Data analytics helps organizations hunt for cyber attacks
ARMONK, N.Y. – 31 Jan 2013: Advanced attacks, widespread fraud and the pervasive use of social media, mobile and cloud computing are drastically altering the security landscape. As organizations increasingly need to manage Big Data, the way that corporate data needs to be protected is rapidly changing. (more…)
Largest set of security software capabilities announced to date
ARMONK, N.Y. – 18 Oct 2012: In a move designed to reduce the biggest security inhibitors that organizations face in implementing cloud, mobile and big data initiatives, IBM today announced a broad set of security software to help holistically secure data and identities.
IBM’s new software capabilities help clients better maintain security control over mobile devices, mitigate internal and external threats, reduce security risks in cloud environments, extend database security to gain real-time insights into big data environments such as Hadoop, and automate compliance and data security management. Along with IBM Security Services and IBM’s world-class research capabilities, this set of scalable capabilities supports a holistic, proactive approach to security threats spanning people, data, applications and infrastructure. (more…)
Increases in mobile exploits and concerns from security executives around BYOD adoption leads to enhanced security intelligence capabilities
ORLANDO – 05 Jun 2012: IBM today announced new software to help organizations develop mobile applications that are more secure by design. Now, clients can build security into the initial design of their mobile applications so that vulnerabilities will be detected early in the development process. Today’s announcement further expands IBM’s strategy to provide clients with a mobile platform that spans application development, integration, security and management.
With more than five billion mobile devices in the world – and only 2 billion computers – the shift to mobile devices as the primary form of connecting to corporate networks is increasing rapidly. Securing those devices is becoming a top priority for security executives and CIOs. As companies embrace the growing “Bring Your Own Device” (BYOD) trend, the need to secure the applications that run on these devices is becoming more critical. According to the 2011 IBM X-Force Trend and Risk Report, mobile exploits increased by 19 percent in 2011. In addition, according to the recently released data from the IBM Center for Applied Insights study, 55 percent of respondents cited mobile security as a primary technology concern over the next two years.(more…)