Tuesday, May 05, 2015
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Motorola Mobility To Pay $10 million in Fujifilm Patent Suit
CoreOS App Container Spec Gains Support From Tech Companies
Intel Accelerates Data Centers With New SSD DC S3510 Series
Some Android Smartphone Apps May Track You
GE Collaborates With Apple , Qualcomm, On Intelligent Lighting
Microsoft Announces New Solutions For IT Professionals
Facebook Launches Open Internet.org Platform
HP Revamps Its Desktop PC Offerings, Releases New 4K Display
Active Discussions
roxio issues with xp pro
How to burn a backup copy of The Frozen Throne
Help make DVDInfoPro better with dvdinfomantis!!!
Copied dvd's say blank in computer only
menu making
Optiarc AD-7260S review
cdrw trouble
burning
 Home > News > General Computing > IBM Pre...
Last 7 Days News : SU MO TU WE TH FR SA All News

Monday, February 27, 2006
IBM Prevents Insider Attacks


IBM unveiled on Monday its new software designed to help companies prevent attacks from the inside on their IT systems mostly designed for businesses.

The new Big Blue's Identity Risk and Identification software monitors user actions and searches for unusual behaviour. The application analyses the past actions of every employee and compares their activities with normal activity patterns for their co-workers.

Insider attacks, such as employees stealing confidential information, represent a growing category of security incident, IBM claimed.

According to an IBM study published last month, 56 per cent of organisations have reported a security breach from within their company.

"Companies desperately need an effective solution that can adapt to the ever-changing world of fraud and theft," said William Pulleyblank, a vice president at IBM's Center for Business Optimization which developed the system.

"A key feature of this new solution is its ability to continually update the behaviour detection model with newly acquired intelligence based on changing business situations. This creates an "adaptive identity analysis" which allows the technology to automatically adapt the parameters for suspicious behaviour."


Previous
Next
Hardware Makers Face Decision on Next-Generation DVD License        All News        Panasonic, Olympus and Sony Cameras
NEC To Produce Certified Wireless USB Reference Designs     General Computing News      Vista: Six Versions not Eight

Get RSS feed Easy Print E-Mail this Message

Related News
IBM Scientists Achieve Critical Steps to Building First Quantum Computer
IBM Revenue Falls In Q1
IBM Opens Threat Intelligence to Combat Cyber Attacks
IBM Announces Partnerships to Transform Personal Health with Watson and Open Cloud
IBM Sets New Record for Tape Storage
IBM and China Telecom Partner to Accelerate Mobile Enterprise Adoption in China
IBM Connects Internet of Things to the Enterprise
IBM Delivers Cloud Data Services with Twitter Built-In
IBM Buys AlchemyAPI
IBM Unveils New Storage Solutions Based on Micron's Flash
IBM BigInsights Introduces Machine Learning With R
IBM Says Popular Dating Apps Are Vulnerable to Hackers

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2015 - All rights reserved -
Privacy policy - Contact Us .