IBM is bringing its security intelligence technology, IBM QRadar, to the cloud, to help give companies the ability to prioritize real threats and free up critical resources to fight cyberattacks. The new services are available to clients through a cloud-based Software as a Service (SaaS) model, with optional IBM Security Managed Services to provide deeper expertise and flexibility for security professionals.
“Organizations are facing a security data tsunami that can overwhelm even the most sophisticated enterprise’s security program,” said Jason Corbin, vice president, product management and strategy for IBM Security. “Security leaders are telling us they want increased visibility through the cloud and control throughout their hybrid IT environments. The option of doing predictive analytics via the cloud gives security teams the flexibility to bring in skills, innovation and information on demand across all of their security environments.”
The new cloud-based services include IBM Security Intelligence on Cloud, designed to help organizations determine if security-related events are simple anomalies or potential threats. Built as a cloud service using IBM QRadar, enterprises can correlate security event data with threat information from over 500 supported data sources for devices, systems, and applications. This is complemented by more than 1,500 pre-defined reports for use cases such as compliance, vulnerability management and security incident response. Also, the integration of QRadar with IBM’s recently announced cloud-based X-Force Exchange gives security teams volumes of historical and real time threat intelligence.
IBM also offers Intelligent Log Management on Cloud, designed to help simplify security and compliance data collection and reporting needs. Powered by IBM QRadar technology, Intelligent Log Management uses analytics and a hosted, multi-tenant technology to deliver comprehensive compliance with powerful real-time correlation and anomaly detection capabilities. Through support for more than 400 platforms, security managers can also capture logs from nearly any device in their security operation.
For more information, visit www.ibm.com/security.