IBM Unveils Converged Security Strategy

IBM is tackling security in a big way. Late last week the company unveiled a new strategy encompassing five broad aspects of security and launching new products, services, and research designed to address everything from data threats to physical vulnerabilities. The "first wave" in IBM's new security initiative targets "enterprise to edge" information security.

"For many enterprises, security is broken," said Tom Noonan, general manager IBM Internet Security Systems, in a statement released Thursday. "The nature of evolving threats is such that installing point solutions to 'keep the bad guys out' is no longer a viable way to secure a business. We advocate new approaches to reduce complexities, adapt to new business imperatives and enable business value versus just threat protection. The path to a more secure world begins with a risk management strategy that limits the impact of threats, improves business resilience and creates an enterprise free of fear."

According to IBM, the new security strategy is the result of several recent acquisitions by the company in the security space. The strategy targets five broad areas of security, including information security; threat and vulnerability; application security; identity and access management; and physical security. In order to tackle these, the company has launched several new products and services, some in partnership with security firms. These include:
  • Proventia Content Analyzer Technology, a data inspection and analysis tool for the Proventia Network Intrusion Prevention System;
  • IBM Data Security Services for Activity Compliance Monitoring and Reporting, a service deigned to assess and monitor malicious and non-compliant database activity and vulnerabilities and report on abuses;
  • IBM Data Security Services for Endpoint Data Protection for encrypting and managing data on endpoint devices;
  • IBM Data Security Services for Enterprise Content Protection, a new service meant to prevent intentional an unintentional data leakage;
  • User Compliance Management Software, which provides ongoing audits and alerts when policy violations are detected;
  • IBM QuickStart Services for Tivoli Compliance Insight Manager, which is designed to help with the implementation of IBM's Tivoli event management software;
  • IBM Web Application Security and Compliance Management, a compliance management tool targeted toward Web applications;
  • IBM Tivoli zSecure, a suite for the IBM System z mainframe; and
  • A new end to end PCI compliance program designed that includes technologies and services to assess compliance, create strategies to meet compliance standards, and, ultimately, to get the client certified for compliance.
IBM has also launched a new security initiative called Security Risk Management (SRM), a collaboration between universities and IBM's research and software divisions. It's designed to provide tools for risk management for CIOs and CISOs to "manage and allocate risk across all security domains to optimize business results," IBM said. "SRM performs critical assessments, compares business-level risks across the enterprise, quantifies the risk managed and the cost of each IT control, as well as automating control testing, to allow the firms to make significant cost savings."

SRM includes dynamic risk quantification; peer group risk comparison; business control optimization; security portfolio optimization (to help assess weaknesses); and event risk calculation.

Read More:

About the Author

David Nagel is the former editorial director of 1105 Media's Education Group and editor-in-chief of THE Journal, STEAM Universe, and Spaces4Learning. A 30-year publishing veteran, Nagel has led or contributed to dozens of technology, art, marketing, media, and business publications.

He can be reached at [email protected]. You can also connect with him on LinkedIn at https://www.linkedin.com/in/davidrnagel/ .


Featured

  • consumer electronic devices—laptop, tablet, smartphone, and smart speaker—on a wooden surface with glowing AI icons hovering above

    OpenAI to Acquire Io, Plans Consumer AI Hardware Push

    OpenAI has announced plans to acquire io, an artificial intelligence hardware startup co-founded by former Apple design chief Jony Ive. The deal is aimed at creating a dedicated division for the development of AI-powered consumer devices.

  • Jasper Halekas, instrument lead for the Analyzer for Cusp Electrons (ACE), checks final calibration. ACE was designed and built at the University of Iowa for the TRACERS mission.

    TRACERS: The University of Iowa Leads NASA-Funded Space Weather Research with Twin Satellites

    Working in tandem, the recently launched TRACERS satellites enable new measurement strategies that will produce significant data for the study of space weather. And as lead institution for the mission, the University of Iowa upholds its long-held value of bringing research collaborations together with academics.

  • computer monitor with a bold AI search bar on the screen

    Google Reimagines Search with AI Mode

    About a year after launching AI Overviews in its flagship search offering, Google has announced broad availability of AI Mode in Search.

  • abstract pattern of cybersecurity, ai and cloud imagery

    OpenAI Report Identifies Malicious Use of AI in Cloud-Based Cyber Threats

    A report from OpenAI identifies the misuse of artificial intelligence in cybercrime, social engineering, and influence operations, particularly those targeting or operating through cloud infrastructure. In "Disrupting Malicious Uses of AI: June 2025," the company outlines how threat actors are weaponizing large language models for malicious ends — and how OpenAI is pushing back.