: Nowhere for Threats to Hide

IBM QRadar Network Insights enables security professionals to analyze historical threat data and identify indicators of malicious activity in real time.

The post The Power of Network Insights: Nowhere for Threats to Hide appeared first on Security Intelligence.

Continue reading The Power of Network Insights: Nowhere for Threats to Hide

Is Your Security Intelligence Solution Stuck in the Past?

IT security managers should bet on a security intelligence solution that can be installed quickly and offers speedy, reliable support.

The post Is Your Security Intelligence Solution Stuck in the Past? appeared first on Security Intelligence.

Continue reading Is Your Security Intelligence Solution Stuck in the Past?

Detect Endpoint Threats by Analyzing Process Logs in QRadar

Using an SIEM solution such as QRadar, security professionals can analyze process logs to detect, hunt and trace the source of threats.

The post Detect Endpoint Threats by Analyzing Process Logs in QRadar appeared first on Security Intelligence.

Continue reading Detect Endpoint Threats by Analyzing Process Logs in QRadar

A Year in Collaborative Defense With IBM Security App Exchange

Data from the IBM Security App Exchange’s first year offers valuable insights into download patterns and the direction of the cybersecurity market overall.

The post A Year in Collaborative Defense With IBM Security App Exchange appeared first on Security Intelligence.

Continue reading A Year in Collaborative Defense With IBM Security App Exchange

Finding the Right Apps to Streamline Data Collection

The IBM Security App Exchange includes over 70 applications to help security teams streamline data collection and share information more efficiently.

The post Finding the Right Apps to Streamline Data Collection appeared first on Security Intelligence.

Continue reading Finding the Right Apps to Streamline Data Collection

How to Add User-Defined AQL Functions in QRadar

IT professionals can leverage user-defined AQL functions in QRadar to perform complex calculations and analyze data retrieved from the Ariel databases.

The post How to Add User-Defined AQL Functions in QRadar appeared first on Security Intelligence.

Continue reading How to Add User-Defined AQL Functions in QRadar

Behavior Analytics: The Right Ingredient to Combat Insider Threats

Cybersecurity threats come from all sides — even from within the network. Behavior analytics empowers IT teams with full visibility across the IT ecosystem.

The post Behavior Analytics: The Right Ingredient to Combat Insider Threats appeared first on Security Intelligence.

Continue reading Behavior Analytics: The Right Ingredient to Combat Insider Threats

Automate Security Investigation and Remediation With External Threat Intelligence

The PassiveTotal app integrates threat intelligence with internet infrastructure data to help security teams speed up security incident investigations.

The post Automate Security Investigation and Remediation With External Threat Intelligence appeared first on Security Intelligence.

Continue reading Automate Security Investigation and Remediation With External Threat Intelligence

Security Intelligence and Analytics: A Look Forward

Clients are becoming more comfortable using cloud-delivered security intelligence services, according to offering managers Matt Carle and Chris Collard.

The post Security Intelligence and Analytics: A Look Forward appeared first on Security Intelligence.

Continue reading Security Intelligence and Analytics: A Look Forward