Welcome!

Artificial Intelligence Authors: Pat Romanski, Yeshim Deniz, Liz McMillan, Elizabeth White, Zakia Bouachraoui

News Feed Item

IBM Extends Security Reach To Protect Critical Infrastructure

Unveils New Research Initiatives, Partnerships, Products and Services

SAN FRANCISCO, March 2 /PRNewswire-FirstCall/ -- Today at the RSA Conference, IBM (NYSE: IBM) detailed new IBM Security Solutions, research initiatives, partnerships and client results aimed at meeting the rising demand by businesses and governments worldwide to secure digital and physical infrastructures.

(Logo: http://www.newscom.com/cgi-bin/prnh/20090416/IBMLOGO )

Critical infrastructures operated by government, energy, health, banking, transportation and other industries are rapidly transforming into more intelligent systems. As a result, their failure can have catastrophic consequences for our society, economy and environment. Recent studies from the IBM X-Force research and development team indicate that the threat landscape continues to evolve rapidly and modern day attackers take ever more sophisticated approaches in their assault on business and governments. Today, IBM, public and private sector partners are intensifying efforts to combat these threats and safeguard citizens.

"Businesses and governments around the world are making bold investments in new technologies and processes that make them more efficient, agile and competitive," said Al Zollar, general manager, Tivoli Software, IBM. "These investments enable new possibilities, but they also create new complexities and beget new risks to critical infrastructure, privacy and identity. With today's announcements, we demonstrate our ability to partner and innovate to overcome existing and emerging threats."

Security, by Design

New computing paradigms and business models fundamentally require businesses to rethink how they deal with compliance, risk management and data protection. Central to IBM's approach to addressing clients' security challenges is a shift in focus from securing assets to securing critical services.

With integrated service management - tools that provide can provide a "command center" view into a client's operations and potential areas of risk, IBM can help its clients design security into the fabric of the services they deliver, making security intrinsic to their business processes, product development and daily operations.

Today's announcements, based on IBM's experience with hundreds of global clients and businesses, are designed to further expand on the vision that security, by design, is an enabler of innovative change. IBM is introducing new software, systems and services to help global organizations securely adopt new forms of technology like cloud computing and new business models like telework, while addressing emerging compliance constructs.

New IBM Security Solutions include:

  • IBM Secure Web Gateway Service 2.0 - IBM X-Force research indicates a dramatic rise in the number and complexity of Web application attacks. This new service enables greater protection against Web-based threats and enforcement of corporate IT policies while lowering overall management costs.
  • IBM Managed Firewall Service and IBM Unified Threat Management Service - this new bundled offering allows clients to use select Check Point firewall and unified threat management devices while receiving IBM Managed Security Services for those devices for a monthly fee. This provides clients increased levels of protection without the burden of upfront capital expenditures for the devices.
  • IBM Security Information and Event Manager 2.0 - this updated software helps to reduce costs by automating enterprise log management and central management, reduce insider threats and protect integrity by monitoring and auditing privileged user activities, and facilitate compliance efforts and streamline management with compliance management modules.
  • IBM Security Content Analysis Software Development Kit (SDK) - rapid growth of the Internet and the constant onslaught of spam requires advanced filtering technology that is expensive to develop and maintain. This new SDK provides developers with up-to-date filter database and accurate analysis -- along with an easy-to-implement application programming interface (API).
  • IBM AppScan Source Edition - as organizations continue to develop and design products and services that are increasingly interconnected, they are also placing increased emphasis on securing the software that powers these products and services. This new edition of IBM Rational AppScan Source Edition AppScan can scan software source code and identify potential security and compliance vulnerabilities during the earliest stages of software development, when they are less expensive to correct.
  • IBM Lotus Protector for Mail Encryption - for secure collaboration and communication, IBM is announcing a new software product called IBM Lotus Protector for Mail Encryption. Available in April, it extends IBM's flagship messaging software, offering Lotus Notes' native e-mail encryption feature to include any address accessible on the Internet -- irrespective of e-mail system or client used by the recipient. IBM Protector for Mail Encryption addresses the Internet encryption challenge, in a simple and integrated way, unlike third-party "bolt-on" products that have historically been complex and expensive to deploy.
  • IBM Security Privileged Identity Management and Compliance Solution - rising trend from attackers to use privileged user identities to gain access to core systems, increasing compliance mandates and high administrative costs all add to the difficulty of managing users and identities and blocking against internal and external threats. This combined solution provides threat prevention, identity management and meeting compliance needs through file integrity monitoring, separation of duties, role hierarchy, and intrusion prevention.
  • IBM z/OS V1.12 - With the latest release of z/OS, IBM helps clients promote improved operations, availability, manageability, and security through self-learning, self-managing, and self-optimization capabilities. z/OS security functions, such as data encryption, encryption key management, digital certificates, password synchronization, and centralized authentication and auditing, can be deployed as part of enterprise-wide security solutions and can help mitigate risk and reduce compliance costs.

