LinkedIn emplea cookies para mejorar la funcionalidad y el rendimiento de nuestro sitio web, así como para ofrecer publicidad relevante. Si continúas navegando por ese sitio web, aceptas el uso de cookies. Consulta nuestras Condiciones de uso y nuestra Política de privacidad para más información.

LinkedIn emplea cookies para mejorar la funcionalidad y el rendimiento de nuestro sitio web, así como para ofrecer publicidad relevante. Si continúas navegando por ese sitio web, aceptas el uso de cookies. Consulta nuestra Política de privacidad y nuestras Condiciones de uso para más información.

    SlideShare
  • Slideshare-64x64 Inicio
  • Explorar
  • Búsqueda
    • Tú
  • Cargar
  • Iniciar sesión
  • Registrarse
  • Inicio
  • Explorar
×
×
×
×
×
×
ibmsecurity

IBM Security

IBM Security
  • Siguiendo Seguir   Processing…
  • 275 SlideShares
  • 991 seguidores
  • 1 tablero de recortes

Modal header

One fine body…

  • Sector Technology / Software / Internet
  • Sitio web ibm.com/security
  • Acerca de New technological capabilities come with new vulnerabilities. How do you keep up with attacks when there is a shortage of IT security skills and rising costs to secure your data? How fast can you address an attack when your solutions aren’t integrated? IBM offers a deep enterprise security portfolio customized to your company’s needs. Unmatched in ability to help you disrupt new threats, deploy security innovations and reduce the cost and complexity of IT security, IBM can safeguard your most critical data from compromise.
TwitterFacebookLinkedIn

Follow IBM Security on LinkedIn

Follow IBM Security on Twitter

Follow @IBMSecurity

Follow IBM Security on Facebook

Seguidores (991)
  • Mauro Risonho de Paula Assumpção
  • france
  • thinkofdevil
  • Sheetal Makhija
  • Sherif Salah
  • Rodrigues Victor
Following (4)
  • David Jarvis
  • IBM Rational software
  • Chris Pepin
  • IBM
Etiquetas (415)

application security appsec business cloud cloud security cyber security cyber threats cybersecurity data security ibm ibm security ibm security systems ibm security webinars ibm x-force identity and access management infographic information security infosec malware mobile mobile security qradar security security intelligence threat intelligence webinars más…

2017 2fa access management advanced attacks advanced malware advanced persistant threats advanced persistent threats advanced threat protection advanced threats advanced-threats advice agile android android keystore android vulnerabilites apache cordova application application development application scanning application security application security risk management application security testing application testing application vulnerability applications apps appscan appsec apts arxan arxan technologies assessment attack chain attackers attacks auditing authentication bank it security banking banking fraud banking security banking trojan big data big-data-security bigdata bigdataknowledge bigfix black duck black duck software blackberry blockchain breach breaches bruce schneier business business continuity byod byod security c-suite carbon black case study cdm ceo chief information security officer cio cios ciso cloud cloud application security cloud applications cloud computing cloud enforcer cloud security cloud security enforcer cloud services codb cognitive cognitive security community compliance compromised data computer security conference connected car connected devices continuous delivery corporate data cost of a data breach critical data crown jewels cryptographic key cso custom code cve-2014-8889 cxo cyber cyber forensics cyber resilience cyber security cyber security intelligence index cyber threats cybercrime cybercrime prevention cybersecurity data data breach data compliance data governance data management data privacy data protection data security datasheet dating apps devops digital piracy dropbox dropbox sdk dynamic attack chain dynamic playbooks dyre dyre trojan education emergency response emerging threats encrypted threats endpoint endpoint management endpoint protection endpoint security energy enterprise enterprise security enterprise software entitlements creep esg evasion techniques event executive exhibition experts exploit ffiec fiberlink financial fraud financial services firefox forensics forrester research framework fraud fraud detection fraud prevention fraud protection fs-isac gartner gdpr global intelligence governance government government security guardium hackers hacking healthcare healthcare security heartblead vulnerability heartbleed how to hybrid cloud iaas iam ib ibm ibm 2015 cyber security intelligence index ibm application security analyzer ibm appscan ibm ciso assessment ibm emergency response services ibm fiberlink ibm guardium ibm infosphere ibm insight ibm interconnect ibm mobile analyzer ibm qradar ibm resilient ibm security ibm security cloud enforcer ibm security services ibm security systems ibm security trusteer ibm security trusteer apex ibm security webinars ibm threat protection system ibm watson ibm x-force ibm x-force exchange ibm x-force report ibm x-force research ibmsecurity idaas identity identity access identity and access management identity and access management-as-a-service identity governance identity management incident response incident response platform industrial control system info infographic information secuirty information security information technology infosec infosecurity infrastructure infrastructure-as-a-service (iaas) innovation insider threats insights integration intelligence sharing interconnect 2015 internet internet of things ios ios 9 iot iphone ips it it security java java applications java vulnerability larry ponemon love mainframe malware managed security services managed service providers management mobil mobile mobile application mobile application development mobile application security mobile applications mobile apps mobile banking mobile banking applications mobile computing mobile dating apps mobile device mobile devices mobile dynamic application security testing mobile enterprise mobile fraud mobile malware mobile phone mobile security mobile security risk mobile security trends mobile technologies mobile threats mobilephobia modern mainframe money mule msps mss network protection network security network threat protection networking nss labs obile oil and gas oil and gas energy online dating open source orchestrate overview owasp owasp top 10 paas pass codes passcodes pii platform-as-a-service (paas) ponemom ponemon ponemon institute predictions privacy privileged users protecting devices public clouds q1 labs q1labs qradar qradar incedent forensics qradar siem ransomware report reputation reputational risk research retail retail breach risk risk management roi saas sans sec secuirty secure development life cycle (sdlc) securing cloud securing mobile access securing your industry security security automation security compliance security defenses security events security incidents security intellgence security intelligence security offenses security operation center security orchestration security roi security services security solutions security trends security webina security webinars security-intelligence securosis sem sensitive data shellshock siem single platform smart office smartcloud smartphone soar soar platform social login social media social media security software software license software piracy software-as-a-service (saas) solutions spam statistics study systems tablet tactics target breach target retail breach targeted attacks technology tei threat threat intelligence threat management threat mangement threat prevention threat protection threat research threat sharing threat vectors threats tips tolly report total economic impact trojan trusteer trusteer apex trusteer web fraud two-factor two-factor authentication uba unified endpoint management unstructured data usb tokens valentine value vulnerabili vulnerabilities vulnerability vulnerability manager wannacry wannacrypt watson web application web fraud webinar webinars wendi whitmore white paper x force xforce xgs zero-day threats zframe zsecure menos

