Copy the code below and paste it in place of the code in the stylesheet in order to make these changes affect all your pages.

{% color "secondary" color="#E98B25", export_to_template_context=True %} /* change your site's secondary color here */

{% color "primary" color="#3D3477", export_to_template_context=True %} /* change your site's primary color here */

{% set topHeaderColor = "" %} /* This color is solely used on the top bar of the website. */

{% set baseFontFamily = "Open Sans" %} /* Add the font family you wish to use. You may need to import it above. */

{% set headerFontFamily = "Open Sans" %} /* This affects only headers on the site. Add the font family you wish to use. You may need to import it above. */

{% set textColor = "#565656" %} /* This sets the universal color of dark text on the site */

{% set boxContainerWidth = "1100px" %} /* 'none' makes your site full width. Match the 'pageCenter' value to make it boxed. */

{% set pageCenter = "1100px" %} /* This sets the width of the website */

{% set headerType = "fixed" %} /* To make this a fixed header, change the value to "fixed" - otherwise, set it to "static" */

{% set lightGreyColor = "#f7f7f7" %} /* This affects all grey background sections */

{% set baseFontWeight = "normal" %} /* More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set headerFontWeight = "normal" %} /* For Headers; More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set buttonRadius = '40px' %} /* "0" for square edges, "10px" for rounded edges, "40px" for pill shape; This will change all buttons */

After you have updated your stylesheet, make sure you turn this module off

Are your security operations capabilities overloaded?

The health of your IT environment can be weakened when disconnected, single-purpose solutions make it difficult to monitor the whole network.  Adopting a fully integrated approach allows all components to work together to improve their effectiveness.

Watch this video
next-steps-response-icon-bl-or.png

Are you safe from ransomware attacks?

Protect your organisation’s data from Petya variants, WannaCry or other ransomware-like threats that can hold it hostage
next-steps-identify-icon-bl-or.png

Cost of data breaches in ANZ

The costs and consequences of data breaches continues to grow in our region – Are you prepared?
solutions-analytics-icon.png

Today's attacks require strategic security intelligence

As attacks have become more sophisticated and continue to evolve, static technologies can't keep up. It takes intelligence and precision to stop cyber-attacks and unknown threats.

SECURING YOUR ORGANISATION

Savvy companies know that in today’s data-driven, highly distributed world, there are serious threats that must be addressed head-on. IBM® Security delivers an integrated system of analytics, real-time defences and proven experts, so you can make strategic decisions about how to safeguard your organisation.

 

Assess your security pain points

siem_thumb.png
IBM® QRadar 
Adopting a fully integrated approach allows all components to work together to improve their effectiveness.
 
siem-cloud_thumb2.png
IBM QRadar
incident_thumb.png
IBM® QRadar® SIEM 
Detects anomalies, uncovers advanced threats and removes false positives.
 
QNI-thumb.jpg

Orchestrate Your Defenses: On Demand Series 

IBM Security Operations and Response can help in this On-Demand Webcast series

Gartner Magic Quadrant for SIEM

Learn about IBM QRadar market leadership in security intelligenceand analytics
 

IT Risk and Protection

Discover what’s impacting today’s CISO

 

Take the path to security protection

As business transactions are pushed outside company walls, the traditional security perimeter around the data center is dissolving. Security risk management in a cloud or mobile environment is now a primary concern of CISOs.
IBM® Security can help you achieve security threat management with risk-based intelligence, integration and the industry’s largest SaaS portfolio.

Of all security attacks in 2015 were by insiders

2016 Cyber Security Intellligence Index

Of application security professionals say their practices are fragmented

Ponemon Institute Report

Of CEOs are reluctant to share incident information externally

Securing the C-Suite, IBM Report, Feb. 2016

More security incidents in 2015 than discovered in 2014

IBMX-Force Research 2016 Cyber Security Intelligence Index

What's your greatest security risk? Assess your IT risk and protection readiness

Access Assessment