Institute for Advanced Security

In February 2010, IBM, the Security & Defence Agenda (SDA) and a coalition of international think tanks hosted almost 4,000 global experts from government, industry, academia, non-government organizations (NGOs) in a virtual dialogue on the world's greatest security challenges. Cybersecurity was identified as a significant potential threat to international peace and stability, and a number of experts called for the creation of a cybersecurity agency to increase public and private sector collaboration and educate global leaders on cyber issues.

In order to address such concerns, the company is launching the IBM Institute for Advanced Security to help clients, academics, partners and other businesses more easily understand, address and mitigate the issues associated with securing cyberspace. The Institute will collaborate with public and private sector officials in Washington, D.C., and provide access to a wide range of resources to help the government more efficiently and effectively secure and protect critical information threatened by increasingly malicious and costly cyber threats.

As part of this effort, IBM is bringing to bear expertise from its Software, Services, Systems and Research arms to help governments and businesses around the world safeguard themselves from new and existing threats. For instance, the U.S. Air Force recently selected IBM to design and demonstrate a highly secure cloud computing infrastructure that can support defense and intelligence networks.

The IBM Institute for Advanced Security will provide a collaborative setting for public and private sector officials to tap IBM's vast security expertise so they can more efficiently and effectively secure and protect critical systems and information threatened by increasingly malicious and costly cyber threats. IBM's approach will help public and private organizations avoid the trend of adding security on after the fact by providing them the education, expertise and resources to design security into the foundation of their infrastructures.

"There is no lack of security products and services available today, but adding security after a system is developed or implemented seldom works. Moreover, today's rapidly-evolving threats make such "bolt-on" approaches even less effective at a time when clients are wary of not realizing a return from their security investments," said Charles Palmer, director of the Institute for Advanced Security and chief technologist of Cybersecurity and Privacy for IBM Research. "IBM will engage with government clients and other constituents to help them comprehensively understand how to develop and integrate effective security protections into the fabric of their critical systems and services."

A podcast with Al Zollar on the Decade of Smart Security - the focus of his RSA keynote presentation - is available at: https://365.rsaconference.com/blogs/podcast-series-rsa-conference-2010/tags/key_305

Further information about the software, services and initiatives announced today is available at http://www-03.ibm.com/security/.


    Contact:
    Jen Knecht
    917-472-3607
    [email protected]


SOURCE IBM

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
BMC has unmatched experience in IT management, supporting 92 of the Forbes Global 100, and earning recognition as an ITSM Gartner Magic Quadrant Leader for five years running. Our solutions offer speed, agility, and efficiency to tackle business challenges in the areas of service management, automation, operations, and the mainframe.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
After years of investments and acquisitions, CloudBlue was created with the goal of building the world's only hyperscale digital platform with an increasingly infinite ecosystem and proven go-to-market services. The result? An unmatched platform that helps customers streamline cloud operations, save time and money, and revolutionize their businesses overnight. Today, the platform operates in more than 45 countries and powers more than 200 of the world's largest cloud marketplaces, managing mo...
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected pat...
Apptio fuels digital business transformation. Technology leaders use Apptio's machine learning to analyze and plan their technology spend so they can invest in products that increase the speed of business and deliver innovation. With Apptio, they translate raw costs, utilization, and billing data into business-centric views that help their organization optimize spending, plan strategically, and drive digital strategy that funds growth of the business. Technology leaders can gather instant recomm...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
CloudEXPO has been the M&A capital for Cloud companies for more than a decade with memorable acquisition news stories which came out of CloudEXPO expo floor. DevOpsSUMMIT New York faculty member Greg Bledsoe shared his views on IBM's Red Hat acquisition live from NASDAQ floor. Acquisition news was announced during CloudEXPO New York which took place November 12-13, 2019 in New York City.
In an age of borderless networks, security for the cloud and security for the corporate network can no longer be separated. Security teams are now presented with the challenge of monitoring and controlling access to these cloud environments, at the same time that developers quickly spin up new cloud instances and executives push forwards new initiatives. The vulnerabilities created by migration to the cloud, such as misconfigurations and compromised credentials, require that security teams t...
The graph represents a network of 1,329 Twitter users whose recent tweets contained "#DevOps", or who were replied to or mentioned in those tweets, taken from a data set limited to a maximum of 18,000 tweets. The network was obtained from Twitter on Thursday, 10 January 2019 at 23:50 UTC. The tweets in the network were tweeted over the 7-hour, 6-minute period from Thursday, 10 January 2019 at 16:29 UTC to Thursday, 10 January 2019 at 23:36 UTC. Additional tweets that were mentioned in this...