Samsung, IBM Team Up to Boost Mobile Security in Business Sector – The Fast Mode

1 minute, 23 seconds Read

At the RSA Conference in San Francisco, Samsung announced the next step in the evolution of its plan to re-imagine mobile device security for business customers in collaboration with IBM. 

Samsung will offer this solution, to be available later this year, which integrates on-device intelligence from Samsung Knox mobile device security platform into IBM Security® QRadar® Suite, a threat detection and response solution. The new integration is designed to provide security analysts and practitioners with added visibility via a ‘single pane of glass’ experience into their organizations’ mobile devices and accelerate their ability to respond to threats across the full incident lifecycle – transforming business operations while helping to ensure users’ privacy remains protected. Additionally, Samsung’s unique approach helps preserve privacy while providing the necessary visibility to the Security Operations Center (SOC) for enhanced threat intelligence and management.

Increasingly organizations’ IT and security teams are seeking to adopt a Zero Trust framework. Samsung Knox provides SOCs with differentiated capabilities to ensure centralized visibility into mobile devices and their vulnerabilities and access to on-device threat detection to alert security analysts early in the attack chain. Samsung Knox can also enable automated response and remediation actions such as patching on Knox devices by integrating with SOC tools and workflows.

Security Operations Center (SOC) environments that leverage IBM QRadar Suite will have access to on-device threat intelligence from Samsung Galaxy mobile devices and centralized visibility into vulnerabilities. Siloed data from devices has made threat detection and response challenging for SOC teams. This partnership plans to enable the industry-leading integration of a mobile device provider into the SOC, enhancing organizations’ capabilities to provide proactive risk mitigation through a more cohesive security approach.

This post was originally published on 3rd party site mentioned in the title of this site

Similar Posts