Security at IBM Impact 2013
Marcel Santilli 270002FABM email@example.com | | Tags:  ibmimpact ibmsecurity impact2013 ibm-impact security ibm-security
0 Comments | 3,489 Visits
Did you know IBM Security offers one of the world’s broadest, most advanced and integrated enterprise security product and service portfolios?
IBM Security’s portfolio, supported by world-renowned IBM X-Force research and development, provides the security intelligence to help organizations holistically protect their people, infrastructure, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more.
This enables organizations to more effectively manage risk and implement integrated security solutions for mobile, cloud, social media and other enterprise business architectures.
Security at Impact 2013
Learn more about IBM Security’s products and services at IBM Impact 2013. We will have a strong presence at Impact this year, including:
Come interact with the actual folks implementing advanced technologies to better understand the security concerns these topics open up and how IBM can help address them. Find more details below and search for 'security' in you agenda builder for even more sessions.
Top Security Sessions at IBM Impact:
Below are some of the top security sessions at IBM Impact 2013 that you do not want to miss:
Do you have a pulse of your security and risk posture?
Security has become a board room discussion as it impacts business and IT. Whether your risks are due to advanced threats, mobile access, cloud infrastructure, compliance issues, or you're looking to analyze big data for security insights, you need to assess your posture and apply a set of security capabilities to deal with that security challenge. This session will discuss how capabilities across People, Data, Application, Infrastructure and Security Intelligence can help you proactively manage your security and risk posture.
Who Do You Know, and Who Do You Trust?
The concept of identity as authority is ages old, but today's highly connected and socially networked environment has created multiple identities for most users. Some identify most strongly with social platforms, others adhere to their organizational identity, while many are still rooted in their physical persona as represented by driver's licenses and passports. This session will discuss the role of identity and access in today's world, as well as an approach to apply them in addressing trends around cloud, mobile and identity intelligence.
Security for Mobile Devices, Applications and Information
Organizations want to provide users the option of using a mobile devices to allow them to work wherever/whenever they need to, but doing so requires diligence in protecting sensitive data for compliance. Organizations are now tasked with supporting the new social, virtual, and mobile users and the applications they access. With mobile threats on the rise, complex IT environments, and maintaining policies are top of mind concerns for many security and risk professionals. This session will provide insight into how organizations can manage their risk by taking steps to manage these mobile devices, protect sensitive data with IBM Security solutions. The session will include a demonstration of IBM WorkLight, ISAM and IEM working together.
If you have any questions or want to see the latest from IBM Security, follow us on Twitter.