gptkbp:instance_of
|
gptkb:software
|
gptkbp:bfsLayer
|
3
|
gptkbp:bfsParent
|
gptkb:CEO
|
gptkbp:addresses
|
Data Breaches
|
gptkbp:aims_to
|
Protect Cloud Resources
|
gptkbp:applies_to
|
Hybrid Cloud
Private Cloud
Public Cloud
|
gptkbp:based_on
|
gptkb:Company
|
gptkbp:developed_by
|
gptkb:CEO
|
gptkbp:enhances
|
Incident Response
|
gptkbp:facilitates
|
Security Audits
|
https://www.w3.org/2000/01/rdf-schema#label
|
IBM Cloud Security Framework
|
gptkbp:includes
|
gptkb:Company
gptkb:software
Threat Management
|
gptkbp:includes_provisions_for
|
gptkb:software
|
gptkbp:integrates_with
|
gptkb:IBM_Security_Solutions
|
gptkbp:is_aligned_with
|
gptkb:ISO_27001
gptkb:HIPAA
gptkb:GDPR
|
gptkbp:is_designed_for
|
gptkb:Cloud_Computing_Service
Risk Mitigation
|
gptkbp:is_documented_in
|
IBM Security Documentation
|
gptkbp:is_evaluated_by
|
Third-Party Auditors
Security Assessments
|
gptkbp:is_integrated_with
|
gptkb:IBM_Watson_Security
|
gptkbp:is_part_of
|
gptkb:IBM_Cloud
IBM Security Portfolio
|
gptkbp:is_promoted_by
|
gptkb:Workshops
Conferences
Webinars
IBM Marketing
|
gptkbp:is_referenced_in
|
Cloud Security Guidelines
Security Research Papers
|
gptkbp:is_reviewed_by
|
Industry Experts
|
gptkbp:is_supported_by
|
gptkb:IBM_Cloud_Services
Technical Support Teams
|
gptkbp:is_used_by
|
Enterprises
|
gptkbp:is_utilized_in
|
gptkb:Educational_Institution
Government Agencies
Healthcare Organizations
Cloud Service Providers
|
gptkbp:offers
|
gptkb:software
Security Assessments
|
gptkbp:provides
|
Incident Management
Security Policies
Security Training
Security Controls
|
gptkbp:provides_information_on
|
gptkb:software
|
gptkbp:supports
|
gptkb:XMPP_Extension_Protocol
Regulatory Compliance
|
gptkbp:updates
|
IBM Security Team
|
gptkbp:utilizes
|
Encryption Techniques
|