IBM Security Connect

IBM Security Connect is a cloud-based platform that enables you to gather security data from across your existing tools and products. Pick and choose security capabilities or unified solutions from IBM Security and partners. With embedded analytics from other industries and organizations, uncover new risks and strengthen your security program. The result is effective security customized to your individual priorities, budget and needs.

IBM Security Connect Courses:

Overview of Threat Operations Solution on the IBM Security Connect platform

This course simulates the end-to-end flow of the Threat Operations Solution on IBM Security Connect (ISC).

In this course, you use fundamental ISC platform capabilities, such as Connectors. These platform capabilities are used along with the apps that create the Threat Operations Solution: Threat Intelligence Insights, Data Explorer, and Orchestrated Response.

{GENERICO:type="hints",style="Attention"}

The platform and access are available through a controlled Pre-Release Trial, 60-day, invite-only program.

The trial is available beginning April 23, 2019.

You can use the following link to sign up and IBM will contact you to register. 

https://ibm.biz/ISC-PRT

{GENERICO:type="hints_end"}


Platform capabilities:

  • Connectors - used to connect to data sources and use your existing point security solutions such as SIEM tools and EDR tools.

  • Cases - A case management service provided as a core part of the IBM Security Connect platform. It facilitates data exchange, activity tracking, collaboration, and manual task execution between Connect applications.

Threat Operations Solution:

  • Threat Intelligence Insights app - used to reduce your investigation time with actionable threat intelligence, prioritization, and increased visibility into your environment.

  • Data Explorer app - used to run a federated search and conduct investigations across all connected data sources.

  • Orchestrated Response - used to automate your incident response plan in association with any of the information revealed from the connectivity of the ISC platform and the Threat Intelligence Insights and Data Explorer apps. 

{GENERICO:type="hints",style="Important"}Not all of these apps and features have been released yet. The intent of this demonstration is to give you an indication of the look and feel of the end-to-end solution. The User Interface is regularly being updated, so the best indication of current capabilities are the actual applications on the actual IBM Security Connect Platform. 


As we update the User Interface and add more apps and capabilities, we will update this course. So be sure to look out for updates!

{GENERICO:type="hints_end"}

Introduction to the IBM Security Connect Threat Ops solution

This video provides an overview of the IBM Security Connect (ISC) solution.

IBM Security Connect is an open, cloud-based cybersecurity platform that integrates your disconnected security systems for a complete view of all your security data, without moving the data.

It turns individual apps, services, and capabilities into unified solutions to empower your teams to act faster, and improves your security posture with collective intelligence from a global community. Reduce complexity, expand your visibility and maximize your existing investments with a powerful, open, cloud security platform that connects your teams, tools and data.

IBM Security Connect - Evolve your security

Experience the next evolution of cybersecurity. Unleash the power of an open, simple, connected cloud platform to bring your teams, tools, and data together.

IBM Security Connect is an open, cloud-based platform that gives you a complete view of all your security data, without migrating it. It turns individual apps, services, and capabilities into unified solutions, and advances your security with collective intelligence from your peers.

IBM Security Connect Apps and Use Cases

IBM® Security Connect is a cloud-based platform that enables you to gather security data from across your existing tools and products.

Pick and choose security capabilities or unified solutions from IBM Security and partners.

With embedded analytics from other industries and organizations, uncover new risks and strengthen your security program.

This courses details the following apps and use cases:

  • Threat Intelligence from X-Force
  • Data Explorer
  • Orchestrated Response

Duration:

Version 1.0

Connect your data with IBM Security Connect

This video provides an overview of IBM Security Connect.

With organizations facing increasing complexity as they continue to add new cybersecurity point solutions to address each new problem, it’s time for a better way to connect security data, tools and teams.

IBM Security Connect connects to your existing security systems, such as security information and event management (SIEM) products, endpoint detection and response (EDR) products, data lakes, and more, and pulls up your data in context for you to analyze and use across individual cybersecurity applications and unified solutions on the platform.

{GENERICO:type="hints",style="Attention"}

The platform and access are available through a controlled Pre-Release Trial, 60-day, invite-only program.

The trial is available beginning April 16, 2019.

You can use the following link to sign up and IBM will contact you to register. 

https://ibm.biz/ISC-PRT

{GENERICO:type="hints_end"}


Platform capabilities:

  • Connectors - used to connect to data sources and use your existing point security solutions such as SIEM tools and EDR tools.

  • Cases - A case management service provided as a core part of the IBM Security Connect platform. It facilitates data exchange, activity tracking, collaboration, and manual task execution between Connect applications.

Threat Operations Solution:

  • Threat Intelligence Insights app - used to reduce your investigation time with actionable threat intelligence, prioritization, and increased visibility into your environment.

  • Data Explorer app - used to run a federated search and conduct investigations across all connected data sources.

  • Orchestrated Response - used to automate your incident response plan in association with any of the information revealed from the connectivity of the ISC platform and the Threat Intelligence Insights and Data Explorer apps. 

{GENERICO:type="hints",style="Important"}Not all of these apps and features have been released yet. The intent of this demonstration is to give you an indication of the look and feel of the end-to-end solution. The User Interface is regularly being updated, so the best indication of current capabilities are the actual applications on the actual IBM Security Connect Platform. 


As we update the User Interface and add more apps and capabilities, we will update this course. So be sure to look out for updates!

{GENERICO:type="hints_end"}

Duration: 2 minutes

Version 1.0

IBM Security Connect - All you need to know

This course provides you with details on the IBM Security Connect (ISC) solution.

In this course, you are provided with the following information:

  • Why cybersecurity is a universale challenge
  • Why managing cybersecurity has become extremely complex
  • What is the Connect platform
  • How ISC provides insight through true data integration
  • What are the ISC platform and connectors core capabilities
  • What are the ISC platform core features
  • What is the ISC Threat Ops solution

{GENERICO:type="hints",style="Attention"}

The platform and access are available through a controlled Pre-Release Trial, 60-day, invite-only program.

The trial is available beginning April 16, 2019.

You can use the following link to sign up and IBM will contact you to register. 

https://ibm.biz/ISC-PRT

{GENERICO:type="hints_end"}


Platform capabilities:

  • Connectors - used to connect to data sources and use your existing point security solutions such as SIEM tools and EDR tools.

  • Cases - A case management service provided as a core part of the IBM Security Connect platform. It facilitates data exchange, activity tracking, collaboration, and manual task execution between Connect applications.

Threat Operations Solution:

  • Threat Intelligence Insights app - used to reduce your investigation time with actionable threat intelligence, prioritization, and increased visibility into your environment.

  • Data Explorer app - used to run a federated search and conduct investigations across all connected data sources.

  • Orchestrated Response - used to automate your incident response plan in association with any of the information revealed from the connectivity of the ISC platform and the Threat Intelligence Insights and Data Explorer apps.

Duration: 5 min

Course revision: 1.0

IBM Security Connect Subjects:

Data Explorer

Threat Intelligence

Orchestrated Response