IBM Unveils Converged Security Strategy

IBM is tackling security in a big way. Late last week the company unveiled a new strategy encompassing five broad aspects of security and launching new products, services, and research designed to address everything from data threats to physical vulnerabilities. The "first wave" in IBM's new security initiative targets "enterprise to edge" information security.

"For many enterprises, security is broken," said Tom Noonan, general manager IBM Internet Security Systems, in a statement released Thursday. "The nature of evolving threats is such that installing point solutions to 'keep the bad guys out' is no longer a viable way to secure a business. We advocate new approaches to reduce complexities, adapt to new business imperatives and enable business value versus just threat protection. The path to a more secure world begins with a risk management strategy that limits the impact of threats, improves business resilience and creates an enterprise free of fear."

According to IBM, the new security strategy is the result of several recent acquisitions by the company in the security space. The strategy targets five broad areas of security, including information security; threat and vulnerability; application security; identity and access management; and physical security. In order to tackle these, the company has launched several new products and services, some in partnership with security firms. These include:
  • Proventia Content Analyzer Technology, a data inspection and analysis tool for the Proventia Network Intrusion Prevention System;
  • IBM Data Security Services for Activity Compliance Monitoring and Reporting, a service deigned to assess and monitor malicious and non-compliant database activity and vulnerabilities and report on abuses;
  • IBM Data Security Services for Endpoint Data Protection for encrypting and managing data on endpoint devices;
  • IBM Data Security Services for Enterprise Content Protection, a new service meant to prevent intentional an unintentional data leakage;
  • User Compliance Management Software, which provides ongoing audits and alerts when policy violations are detected;
  • IBM QuickStart Services for Tivoli Compliance Insight Manager, which is designed to help with the implementation of IBM's Tivoli event management software;
  • IBM Web Application Security and Compliance Management, a compliance management tool targeted toward Web applications;
  • IBM Tivoli zSecure, a suite for the IBM System z mainframe; and
  • A new end to end PCI compliance program designed that includes technologies and services to assess compliance, create strategies to meet compliance standards, and, ultimately, to get the client certified for compliance.
IBM has also launched a new security initiative called Security Risk Management (SRM), a collaboration between universities and IBM's research and software divisions. It's designed to provide tools for risk management for CIOs and CISOs to "manage and allocate risk across all security domains to optimize business results," IBM said. "SRM performs critical assessments, compares business-level risks across the enterprise, quantifies the risk managed and the cost of each IT control, as well as automating control testing, to allow the firms to make significant cost savings."

SRM includes dynamic risk quantification; peer group risk comparison; business control optimization; security portfolio optimization (to help assess weaknesses); and event risk calculation.

Read More:

About the Author

David Nagel is the former editorial director of 1105 Media's Education Group and editor-in-chief of THE Journal, STEAM Universe, and Spaces4Learning. A 30-year publishing veteran, Nagel has led or contributed to dozens of technology, art, marketing, media, and business publications.

He can be reached at [email protected]. You can also connect with him on LinkedIn at https://www.linkedin.com/in/davidrnagel/ .


Featured

  • two large brackets facing each other with various arrows, circles, and rectangles flowing between them

    1EdTech Partners with DXtera to Support Ed Tech Interoperability

    1EdTech Consortium and DXtera Institute have announced a partnership aimed at improving access to learning data in postsecondary and higher education.

  • Abstract geometric shapes including hexagons, circles, and triangles in blue, silver, and white

    Google Launches Its Most Advanced AI Model Yet

    Google has introduced Gemini 2.5 Pro Experimental, a new artificial intelligence model designed to reason through problems before delivering answers, a shift that marks a major leap in AI capability, according to the company.

  •  laptop on a clean desk with digital padlock icon on the screen

    Study: Data Privacy a Top Concern as Orgs Scale Up AI Agents

    As organizations race to integrate AI agents into their cloud operations and business workflows, they face a crucial reality: while enthusiasm is high, major adoption barriers remain, according to a new Cloudera report. Chief among them is the challenge of safeguarding sensitive data.

  • stylized AI code and a neural network symbol, paired with glitching code and a red warning triangle

    New Anthropic AI Models Demonstrate Coding Prowess, Behavior Risks

    Anthropic has released Claude Opus 4 and Claude Sonnet 4, its most advanced artificial intelligence models to date, boasting a significant leap in autonomous coding capabilities while simultaneously revealing troubling tendencies toward self-preservation that include attempted blackmail.