0 April 2022 @ 10:00

Registration Form

IBM Security and Red Hat will be sharing what they and their customers are seeing in cybersecurity and the changes they are making as a result.

This discussion won't just touch on the usual cybersecurity technologies like Endpoint Protection, Mobile Device Management, SIEMs, 2FA and Privileged Access, and the importance of having them talk to one another. Red Hat, IBM Security, and BMT Solutions will also be discussing other security technologies not nearly talked about enough in the Caribbean, like Identity and Access Management, Secret Vaults, DevOps/SecOps and protection-through-agility by adopting a multi-cloud strategy and not being dependent on any single cloud provider.

Timezone
First Name *
Last Name *
Email *
Organization *
Role in Purchase Process *

Speakers

land-img
Dipan Patel

Red Hat Solutions Architect Lead

land-img
Sheik I Sahib

MSc., CCSP, CISSP | Senior Security Technical Specialist & Architect, IBM

land-img
Timothy Dilbert

CEO, BMT Solutions

Further Reading

Things that may come up in our session, and further reading to keep up-to-date.

...
IBM Security X-Force Threat Intelligence Index 2022

Each year, IBM Security X-Force—our in-house team of cybersecurity experts and remediators—mines billions of data points to expose today’s most urgent security statistics and trends.

Read
...
Red Hat Ansible Security Automation

Red Hat Ansible Automation Platform caters to the growing importance of security with Ansible security automation: our answer to the lack of integration across the IT security industry.

Learn More
...
IBM Security Verify

Add deep context, intelligence and security to decisions about which users should have access to your organization’s data and applications, on-premises or in the cloud.

Learn More
...
Red Hat OpenShift

Red Hat® OpenShift® is an enterprise-ready Kubernetes container platform built for an open hybrid cloud strategy. It provides a consistent application platform to manage hybrid cloud, multicloud, and edge deployments.

Learn More
...
SecurityIntelligence.com

Find the latest security analysis and insight from top IT security experts and leaders, made exclusively for security professionals and CISOs.

Visit
...
Channel: Red Hat Security

Red Hat's most recent posts about IT security, supply chain, DevSecOps and more.

Visit
...
IBM Security Guardium

IBM Security Guardium Data Protection supports a zero trust approach to security. It discovers and classifies sensitive data from across the enterprise, providing real-time data activity monitoring and advanced user behavior analytics to help discover unusual activity around sensitive data.

Learn More
...
IBM QRadar

IBM Security® QRadar® Security Information and Event Management (SIEM) helps security teams detect, prioritize and respond to threats across the enterprise.

Learn More
...
IBM Security Privilege Vault

IBM Security Verify Privilege Vault makes it easy to identify and secure all service, application, administrator, and root accounts across your enterprise.

Learn More