Tuesday, October 23, 2018
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Mozilla To Sell VPN Service to Firefox Users
YouTube to Invest $20m in Educational Creators
Cadence Creates First Long-Reach 7nm 112G SerDes IP
Light Field Lab and OTOY Making the Star Trek Holodeck a Reality with Content Development
eBay's New Smartphone Trade-in Service Offers Instant and Interesting Payouts
Samsung HMD Odyssey+ Mixed Reality Headset Comes WithTwo 3.5-inch AMOLED Displays
Japanese Calsonic Kansei to Buy Magneti Marelli Auto Part Business For $7.12 Billion
Shuttle Announces SH310R4 Mini-PCs for 8th Gen Core LGA1151 Processors
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > IBM Pre...
Last 7 Days News : SU MO TU WE TH FR SA All News

Monday, February 27, 2006
IBM Prevents Insider Attacks


IBM unveiled on Monday its new software designed to help companies prevent attacks from the inside on their IT systems mostly designed for businesses.

The new Big Blue's Identity Risk and Identification software monitors user actions and searches for unusual behaviour. The application analyses the past actions of every employee and compares their activities with normal activity patterns for their co-workers.

Insider attacks, such as employees stealing confidential information, represent a growing category of security incident, IBM claimed.

According to an IBM study published last month, 56 per cent of organisations have reported a security breach from within their company.

"Companies desperately need an effective solution that can adapt to the ever-changing world of fraud and theft," said William Pulleyblank, a vice president at IBM's Center for Business Optimization which developed the system.

"A key feature of this new solution is its ability to continually update the behaviour detection model with newly acquired intelligence based on changing business situations. This creates an "adaptive identity analysis" which allows the technology to automatically adapt the parameters for suspicious behaviour."


Previous
Next
Hardware Makers Face Decision on Next-Generation DVD License        All News        Panasonic, Olympus and Sony Cameras
NEC To Produce Certified Wireless USB Reference Designs     General Computing News      Vista: Six Versions not Eight

Get RSS feed Easy Print E-Mail this Message

Related News
IBM Uses Graphene to Place Nanomaterials on Wafers, Moore's Law Rescued?
DARPA to Work With Nvidia, Qualcomm, IBM and Intel on Post-Moore's-law Projects
IBM Introduces New FlashSystem 9100 NVMe-accelerated Flash Array
IBM to Release Huge Facial Analytics Dataset For Studying Bias
IBM's AI Machine Learns to Debate Humans
IBM Crypto-Anchor Verifier, an AI-enabled Scanner for Visual Clues that Prove an Item's Authenticity
IBM Sets Tera-scale Machine Learning Benchmark Record with POWER9 and GPUs
IBM Creates Computers Smaller Than a Grain of Salt
Researchers Create Promising Flexible Electronics Based on Carbon Nanotubes
HPE and Dell Server Sales Soar in Q4
IBM Reports Revenue Growth After Six Years
Maersk and IBM to Apply Blockchain to Improve Global Trade

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2018 - All rights reserved -
Privacy policy - Contact Us .