IBM Security QRadar Incident Forensics software launched

IBM today said its Security QRadar Incident Forensics, a new software product designed as a module for the QRadar Security Intelligence Platform, can help security teams retrace the step-by-step actions of sophisticated cyber criminals.

By adding this forensics capture and search module to its QRadar Security Intelligence platform, IBM can further strengthen its clients’ abilities to efficiently investigate security incidents and understand the impact of any suspicious activity.

QRadar Incident Forensics provides a record of activity on the network, enabling organizations to retrace suspicious activity, provide alerts to growing concerns, and provide forensics search capabilities.

IBM Security QRadar Incident Forensics software launched

“Every breach is a race against time. This new forensics module further expands the breadth and depth of IBM’s security intelligence capabilities,” said Brendan Hannigan, general manager of IBM Security Systems.  “QRadar Incident Forensics further helps IT staff prevent emerging threats and better determine the impact of any intrusion.”

IBM Security QRadar Incident Forensics will help any member of an IT security team quickly and efficiently research security incidents or test for conditions associated with an observed attack pattern from an Internet threat intelligence feed such as X-Force.

By using this guidance, security teams can avoid spending valuable time searching through petabytes of network traffic, and potentially discovering nothing of immediate value. With QRadar, security analysts can quickly collect security data related to an incident.

In the second quarter of 2014, IBM will introduce new capabilities to help organizations better understand the threat landscape.

IBM Advanced Cyberthreat Intelligence Service will provide customers with insight into the threat landscape, targeted attacks and attacker tools, tactics and practices, incorporating IBM’s own research with that of strategic partners specializing in threat visibility.

picture source: flickr

[email protected]