Ver todo Documents (46)

  • Cyberattacks: The Next Health Care Epidemic Cyberattacks: The Next Health... Hace 3 años
  • Financial Services: The Most Attacked Industry in 2016 Financial Services: The Most ... Hace 3 años
  • Critical Energy Infrastructures Targeted in Cyber Attacks Critical Energy Infrastructur... Hace 3 años
  • Why IBM Cloud Identity Service Tops the IDaaS Chart Why IBM Cloud Identity Servic... Hace 3 años

Ver todo Presentations (174)

  • Automation: Embracing the Future of SecOps Automation: Embracing the Fut... Hace 1 año
  • Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on the Cyber Resilient Organization Leaders & Laggards: The Lates... Hace 1 año
  • Bridging the Gap between Privacy and Security: Using Technology to Manage Complex Breach Disclosure Regulations Bridging the Gap between Priv... Hace 1 año
  • Integrated Response with v32 of IBM Resilient Integrated Response with v32 ... Hace 2 años

Ver todo Infographics (54)

  • Tame Your Open Source Frontier Tame Your Open Source Frontier Hace 3 años
  • Mobile Vision 2020 Mobile Vision 2020 Hace 3 años
  • Monitored Security is Superior Monitored Security is Superior Hace 3 años
  • 2016: The Year Menaces Multiplied 2016: The Year Menaces Multip... Hace 3 años

Ver todo Likes

  • Cyberattacks: The Next Health Care Epidemic Cyberattacks: The Next Health... de ibmsecurity Hace 3 años
  • Recent ECB/ EBA regulations how they will impact European banks in 2016 Recent ECB/ EBA regulations h... de ibmsecurity Hace 5 años
  • Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention Introducing IBM Cloud Securit... de ibmsecurity Hace 5 años
  • Cybersecurity education for the next generation - Executive Summary Cybersecurity education for t... de dajarvis Hace 7 años
  • Pulse 2013 - How to run a successful BYOD initiative Pulse 2013 - How to run a suc... de chrispepin Hace 7 años
  • Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primer Pulse 2013 - Mobile strategy ... de chrispepin Hace 7 años
  • Best practices for mobile enterprise security and the importance of endpoint management Best practices for mobile ent... de chrispepin Hace 7 años
  • English
  • Español
  • Português
  • Français
  • Deutsch
  • Acerca de
  • Desarrolladores y API
  • Blog
  • Condiciones
  • Privacidad
  • Copyright
  • Atención al cliente
Fuentes RSS