• Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
Saturday, April 18, 2026
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
No Result
View All Result

Home » IBM Outlines Big Data Approach to Cyber Security

IBM Outlines Big Data Approach to Cyber Security

January 31, 2013
in All
A A

IBM introduced a solution that combines security intelligence with big data analytics capabilities for both external cyber security threats and internal risk detection and prevention.  The goal is to allow security analysts to extend their analysis well beyond typical security data and to hunt for malicious cyber activity.

The IBM Security Intelligence with Big Data solution combines real-time correlation for continuous insight, custom analytics across massive structured data (such as security device alerts, operating system logs, DNS transactions and network flows) and unstructured data (such as emails, social media content, full packet information and business transactions), and forensic capabilities for evidence gathering.  IBM said this combination provides deeper insight into advanced persistent threats, fraud and insider threats.

Key elements of the solution include:

  • Real-time correlation and anomaly detection of diverse security and network data
  • High-speed querying of security intelligence data
  • Flexible big data analytics across structured and unstructured data – including security, email, social media, business process, transactional, device, and other data
  • Graphical front-end tool for visualizing and exploring big data
  • Forensics for deep visibility into network activity

IBM cited the Depository Trust & Clearing Corporation (DTCC) as a potential beneficiary of this big data cyber analysis approach.

“As the sophistication and technological means of cyber-criminals increase, the financial industry and government need to move to a risk-based framework that incorporates the dynamic nature of the threat landscape,” said Mark Clancy, CISO, Managing Director, Technology Risk Management, DTCC. “We need to move from a world where we ‘farm’ security data and alerts with various prevention and detection tools to a situation where we actively ‘hunt’ for cyber-attackers in our networks. IBM’s Security Intelligence with Big Data solution gives us a practical way to gain visibility across our environment. We’re gaining real-time security awareness and meaningful insight into historical activity across years of diverse data.”

Tags: Blueprint columnsCyber SecurityIBM
ShareTweetShare
Previous Post

ZTE: LTE Carrier Aggregation Test Peaks at 223 Mbps

Next Post

BT Super Fast Broadband Passing 100,000 Premises

Staff

Staff

Related Posts

IBM and Cisco Aim for Networked, Fault-Tolerant Quantum by Early 2030s
Quantum

IBM and Cisco Aim for Networked, Fault-Tolerant Quantum by Early 2030s

November 20, 2025
IBM Doubles Quantum R&D Speed With 300 mm Fab
Quantum

IBM Doubles Quantum R&D Speed With 300 mm Fab

November 12, 2025
Airtel and IBM Partner to Expand AI-Ready Cloud Infrastructure
All

Airtel and IBM Partner to Expand AI-Ready Cloud Infrastructure

October 23, 2025
IBM Launches Spyre Accelerator to Power Generative and AgenticAI
Data Centers

IBM Launches Spyre Accelerator to Power Generative and AgenticAI

October 8, 2025
Video: AI Automation for Real-Time, Multi-Vendor Networks
Video

#AINetworking25: What’s Next for AI-Driven Networking – Director’s Cut

October 6, 2025
IBM Launches Power11 Server Family with AI Acceleration
Data Centers

IBM Launches Power11 Server Family with AI Acceleration

July 8, 2025
Next Post
BT Super Fast Broadband Passing 100,000 Premises

BT Super Fast Broadband Passing 100,000 Premises

Please login to join discussion

Categories

  • 5G / 6G / Wi-Fi
  • AI Infrastructure
  • All
  • Automotive Networking
  • Blueprints
  • Clouds and Carriers
  • Data Centers
  • Enterprise
  • Explainer
  • Feature
  • Financials
  • Last Mile / Middle Mile
  • Legal / Regulatory
  • Optical
  • Quantum
  • Research
  • Security
  • Semiconductors
  • Space
  • Start-ups
  • Subsea
  • Sustainability
  • Video
  • Webinars

Archives

Tags

5G All AT&T Australia AWS Blueprint columns BroadbandWireless Broadcom China Ciena Cisco Data Centers Dell'Oro Ericsson FCC Financial Financials Huawei Infinera Intel Japan Juniper Last Mile Last Mille LTE Mergers and Acquisitions Mobile NFV Nokia Optical Packet Systems PacketVoice People Regulatory Satellite SDN Service Providers Silicon Silicon Valley StandardsWatch Storage TTP UK Verizon Wi-Fi
Converge Digest

A private dossier for networking and telecoms

Follow Us

  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

No Result
View All Result
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Go to mobile version