Saturday, July 26, 2014
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Tablet Market Grows in Second Quarter
The Pirate Bay Goes Mobile
ASUS Announces Strix DSP, Strix Claw, Strix Tactic Pro and Strix Glide Series
China Telecom to Offer The Xbox One System
Thermaltake Debuts the Water 3.0 Ultimate All-In-One Liquid
HP Pavilion 10z Laptop Uses An AMD Mullins Processor
Google Does Not Confirm to $1 Billion Acquisition Of Twitch
Sony Settles 2011 PSN Hacking Case
Active Discussions
help questions structure DVDR
Made video, won't play back easily
Questions durability monitor LCD
Questions fungus CD/DVD Media, Some expert engineer in optical media can help me?
CD, DVD and Blu-ray burning for Android in development
IBM supercharges Power servers with graphics chips
Werner Vogels: four cloud computing trends for 2014
Video editing software.
 Home > News > General Computing > IBM Pre...
Last 7 Days News : SU MO TU WE TH FR SA All News

Monday, February 27, 2006
IBM Prevents Insider Attacks


IBM unveiled on Monday its new software designed to help companies prevent attacks from the inside on their IT systems mostly designed for businesses.

The new Big Blue's Identity Risk and Identification software monitors user actions and searches for unusual behaviour. The application analyses the past actions of every employee and compares their activities with normal activity patterns for their co-workers.

Insider attacks, such as employees stealing confidential information, represent a growing category of security incident, IBM claimed.

According to an IBM study published last month, 56 per cent of organisations have reported a security breach from within their company.

"Companies desperately need an effective solution that can adapt to the ever-changing world of fraud and theft," said William Pulleyblank, a vice president at IBM's Center for Business Optimization which developed the system.

"A key feature of this new solution is its ability to continually update the behaviour detection model with newly acquired intelligence based on changing business situations. This creates an "adaptive identity analysis" which allows the technology to automatically adapt the parameters for suspicious behaviour."


Previous
Next
Hardware Makers Face Decision on Next-Generation DVD License        All News        Panasonic, Olympus and Sony Cameras
NEC To Produce Certified Wireless USB Reference Designs     General Computing News      Vista: Six Versions not Eight

Get RSS feed Easy Print E-Mail this Message

Related News
Apple and IBM Partner On Enterprise Mobility
IBM Announces $3 Billion Investment In Future Chip Research
IBM To Help China Deliver on Ambitious Energy and Environmental Goals
China Clears IBM, Lenovo Server Deal
IBM Hopes Nanotube Transistors Are Coming Aroud 2020
IBM May Sell Chip-Making Unit to Globalfoundries: report
IBM Ships POWER8 Power System Servers
IBM Patent Helps Eliminate Fraudulent Behavior in the Cloud
IBM And Fujifilm Squeeze Really Big Data In Magnetic Tapes
Researchers Discover New 'Self-healing' Industrial Polymers
IBM Develops Ultra-fast Phase Change Memory System
IBM Tackles Big Data Challenges with Open Server Model

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2014 - All rights reserved -
Privacy policy - Contact Us .