Explore   >   IBM PartnerWorld
 |  |  |  |  | 
by Transposh - translation plugin for wordpress

A translation widget is provided for your convenience to facilitate translation of the English language version of this blog into several languages. If you choose to utilize this automated translation facility, please understand there may be deviations between the automated translation and the original English version. IBM is not responsible for any such automated translation deviations and offers the translated version "AS IS" without warranties of any kind.

Executive Perspective SECURITY Transformation Worldwide

Delivering the promise of Cognitive Security

As I travel the world, one thing is consistent with customers and partners: the security conversation is shifting. Gone are the days of trying to control perimeters (impossible!). In recent years, we have been focused on how to use intelligence to sift through massive amounts of data to discover vulnerabilities and prioritize potential attacks. Organizations are asking for more, but not more data. Customers are struggling with security analyst burnout, which is compounded by a skills shortage.

Securing massive amounts of data, prioritizing security alerts and detecting threats is getting to a point where human interaction alone becomes implausible. IBM has the ability to leverage learning and thinking machines that offload the daily challenges of tactical defense, and operate at high speed and enterprise scale.

It’s time to shift the conversation: Understanding the benefits of Cognitive Security
At IBM Security, we’re training a new generation of cloud-based cognitive systems such as IBM Watson™ to learn, understand and reason around employee errors, insider threat, advanced malware and about constantly evolving security threats. We’re beginning to build security instincts and expertise into new thinking systems that analyze research reports, web text, threat data and other security-relevant, machine-generated and unstructured data—just like security professionals do every day—but at a scale like we’ve never seen.

The result: security professionals will call upon cognitive systems to help augment and even automate their understanding of a threat, making themselves smarter about the latest attacks and freeing up valuable time to focus on other pressing issues. Cognitive is a natural next step on our security roadmap. It builds on the foundation of Security Intelligence, which will continue to be central to our security strategy.


How you can have a conversation about cognitive with customers today
IBM Security has cognitive capabilities available in solutions today. Machine learning can help increase the detection accuracy of vulnerabilities and prioritize those vulnerabilities, so you can respond much faster. Behavioral learning is used to proactively anticipate and find anomalies around threats that are happening in the network.

As we train Watson to understand the nuances and intricacies of security globally, IBM Security and our Business Partners will continue to offer end-to-end protection and an immune system approach that spans security intelligence, identity and access, advanced fraud, data, application, network, endpoint, cloud, mobile and research. Each of these platforms is going to benefit from IBM’s cognitive capabilities. There has never been a better time to partner with IBM Security.

We are making some exciting announcements this week around our plans to lead in this new era of Cognitive Security. I invite you to learn more about our approach here and to join the conversation at our webcast on May 17, 2016.

Lindsey Lurie
Vice President of Marketing, IBM Security

Lindsey Lurie is Chief Marketing Officer for IBM Security. Lindsey's 15+ years of experience with IBM spans marketing and communication roles across multiple businesses, with responsibilities including demand generation, product marketing, advertising, PR, digital, channel marketing and event execution. Lindsey and her colleagues design the global strategy of IBM security-focused marketing campaigns, and then work with geography teams around the world on field execution.

Related Articles


Your email address will not be published. Required fields are marked *

Name *

Email *