IBM Launches Series Of Security Enhancements For Mobility, Cloud, Big Data4:09 PM EST Thu. Oct. 18, 2012
IBM’s newly expanded security portfolio promises to close security gaps associated with mobile devices, strengthen the security footing of cloud environments and improve database security around big data environments. The rollout is based on 10 new products and enhancements.
At the mobility level, the Armonk, N.Y.-based company announced risk-based authentication and stronger device control that is intended to protect against both external and internal threats.
"Our customers want to extend their enterprise policies out to the mobile users, as well as to take some of the unique attributes of the end users and build a stronger security policy around them," said Steve Robinson, vice president of product management at IBM Security Systems. "We have also added a few more features for our endpoint management system, so they can check their inventory, see which devices are accessing the network, deploy patches and also push out a standard platform."
[Related: 7 Deadly Sins of Information Security]
These capabilities resonate with Eric Maass, CTO of Lighthouse Security Group, a Lincoln, R.I.-based security partner. "A large number of our clients are very concerned about people accessing resources over those devices," he said. "So this will provide access control around resources that are very important to our customer base."
IBM has also taken aim at security for cloud environments, given that security is widely viewed as one of the most prominent inhibitors to cloud adoption. The company has rolled out a new SmartCloud for Patch Management solution that automates patch deployment so that security can be quickly and easily kept up to date. IBM has also upgraded its QRadar Security Intelligence platform to support monitoring and analysis from widely distributed locations.
"This is an area where the market continues to evolve fairly rapidly, almost on a daily basis," added Maass. "This eases the way you can integrate clouds and applications, a very positive thing for my clients."
NEXT: Protecting the Privileged User
In addition, IBM's new Security Privileged Identity Manager provides federated single sign-on to cloud applications, integrating with a variety of widely used cloud applications and services.
"We're starting to see security change from a perimeter basis towards a perimeter less environment," explained IBM's Robinson. "So part of our focus is on the privileged user. In the first quarter, we announced role-based access. We are now providing more granular control and monitoring. This means you can track privileged users based on their activities on the network."
"You can also integrate data from mainframe environments as well, from a single pane of glass," Robinson added.
New mainframe security reporting delivered through QRadar provides Common Criteria Evaluation Assurance Level 5+ (EAL 5+) certification for logical partitions, and it serves as a platform for consolidating systems into unified management and monitoring. Additional improvements simplify administration overhead, enforce policy and automate compliance reporting.
From a big data perspective, IBM's Guardium product now provides real-time monitoring and automated compliance reporting for Hadoop-based systems such as InfoSphere BigInsights and Cloudera. Organizations can also automate the detection of vulnerabilities and leverage suggested prioritized remedial actions.
IBM has also announced improved key recovery and support for data encryption.
Credit-qualified clients can take advantage of zero-percent interest for 12 months on qualifying IBM Security products and solutions through IBM Global Financing.
PUBLISHED OCT. 18, 2012