Wednesday, January 28, 2015
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Yahoo To Spin-Off Remaining Stake in Alibaba Group
Sony Mobile Reportedly Plans Massive Job Cuts
Apple Sells Record iPhones in Holiday Quarter, iWatch Coming in April
Microsoft Offers Power BI Business Intelligence Tools For Free
Apple Takes Top Spot in China's Smartphone Market
Dell M3800 Mobile Workstation Now Available With 4K Display
Twitter Gets Group Messaging and Video Recording
Microsoft Updates Xbox One Controller Firmware
Active Discussions
New match-3 puzzle game launch now!
Rimage 2000i
Sound card for my Laptop
hello
full screen wide screen
Hi
About the restriction problem of chapter quantity in DVD
Booktype utilities for LiteON and OEM DVD Recorders
 Home > News > General Computing > IBM Pre...
Last 7 Days News : SU MO TU WE TH FR SA All News

Monday, February 27, 2006
IBM Prevents Insider Attacks


IBM unveiled on Monday its new software designed to help companies prevent attacks from the inside on their IT systems mostly designed for businesses.

The new Big Blue's Identity Risk and Identification software monitors user actions and searches for unusual behaviour. The application analyses the past actions of every employee and compares their activities with normal activity patterns for their co-workers.

Insider attacks, such as employees stealing confidential information, represent a growing category of security incident, IBM claimed.

According to an IBM study published last month, 56 per cent of organisations have reported a security breach from within their company.

"Companies desperately need an effective solution that can adapt to the ever-changing world of fraud and theft," said William Pulleyblank, a vice president at IBM's Center for Business Optimization which developed the system.

"A key feature of this new solution is its ability to continually update the behaviour detection model with newly acquired intelligence based on changing business situations. This creates an "adaptive identity analysis" which allows the technology to automatically adapt the parameters for suspicious behaviour."


Previous
Next
Hardware Makers Face Decision on Next-Generation DVD License        All News        Panasonic, Olympus and Sony Cameras
NEC To Produce Certified Wireless USB Reference Designs     General Computing News      Vista: Six Versions not Eight

Get RSS feed Easy Print E-Mail this Message

Related News
IBM Posts Fourth-quarter Results
IBM Launches Powerful z13 Mainframe
IBM Retains U.S. Patent Record in 2014
Intel, IBM Follow Different Strategies On 14nm FinFET
Apple and IBM Bring Big Data Analytics and Security Capabilities on iPhone And iPad
Mobile Shopping Dominated During Thanksgiving And Black Friday
IBM Patents Cloud Privacy Engine
IBM Introduces Verse Business E-mail With Social Media Integration
Lufthansa Signs $1.25 billion Deal with IBM
Twitter and IBM Form Partner to Data Analytics
Glonbalfoundries Buy IBM's Micorelectronics Business
New IBM Tape Cartridge Holds 10TB Uncompressed Data

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2015 - All rights reserved -
Privacy policy - Contact Us .