ARMONK, N.Y., Oct. 18, 2012 /PRNewswire/ -- In a move
designed to reduce the biggest security inhibitors that
organizations face in implementing cloud, mobile and big data
initiatives, IBM (NYSE: IBM) today announced a broad set of
security software to help holistically secure data and
identities.
(Logo: http://photos.prnewswire.com/prnh/20090416/IBMLOGO
)
IBM's new software capabilities help clients better maintain
security control over mobile devices, mitigate internal and
external threats, reduce security risks in cloud environments,
extend database security to gain real-time insights into big data
environments such as Hadoop, and automate compliance and data
security management. Along with IBM Security Services and IBM's
world-class research capabilities, this set of scalable
capabilities supports a holistic, proactive approach to security
threats spanning people, data, applications and infrastructure.
"A major shift is taking place in how organizations protect
data," said Brendan Hannigan,
General Manager, IBM Security Systems. "Today, data resides
everywhere—mobile devices, in the cloud, on social media platforms.
This is creating massive amounts of data, forcing organizations to
move beyond a traditional siloed perimeter to a multi-perimeter
approach in which security intelligence is applied closer to the
target."
According to the 2012 IBM Global Reputational Risk and IT
Survey, global senior executives identified IT risks -- ranging
from data thieves to the use of emerging technologies including
cloud, mobile and social media -- as a major cause of concern.
Today, in the biggest announcement since the launch of IBM's new
Security Systems division earlier this year, IBM is unveiling ten
new products and enhancements to help organizations deliver real
time security for big data, mobile and cloud computing.
Real Time Security for Big Data Environments
As information grows in volume, variety, and velocity,
organizations are looking beyond relational data sources to find
insights, to make businesses more agile and to answer questions
that were previously considered beyond their reach. Today, state of
the art technologies including Hadoop based environments have
opened the door to a world of possibilities. At the same
time, as organizations ingest more data, they face significant
risks across a complex threat landscape and they are subject to a
growing number of compliance regulations. Traditional approaches to
data protection are often unable to meet these requirements.
With today's announcement, IBM is among the first to offer data
security solutions for Hadoop and other big data environments.
Specifically, Guardium now provides real time monitoring and
automated compliance reporting for Hadoop based systems such as
InfoSphere BigInsights and Cloudera. With federated controls across
data sources, clients can understand data and application access
patterns help prevent data leakage and enforce data change
controls. Built-in audit reporting can be used to generate
compliance reports on a scheduled basis, distribute them to
oversight teams for electronic sign-offs and escalation, and
document the results of remediation activities. In addition,
IBM offers data masking to de-identify sensitive data as it moves
into and out of big data systems.
In addition to securing data in multi-perimeter environments IBM
is announcing improvements to data encryption management that
allows organizations to automate key recovery and support the
latest version of the Key Management Interoperability Protocol
(KMIP) standard.
To learn more about the data security portfolio visit
http://www.ibm.com/security/data/products.html
Highlighted data security solutions:
- NEW: IBM InfoSphere Guardium for Hadoop
- ENHANCED: IBM InfoSphere Optim Data Privacy
- ENHANCED: IBM Security Key Lifecycle Manager
Mobile Security Framework Improves Access and Threat
Protection
Today IBM is announcing risk-based authentication control for
mobile users, integration of access management into mobile
application development and deployment as well as enhanced mobile
device control. IBM is also announcing a comprehensive Mobile
Security Framework to help organizations develop an adaptable
security posture to protect data on the device, at the access
gateway and on the applications.
With the launch of its new access management capabilities, IBM
now offers greater context aware access control for mobile users,
improved mobile threat protection, and enhanced mobile device
control. With a broad portfolio of solutions for mobile security
and management – including solutions for mobile application
security and mobile security intelligence, IBM can help protect
against security breaches, whether malicious or unintentional
through risky employee access of data and applications - anytime,
anywhere from any device.
Furthermore, with the simplicity of these mobile devices making
them pervasive and seamlessly integrated into consumers' everyday
lives, new threats are evolving based on popular mobile-based
activities such as retail purchases, managing bank accounts and
updating social networks. The ubiquitous nature of mobility across
both businesses and consumers requires that securing the smartphone
encompass the device, the network and the applications on the
device so that employees, consumers and even partners know their
transactions are being executed across a secure environment. To
learn more about specific mobile security product attributes,
please visit:
http://www.ibm.com/security/mobile/products.html
Highlighted mobile security solutions:
- NEW: IBM Security Access Manager for Cloud and Mobile
- ENHANCED: IBM Endpoint Manager for Mobile Devices
IBM Transforms Cloud Security from an Inhibitor to an
Enabler
While the cloud can increase productivity with anywhere, anytime
information access, it can also introduce additional challenges for
enterprise security. To realize the value that cloud computing
presents, organizations are looking for integrated security
solutions to help address the risks.
IBM today is announcing security portfolio enhancements designed
to address these new challenges, providing improved visibility and
increased levels of automation and patch management to help
demonstrate compliance, prevent unauthorized access and defend
against the latest threats using advanced security
intelligence.
