Meet Metanet Tplatform Experts
Contact usWe present the best solution with our allied global vendors.
Hybrid Services
Professional Service
Consulting Migration Managed ServicesIT Infra
Public Cloud Private Cloud Infrastructure Transformation Infra Management Security Dynamic WorkplaceData & AI
Heterogeneous DB Migration Big Data & AI E2E Data Management SolutionsPlatform
Microsoft
Azure O365/M365Red Hat
Red Hat OpenStack Red Hat OpenShiftVMware
VMware Cloud Foundation Vmware HCIIBM
Private Cloud Server & StorageComputing/NW
SDDCSolution
Resource
About us
IBM Open technologies, such as Linux and Kubernetes, offer the flexibility to quickly innovate and respond to changing market and client demands. IBM Security works with Red Hat® solutions, including Red Hat Enterprise Linux and Red Hat OpenShift Container Platform, helping you detect threats, protect data and safeguard privacy on open platforms — so you can propel your business forward with speed and control.
Data is normalized, correlations between data are clarified, and security attacks that need an investigation are identified, using the IBM Sense Analytics engine after integrating log events and network flow data from thousands of devices, endpoints, and applications distributed across the network.
A world-first security intelligence platform integrating cognitive security
More than 300 types of basic parsing modules that collect real-time information on traffic logs
Providing various filters and indexes for high-speed search, such as quick search, filter search, and advanced search
Detecting fraud, insider leakage, and advanced threat, and implementing data protection policies
Normalizing events and analyzing correlations immediately using IBM X-Force Threat Intelligence
Applicable to both on-premise and cloud environment
NBAD function to detect abnormal behavior of the user and IT anomaly through machine learning
Providing a single unified view of the log, network flow, vulnerability, asset, and threat intelligence
IBM i2 discovers hidden networks/organizations and relationships, as well as meaningful patterns by applying various visualization analysis on the relationship between data and integrating and analyzing various types of data such as logs, e-mails, and call records.
Collecting data from various sources, and saving and virtualizing the data in an analyzable form
Providing security intelligence for cyber analytics collaboration
Expressing a relational diagram with a focus on one reference data (account, phone number, address, person)
Analyzing timeline by tracing data movement path and transaction by time zone
Quantifying the analysis result such as correlation and proximity through SNA (Social Network Analysis)
IBM Resilient IRP (Incident Response Platform) is the leading platform for orchestrating and automating incident response processes. IBM Resilient IRP quickly and easily integrates with your organization’s existing security and IT investments. It makes security alerts instantly actionable, provides valuable intelligence and incident context, and enables adaptive response to complex cyber threats.
Managing response proactively with security modules including Dynamic Playbook
Automating an easy-to respond workflow with action modules, which include more than 100 security tools
Complying with laws related to personal information with privacy modules containing evaluation tools and simulation for GDPR
Checking artifacts related to incidents and providing insights into incidents through incident virtualization
Responding to incidents with a visual workflow that does not require any special programming or coding skills
IBM Security Secret Server is a solution that searches, controls, manages, and protects privileged accounts in the organization. This solution protects major accounts safe from hackers and internal threats using Secure Vault, automates password reset, removal, and monitoring, and enables management through policy-based control.
All major unknown accounts can be searched
Saving sensitive accounts in Secret Server and automatic change of the password periodically when used
Recording and monitoring major session activities for audits and forensics
Supporting the implementation of the minimum rights policy and the prevention of major account abuse at the endpoint
Setting up a user-defined workflow for access rights
Supporting reports for certifying enterprise compliance
Managing internal servers, virtual machines, cloud servers, SSH, and RDP without an agent
IBM Trusteer is a fraud detection solution that analyzes anomalies through the user's mouse and keyboard usage patterns and applies proprietary machine learning technology to analyze new threats.
Assessing risks based on behavior analysis, access device, session, and network attributes
Preventing real-time pharming, memory hacking, forgery and alteration, and overlay attack on mobile devices and PC
Applying differential additional authentication to low-risk and high-risk users
Supporting intelligence such as machine learning, new X-Force patterns, and global real-time threat data
A scalable cloud platform that supports flexible integration and fast deployment
Protecting more than 500 customers and 40 million endpoints throughout the world
Processing 40 billion application connections and 1 billion user sessions every month
With Watson™, MaaS360 is the only platform that delivers an AI approach to unified endpoint management (UEM) to enable endpoints (e.g., smartphones, tablets, laptops, desktops, wearables, and the Internet of Things (IoT)), and end-users, and everything in between — including apps, content, and data. MaaS360 is an open platform that enables flexible integration and quick deployment.
Managing device registration, automation, and disposal, and applying security policies automatically
Separating the personal data area and workspace when accessing corporate resources
Supporting contents deployment and data leakage prevention (SharePoint, Box, Google Drive, OneDrive)
Managing gateways to support Internet access
Detecting mobile malicious code and damaged device, and detecting and correcting jailbreak and rooting forcibly
GDRP compliance for endpoints and mobile devices
IBM Guardium Data Protection is a monitoring and access control solution for the use of data, such as the database, big data, and file (unstructured data). This solution can manage information risks by analyzing the abnormal behavior of data access based on machine learning.
Databases, big data, and files (unstructured data) can be managed and controlled centrally, based on the same policy template, using one solution.
Minimizing system load without system delay by applying patented S-TAP technology and file unit encryption technology
Reducing time and costs by assigning minimum development personnel without modifying the existing application to a large extent
Omni-directional database monitoring and block in real-time, without a bypass.
Meet Metanet Tplatform Experts
Contact us