IBM Releases Security Tool To Fight Denial-Of-Service Attacks, Worms
IBM Tivoli's Security Operations Manager automates security data collection and analysis, presenting incident warnings in a real-time dashboard and allowing organizations to respond immediately to threats.
IBM has launched new software that will allow IT departments, telecom service providers and IT outsourcing companies to respond proactively to security threats like denial of service attacks and worms as they happen.
IBM Tivoli Security Operations Manager, announced yesterday, automates security data collection and analysis, presenting incident warnings in a real-time dashboard. By integrating network, security, identity and systems management in a single, centralized interface, it enables organizations to respond immediately to security threats originating both outside and within the network.
The new software automatically monitors security controls and provides real-times and historical reporting. It includes a range of rule and report templates and integrates easily with security hardware like firewalls and intrusion detection and prevention systems.
Security Operations Manager can monitor security in compliance with Sarbanes-Oxley, Basel II, ISO17799 and the Control Objectives for Information and related Technology (CoBIT) initiative. "Current compliance initiatives, such as Sarbanes-Oxley, have moved security from being an esoteric practice to a boardroom-level initiative," IBM Tivoli general manager for network management technology Lloyd Carney said in a statement. "Converging critical areas within network, systems and security management will make networks more dependable, a key benefit of IT service management."
The first product to incorporate technology from IBM's acquisition of Micromuse last February, IBM Tivoli Security Operations Manager will be available on July 17.
2014 Next-Gen WAN SurveyWhile 68% say demand for WAN bandwidth will increase, just 15% are in the process of bringing new services or more capacity online now. For 26%, cost is the problem. Enter vendors from Aryaka to Cisco to Pertino, all looking to use cloud to transform how IT delivers wide-area connectivity.
The UC Infrastructure TrapWorries about subpar networks tanking unified communications programs could be valid: Thirty-one percent of respondents have rolled capabilities out to less than 10% of users vs. 21% delivering UC to 76% or more. Is low uptake a result of strained infrastructures delivering poor performance?
Join InformationWeek’s Lorna Garey and Mike Healey, president of Yeoman Technology Group, an engineering and research firm focused on maximizing technology investments, to discuss the right way to go digital.