{"id":1500,"date":"2006-07-14T00:00:00","date_gmt":"2006-07-14T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/07\/14\/ibm-releases-security-tool-to-fight-off-dos-attacks-worms\/"},"modified":"2021-12-30T11:39:29","modified_gmt":"2021-12-30T11:39:29","slug":"ibm-releases-security-tool-to-fight-off-dos-attacks-worms","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/07\/14\/ibm-releases-security-tool-to-fight-off-dos-attacks-worms\/","title":{"rendered":"IBM Releases Security Tool to Fight Off DOS Attacks, Worms"},"content":{"rendered":"<p>IBM has launched new software that will allow IT departments, telecom service providers and IT outsourcing companies to respond proactively to security threats like denial of service attacks and worms as they happen.<br \/>\nIBM Tivoli Security Operations Manager, announced yesterday, automates security data collection and analysis, presenting incident warnings in a real-time dashboard.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By integrating network, security, identity and systems management in a single, centralized interface, it enables organizations to respond immediately to security threats originating both outside and within the network.<\/p>\n<p>&#8220;Current compliance initiatives, such as Sarbanes-Oxley, have moved security from being an esoteric practice to a boardroom-level initiative,&#8221; IBM Tivoli general manager for network management technology Lloyd Carney said in a statement.<\/p>\n<p>http:\/\/www.darkreading.com\/document.asp?doc_id=99138&#038;WT.svl=cmpnews2_1<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1500","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1500","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1500"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1500\/revisions"}],"predecessor-version":[{"id":3987,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1500\/revisions\/3987"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1500"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1500"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1500"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}