Breaking News

ASUS Unveils Mac-Friendly Features on ProArt Displays to Enhance Workflows Ricoh announces GR IV Monochrome Acer ProDesigner PE320QX monitor excels at tests! MSI announces Roamii BE Pro Mesh WiFi 7 System Samsung Mobile Gaming Hub Reshapes Personalized Play

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

IBM Prevents Insider Attacks

IBM Prevents Insider Attacks

Enterprise & IT Feb 27,2006 0

IBM unveiled on Monday its new software designed to help companies prevent attacks from the inside on their IT systems mostly designed for businesses. The new Big Blue's Identity Risk and Identification software monitors user actions and searches for unusual behaviour. The application analyses the past actions of every employee and compares their activities with normal activity patterns for their co-workers.

Insider attacks, such as employees stealing confidential information, represent a growing category of security incident, IBM claimed.

According to an IBM study published last month, 56 per cent of organisations have reported a security breach from within their company.

"Companies desperately need an effective solution that can adapt to the ever-changing world of fraud and theft," said William Pulleyblank, a vice president at IBM's Center for Business Optimization which developed the system.

"A key feature of this new solution is its ability to continually update the behaviour detection model with newly acquired intelligence based on changing business situations. This creates an "adaptive identity analysis" which allows the technology to automatically adapt the parameters for suspicious behaviour."

Tags: IBM
Previous Post
Hardware Makers Face Decision on Next-Generation DVD License
Next Post
Panasonic, Olympus and Sony Cameras

Related Posts

  • IBM and AMD Join Forces to Build the Future of Computing

  • IBM Unveils watsonx Generative AI Capabilities to Accelerate Mainframe Application Modernization

  • New magnetic tape prototype breaks data density and capacity records

  • IBM Expands the Computational Power of its IBM Cloud-Accessible Quantum Computers

  • Researchers Use Analog AI hardware to Support Deep Learning Inference Without Great Accuracy

  • Server Market Posts a Record First Quarter on Strong Cloud-service Demand

  • IBM Wants to Change IT Operations With Watson AIOps, Releses Edge Computing Solutions for 5G Deployments 5G era

  • IBM Reports Continued Cloud Revenue Growth, Withdraws Annual Forecast

Latest News

ASUS Unveils Mac-Friendly Features on ProArt Displays to Enhance Workflows
Enterprise & IT

ASUS Unveils Mac-Friendly Features on ProArt Displays to Enhance Workflows

Ricoh announces GR IV Monochrome
Cameras

Ricoh announces GR IV Monochrome

Acer ProDesigner PE320QX monitor excels at tests!
GPUs

Acer ProDesigner PE320QX monitor excels at tests!

MSI announces Roamii BE Pro Mesh WiFi 7 System
Enterprise & IT

MSI announces Roamii BE Pro Mesh WiFi 7 System

Samsung Mobile Gaming Hub Reshapes Personalized Play
Smartphones

Samsung Mobile Gaming Hub Reshapes Personalized Play

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed