Learn everything you need to know about XGS

XGS is a next-generation Intrusion Prevention System (IPS) that provides
intrusion prevention and security awareness and control of applications,
content, and users. This document details how to configure and showcase the
features of the IBM Security Network Protection (XGS) system for a deployment
or a Proof of Concept (PoC).

Related:

Build a cloud-ready temperature sensor with the Arduino Uno and the IBM Watson IoT Platform, Part 2: Write the sketch and connect to the IBM Watson IoT Platform

Learn about MQTT (formerly Message Queueing Telemetry Transport), the
protocol for the Internet of Things (IoT), and how you can implement MQTT on
the Arduino. Explore the tools and techniques for testing and debugging
problems with MQTT locally, and write an Arduino sketch that connects to the
IBM Watson IoT Platform for graphing custom data.

Related:

InfoSphere Guardium data security and protection for MongoDB, Part 2: Configuration and policies

This article series describes how to monitor and protect MongoDB data using IBM InfoSphere Guardium, including the configuration of the solution, sample monitoring use cases, and
additional capabilities such as quick search of audit data and building a compliance workflow using an audit process. Part 2 describes how to configure InfoSphere Guardium to collect
MongoDB traffic and describes how to create security policy rules for a variety of typical data protection use cases, such as alerting on excessive failed logins, monitoring privileged
users, and alerting on unauthorized access to sensitive data. Many organizations are just getting started with MongoDB, and now is the time to build security into the environment to save
time, prevent breaches, and avoid compliance violations.

Related:

IBM Security AppScan Source Quick Process Guide

Discover an easy-to-understand process you can use to
produce comprehensive, dependable, and actionable security findings using
IBM
Security AppScan Source. The process described in this tutorial helps
security auditors and developers take their AppScan Source scan results to the
next level, by customizing AppScan Source to their organization’s application
technologies and enforcing their application security policies, using tools
already available in AppScan Source.

Related:

Create a highly available authentication system with IBM Security Directory Server

This white paper explains how to use IBM
Security Directory Server (formerly known as IBM Tivoli Directory
Server) with Heartbeat to create a highly available authentication system
with a fail-over mechanism. High availability is critical for enterprise
authentication services because consolidating any service on a particular server
is not reliable. Depending on a single server eventually creates a
single point of failure, which can break the entire organization’s
authentication system.

Related: