Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Investigating Threats with Watson for Cyber Security

IBM Watson for Cyber Security connects obscure data points humans can’t see on their own, helping analysts uncover hidden threats and automate insights, for faster response time and improved decision making.

Unlock a new partnership between humans and technology with a trusted advisor that augments analyst expertise, and becomes more knowledgeable over time.

To learn more about Watson for Cyber Security and QRadar Advisor with Watson, visit http://ibm.co/2kGtZyx.

  • Be the first to comment

Investigating Threats with Watson for Cyber Security

  1. 1. © Copyright IBM Corporation 2017. IBM, the IBM logo, ibm.com and IBM Watson are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at www.ibm.com/legal/copytrade. Investigating threats with Watson for Cyber Security IBM® Watson® for Cyber Security connects obscure data points humans can’t see on their own, helping analysts uncover hidden threats and automate insights, for faster response time and improved decision making. Human-generated security knowledge Sourced by IBM Security Threat databases Research reports Security textbooks Vulnerability disclosures Popular websites Blogs and social activity Other Watson for Cyber Security continually ingests security knowledge Enterprise security analytics Correlated enterprise data Security events User activity Configuration information Vulnerability results System and app logs Security policies Other Watson for Cyber Security Unlock a new partnership between humans and technology with a trusted advisor that augments analyst expertise, and becomes more knowledgeable over time. Learn more at ibm.com/security/cognitive. Intelligence Interprets unstructured data—created for humans by humans— and correlates it with structured data to uncover new insights. Speed Connects obscure data points that others miss to accurately identify threats. Accuracy Correctly identifies malicious activity with enriched threat investigation and real-time intelligence. The analyst’s challenge A typical day involves investigating 10 to 20 incidents. Errors such as false positives and false negatives are common. Investigating incidents takes time, giving attackers an advantage. A cognitive solution that learns about security from structured and unstructured information sources, and empowers security analysts with insights to respond to incidents with speed and accuracy like never before. The result

×