Sunday 3, January 2016

Dubai – MENA Herald: Bit9 + Carbon Black, a leader in Next-Generation Endpoint Security (NGES), has launched the Carbon Black App for IBM QRadar, which provides a turnkey solution for integrating the Carbon Black endpoint threat detection and response solution with IBM security intelligence technology. The new application will provide organizations with a single pane of glass to more quickly detect and respond to security alerts.

The new application is freely available to the security community through IBM Security App Exchange, a marketplace where developers across the industry can share applications based on IBM Security technologies. As threats are evolving faster than ever, collaborative development among the security community will help organizations adapt quickly and speed innovation in the fight against cybercrime.

The Carbon Black App for IBM QRadar leverages Carbon Black, an industry-leading endpoint threat detection and response solution, and IBM QRadar, the company’s security intelligence platform that analyzes data across an organization’s IT infrastructure in real time to identify potential security threats. The app offers organizations a single management console for security event management and incident response, enabling them to quickly and easily respond to endpoint security alerts. Once installed, the App provides administrators with direct access to many of Carbon Black’s powerful incident response features, such as process searches, endpoint isolation and system status, from within the QRadar administrator console.

“We are pleased to join the IBM Security App Exchange, which reflects our commitment to open, integrated security,” said Brian Hazard, vice president of technical alliances for Bit9 + Carbon Black. “The Carbon Black App for IBM QRadar makes it easy for organizations to leverage Carbon Black’s powerful capabilities from inside the IBM QRadar console to detect and respond to threats and attacks against the biggest target in any organization, and the place where their most important information resides: their endpoints.”