With IBM's new SmartCloud™ for Patch Management solution,
patches are managed automatically regardless of location and
remediation cycles are reduced from weeks to hours thereby reducing
security risks. Additionally, IBM is announcing enhancements
to its QRadar Security Intelligence Platform that provides a
unified architecture for collecting, storing, analyzing and
querying log, threat, vulnerability and security related data from
distributed locations, using the cloud to obtain greater insight
into enterprise-wide activity and enable better-informed business
decisions.
The new IBM Security Privileged Identity Manager is designed to
proactively address the growing insider threat concerns and help
demonstrate compliance across the organization. IBM Security Access
Manager for Cloud and Mobile which provides enhanced federated
single sign-on to cloud applications is now available with improved
out-of-the-box integration with commonly adopted SaaS applications
and services. To learn more about specific cloud security product
attributes, please visit
http://www.ibm.com/security/cloud/products.html
Working with IBM and SecurIT, a 'Ready for IBM Security
Intelligence' Business Partner, the Flemish government built a
cloud based platform that incorporated IBM Security identity and
access management software combined with SecurIT TrustBuilder®
software to help protect assets from unauthorized access. The
Flemish government, offers it's six million inhabitants digital
access to services across more than 100 government websites, but
previously had little flexibility to introduce new internal and
external applications, or manage how citizens were able to prove
their identities. For example, a person may have only one identity,
but multiple titles or 'roles,' such as "citizen", "public servant"
or "notary".
"The new infrastructure provides our citizens and employees with
simple, secure and fast digital access to all available government
resources," said Wim Martens,
Strategy Manager, Flemish Government. "This new platform provides
our citizens with seamless access, while giving us context-aware
digital identities using multiple authentication means for each
individual in accordance with centrally defined security
policies."
Molson Coors Brewing Company (MCBC), the second largest beer
brewer in the United States with
more than 65 global brands, needed to keep up with compliance
issues around identity and access management. The company wanted to
provide employees with a single identity for seamless access to web
resources, while implementing a new identity management strategy
based on three pillars: security, audit and service. The company
turned to a cloud security solution offered by Lighthouse Security
Group, a 'Ready for IBM Security Intelligence' Business
Partner, that utilizes IBM software at its core, due to the
quick start-up time, large estimated savings and need for
specialized engineering skills that IBM and Lighthouse were able to
provide.
"We needed a solution to improve the visibility and transparency
of security and audit related data," said Kevin Schmitt, Chief Information Security
Officer, Molson Coors Brewing Company. "This helped us realize a
marked improvement in the company's security maturity score while
saving the organization considerable time and money over an
equivalent on-premise solution."
Highlighted cloud security solutions:
- NEW: IBM SmartCloud for Patch Management
- NEW: IBM Security Access Manager for Cloud and Mobile
- NEW: IBM Security Privileged Identity Manager
- ENHANCED: QRadar SIEM and QRadar Log Manager
In addition, IBM is announcing mainframe security capabilities
that enhance enterprise-wide security intelligence based on QRadar
security solution integration that provides real time alerts and
audit reporting. The mainframe offers Common Criteria Evaluation
Assurance Level 5+ (EAL 5+) certification for logical partitions,
providing a platform for consolidating systems, helping protect
private clouds, and helping secure virtualized environment.
New IBM Security zSecure improvements help to reduce administration
overhead, automate compliance reporting, enforce security policy,
and pro-actively detect threats.
Highlighted zSecure security solutions:
- ENHANCED: IBM Security zSecure
Through IBM Global Financing, credit-qualified clients can take
advantage of 0% interest for 12 months on qualifying IBM Security
products and solutions.
Click here to view an IBM digital video, "Security Without
Borders."
About IBM Security
With more than 40 years of security development and innovation,
IBM has breadth and depth in security research, products, services
and consulting. IBM X-Force is a world-renowned team that
researches and evaluates the latest security threats and trends.
This team analyzes and maintains one of the world's most
comprehensive vulnerability databases and develops countermeasure
technologies for IBM's security offerings to help protect
organizations ahead of the threat. IBM has 10 worldwide research
centers innovating security technology and nine security operations
centers around the world to help global clients maintain an
appropriate security posture. IBM Managed Security Services
delivers the expertise, tools and infrastructure to help clients
secure their information assets against attacks, often at a
fraction of the cost of in-house security resources. The Institute
for Advanced Security is IBM's global initiative to help
organizations better understand and respond to the security threats
to their organization. Visit the Institute community at
www.instituteforadvancedsecurity.com.
For more information on IBM Security Solutions, please visit:
www.ibm.com/security
IBM Global Financing offerings are provided through IBM Credit
LLC in the United States and other
IBM subsidiaries and divisions worldwide to qualified commercial
and government clients. Rates and availability are based on a
client's credit rating, financing terms, offering type, equipment
and product type and options, and may vary by country.
Interest continues to accrue on deferred payments.
Non-hardware items must be one-time, non-recurring charges and are
financed by means of loans. Other restrictions may apply. Rates and
offerings are subject to change, extension or withdrawal without
notice and may not be available in all countries.
Contact(s) Information:
Tod Freeman
IBM Media Relations
415-320-5893
tefreema@us.ibm.com
John Connolly
IBM Media Relations
781-636-8512
jconnol@us.ibm.com
Darcy Hansen
IBM Media Relations
415-806-4139
hansenda@us.ibm.com
SOURCE IBM