• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • IBM Rolls Out Security Analytics and Managed Service Offerings

    November 8, 2011 Alex Woodie

    IBM last week unveiled a host of new security solutions aimed at helping customers stay on top of the complex and evolving security threat landscape. The new offerings include four new analytics tools that are available as subscriptions, and one managed security information and event management (managed SIEM) offering that uses on-site hardware and IBM know-how on the other end of the wire.

    IBM shook up its computer security business a month ago when it created a new Security Services division immediately following its acquisition of SIEM solution provider Q1 Labs. The creation of the division marks a strong push by IBM to focus on the burgeoning market for managed security services (MSS).

    IBM fleshed out its MSS lineup last week with the announcement of six new subscription offerings. Among the new offerings is a new Suspicious Host Dashboard, which analyzes security data originating from several sources, and provides real-time identification of advanced threats, such as botnets. The Suspicious Host Dashboard gets data from firewall logs, threat intelligence feeds, intrusion detection and prevention systems, and IP location data. IBM takes this information, prioritizes it, and presents the most severe threats to the user through the dashboard.

    Another new offering is the IP Intelligence Report. A subscription to this service provides the customer with a one-page report that identifies the IP addresses that pose the most danger to an organization, as well as the vulnerabilities that exist and the remediation activities under way.

    The third new subscription is the Enhanced Automated Intelligence (AI) correlation engine. With this offering, IBM gathers threat information originating from multiple MSS subscriptions, correlates any matching threat activity, and presents that data to the user. In effect, it’s a SIEM that works on MSS data, as opposed to log and network-device data captured by the customer.

    The new IP Center Dashboard provides the capability to query MSS data sets. This service, which is also available as a subscription, enables IBM threat analysts to dive deep into all the MSS data gathered by the customer, to validate possible security threats and streamline the prioritization of remediation activities.

    IBM’s new managed SIEM offering provides IBM security expertise with on-premise, log-gathering equipment. This solution works with all types of hardware, including hardware from Q1 Labs and other SIEM vendors. The various log data is sent to IBM, where it is identified and correlated by IBM security experts using the Q1 Labs software.

    “IBM recognizes a client’s need to get ahead of the threats in today’s complex security landscape,” said Marisa Viveros, a vice president at IBM Security Services. “We are applying our nearly five decades of security experience to help clients move from a reactive position to a proactive one, using analytics to anticipate threats as they appear instead of after the fact.”

    For more information on IBM’s MSS offerings, see www-935.ibm.com/services/us/en/it-services/security-services.html.

    RELATED STORIES

    IBM Grabs Q1 Labs and Creates New Security Division

    Q1 Labs Streamlines Security Alerts for U.K. Insurance Company

    Mobile Malware Set to Explode, Security Pros Say

    Q1 Labs Adds IBM i, Social Media Monitoring to SIEM



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    ARCAD Software

    [Webinar] It’s Time to Move from Legacy Change Management to DevOps on the IBM i

    Are you still relying on change management tools from the 1980s? These legacy solutions—many minimally maintained—are creating bottlenecks in your development process and putting your IBM i modernization goals at risk.

    Join our roundtable webinar where ARCAD’s Technical Consultants share real-world insights on transitioning from outdated tools like Turnover and MKS/Implementer to modern DevOps practices.

    What you’ll discover:

    • How legacy change management limits IBM i capabilities (SQL, ILE, and beyond)
    • The advantage of ARCAD’s highly-optimized bi-directional Git integration
    • Why ARCAD’s repository accelerates development and reduces risk and is called ‘golden’ by users
    • Leveraging AI and VS Code for IBM i development
    • Proven migration strategies and automated workflows

    Whether you’re just starting your DevOps journey or ready to leave legacy tools behind, our experts will show you the path forward to faster, safer, and more efficient development.

    Register Now!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Shield Advanced Solutions:  Access IBM i data & objects from Linux & Windows Servers using PHP
    Dan Riehl Presents:  Fall Training Sale – Discounts up to 40%! RPG IV COBOL CL Admin Security
    ProData Computer Services:  Learn how to access remote data -- RDB Connect On-Demand Webinar

    IT Jungle Store Top Book Picks

    BACK IN STOCK: Easy Steps to Internet Programming for System i: List Price, $49.95

    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The iSeries Pocket Database Guide: List Price, $59
    The iSeries Pocket SQL Guide: List Price, $59
    The iSeries Pocket WebFacing Primer: List Price, $39
    Migrating to WebSphere Express for iSeries: List Price, $49
    Getting Started with WebSphere Express for iSeries: List Price, $49
    The All-Everything Operating System: List Price, $35
    The Best Joomla! Tutorial Ever!: List Price, $19.95

    Small Businesses Agree Social Media Is A Path To Customers Add Powerful Generic Processing to Your Applications

    Leave a Reply Cancel reply

Volume 11, Number 37 -- November 8, 2011
THIS ISSUE SPONSORED BY:

Vision Solutions
Profound Logic Software
inFORM Decisions
VAULT400
Shield Advanced Solutions

Table of Contents

  • Arpeggio Introduces IBM i Security Monitoring Solutions
  • Lavastorm: An Analytic Power Tool for All Seasons
  • Attachmate Masks IBM i, z/OS Data Within the Emulator
  • IBM Rolls Out Security Analytics and Managed Service Offerings
  • Ari Kugler to Discuss IBM’s IBM i Cloud Strategy in Symmetry Webinar
  • ManageEngine Updates Apps Manager
  • Quadrant Ships IRS Forms Packs for 2011
  • Jack Henry ATM Deposit Solution Integrated with Core Banking Systems
  • SugarCRM Bolsters Development, Admin Features with Version 6.3
  • Kronos Launches New InTouch Time Clock

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM Starts Winding Down Power10 System Sales
  • Guru: Service Programs And Activation Groups – Design Decisions That Matter
  • Strategic Topics To Think About For 2026, Part 1
  • Shield Gooses Performance Of Nagios Monitoring Tool, Adds AI Reporting
  • IBM i PTF Guide, Volume 28, Number 6
  • Rolling The Die In 2026: IBM i Predictions, Take Two
  • Perhaps 2026 Is The Year For Power Systems To Boom A Little
  • Guru: Binder Source Is Your Service Program’s Owner’s Manual
  • Skills Displaces Cybersecurity As Top Concern For IBM i Shops
  • IBM i PTF Guide, Volume 28, Number 5

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle