ASE Labs
Welcome Guest. Please register or log in now. There are 261 people online (0 Friends).
  • Home
  • Articles
  • News
  • Forum
  • Register/Login

IBM Takes Action to Improve Cloud Security

Poster: SySAdmin
Posted on October 20, 2010 at 10:28:01 AM
IBM Takes Action to Improve Cloud Security

New services and IBM Research innovations reduce barriers to cloud adoption

ARMONK, N.Y., Oct. 20 /PRNewswire/ -- IBM (NYSE: IBM) today unveiled a new security initiative focused on making cloud computing safer. IBM aims to help both users and providers of cloud computing more easily navigate security challenges through new cloud security planning and assessment services, managed services to help clients secure their clouds, and the introduction of several technology innovations from its global research labs.

To view the multimedia assets associated with this release, please click http://www.prnewswire.com/news-releases/ibm-takes-action-to-improve-cloud-security-105306723.html

According to IBM's Institute for Business Value 2010 Global IT Risk Study, cloud computing raised serious concerns among respondents about the use, access and control of data: 77 percent of respondents believe that adopting cloud computing makes protecting privacy more difficult; 50 percent are concerned about a data breach or loss; and 23 percent indicate that weakening of corporate network security is a concern.  As the study illustrates, businesses see the promise of the cloud model, but security remains an inhibitor to adoption.

While an information technology (IT) foundation pertains to all cloud computing, providers and users do not generally rely on one generic model for data security. Both cloud providers and users should consider a variety of factors, including the kind of work a client wants to do in the cloud and the mechanisms and controls used. For example, clients who have collaboration tools and email work in the cloud should think about access and policy controls, while clients focused on healthcare in the cloud should be concerned with data isolation and encryption.

To help meet these specific needs, IBM's cloud security experts work closely with clients to address their individual concerns and provide the appropriate services and offerings. This process includes evaluations of the security positioning of planned or existing cloud implementations as well as recommendations for various security strategies.

"IBM understands the 'one size fits all' cloud security strategy will not work for most businesses," said Steve Robinson, general manager, IBM Security Solutions. "Our enterprise clients are looking for a trusted advisor to provide the right mix of security consulting services and offerings to match. By offering these new services and innovations, we aim to help clients create tailored solutions that will allow them to get the most out of their cloud environments."

Additionally, IBM has a team of security professionals around the world and holds a number of security and risk management patents, which can be used to help clients solve their toughest cloud problems. As the cloud computing model evolves with the changing needs of a client's business, IBM researchers are designing new technologies to ensure the integrity of data in the cloud regardless of the business or industry scenario.

New IBM Cloud Security Infrastructure and Services

IBM is using its expertise to outline a two-pronged approach for clients seeking to dramatically improve cloud security:

1. Plan and Assess the Security Strategy for the Cloud 

    --  IBM Cloud Security Strategy Roadmap - For clients who are embarking on a
        cloud strategy as either a provider or subscriber, the new roadmap is
        designed to help organizations understand, establish and outline the
        steps for realizing their security goals in relation to their cloud
        computing strategy. IBM security experts conduct an onsite working
        session with clients to help define the cloud computing initiative and
        goals, identify associated security and privacy concerns, determine
        appropriate vulnerability mitigation strategies and develop a high-level
        security strategy roadmap designed to achieve their cloud security
        objectives.
    --  IBM Cloud Security Assessment - For clients with cloud infrastructure in
        place or planning their cloud environment, the new assessment is
        designed to help provide an in-depth understanding of the current state
        of a current or planned cloud solution's security controls, mechanisms
        and architecture. IBM assessment professionals help compare the cloud
        solution's security program against industry best practices and the
        client's own cloud security objectives, then identifies steps to help
        improve the overall security environment.
    --  IBM Application Security Services for Cloud - The new offering allows
        CIOs to have a clear picture of how and where sensitive data will
        circulate in a cloud environment. It assesses current or proposed cloud
        application environments to help ensure that the appropriate
        information, security, and privacy controls are in place for a client's
        specific business requirements. By identifying and prioritizing
        cloud-specific security vulnerabilities, internally and within their
        service providers, the offering can help clients determine the right
        balance of internal control and service provider autonomy required to
        maintain efficiency and service level requirements before implementing
        the solution.

2.Obtain Security Services from the Cloud

    --  IBM Managed Security Services Hosted Security Event and Log Management -
        This enhanced offering is a cloud-based solution for security incident
        and event management  that consolidates the security event and log data
        of operating systems, applications and infrastructure equipment,
        providing a seamless platform from which to assess and respond to
        real-time and historical traffic. It dramatically improves the speed of
        security investigations and compliance initiatives, offering the full
        life cycle of security information and event management, and provides
        options to outsource these tasks to security experts located in IBM's
        worldwide Security Operation Centers.
    --  IBM Managed Security Services Hosted Vulnerability Management - This
        enhanced cloud-based scanning service helps companies to identify
        vulnerabilities across network devices, servers, web applications and
        databases to help manage concerns and reduce the cost of security
        operations. This service is available to companies of all sizes who want
        to quickly and more easily address compliance mandates.

"We needed a remote scanning solution that can help us identify critical vulnerabilities throughout our infrastructure and assist us in meeting external audit requirements," said Henrique Matiole, IT supervisor, ArcelorMittal Sistemas S.A. of Brazil. "The enhanced hosted vulnerability management scanning solution carries advanced scanning capabilities for complicated security challenges and provides strong reporting capabilities through a web-based portal that helps us easily satisfy our audit requirements."

Top Security Experts Develop Next Generation of Solutions to Secure Cloud

Researchers at the IBM Watson and Zurich research labs are working on a variety of projects that examine new ways to bolster cloud security by enabling enhanced data integrity, recovery, privacy, and customer isolation in a public cloud environment.

For example, IBM researchers have developed mechanisms that enhance cloud security by providing "infrastructure hardening," or stronger isolation between different workloads. These mechanisms verify the integrity and correct configuration of infrastructure components such as hypervisors to help prevent low-level attacks such as spoofing, or deceiving computer systems or other computer users by hiding or imitating an Internet identity. IBM recently added some of these security capabilities to the IBM Smart Business Test and Development cloud. Some of these security mechanisms are also currently offered in the IBM Systems Director VMControl(TM).

Another example of IBM's ability to rapidly take advantage of new cloud security techniques pioneered by its researchers is the integration of "introspection monitoring" into the IBM Security Virtual Server Protection for VMware offering. This capability enables a kind of "virtual doorman," in the cloud environment, which detects potential malware attacks from outside the virtual machine and scans the operating systems inside to confirm they are running properly. The capability will then determine whether or not they contain malicious code, such as root-kits, which are software programs designed to provide a user with administrator access to a computer without being detected. This level of security isn't available from conventional introspection solutions that can only communicate and check inside the virtual machine.

IBM's Institute for Business Value 2010 Global IT Risk Study

IBM's Institute for Business Value 2010 Global IT Risk Study was commissioned to understand how information technology (IT) managers are working to mitigate risk.  Core objectives of the study included evaluating the manner in which innovations like cloud and mobile computing are influencing overall IT risk strategies and exploring how the role of the IT Manager is changing in relation to these innovations.  The survey included 556 respondents from all geographies, representing companies with revenues of less than $500M to more than $10B.  Respondents worked across a diverse set of industries and sectors including finance, healthcare, biotechnology, manufacturing, government and information technology services.

For more information on the IBM 2010 Global IT Risk Study please see:  http://www.ibm.com/services/riskstudy.

IBM Security Solutions include an extensive portfolio of hardware, software solutions, professional and managed services offerings covering the spectrum of IT and business security risks, including: people and identity, data and information, application and process, network, server and endpoint and physical infrastructure. IBM Security Solutions empowers clients to innovate and operate their businesses on highly secure infrastructure platforms.

For more information on IBM Security Solutions, visit: http://www.ibm.com/security.

    Contact:

    Darcy Hansen
    IBM Media Relations
    917-472-3692
    hansenda@us.ibm.com

SOURCE  IBM

Video:http://www.prnewswire.com/news-releases/ibm-takes-action-to-improve-cloud-security-105306723.html
IBM

CONTACT: Darcy Hansen, IBM Media Relations, +1-917-472-3692, hansenda@us.ibm.com

Web Site: http://www.ibm.com
 
Print This Entry
Tags PR Press Release
Related Articles
  • Huntkey Has Launched Its New Power Strips with USB Chargers on Amazon US
  • Inspur Releases TensorFlow-Supported FPGA Compute Acceleration Engine TF2
  • Hot Pepper Introduces Spicy New Smartphones in US Markets
  • Sharp Introduces New Desktop Printers For The Advanced Office
  • DJI Introduces Mavic 2 Pro And Mavic 2 Zoom: A New Era For Camera Drones
Login
Welcome Guest. Please register or log in now.
Forgot your password?
Navigation
  • Home
  • Articles
  • News
  • Register/Login
  • Shopping
  • ASE Forums
  • Anime Threads
  • HardwareLogic
  • ASE Adnet
Latest News
  • Kingston HyperX Cloud 2 Pro Gaming Headset Unboxing
  • Synology DS415+ Unboxing
  • D-Link DCS-5020L Wireless IP Pan/Tilt IP Camera
  • Actiontec WiFi Powerline Network Extender Kit Unboxing
  • Durovis Dive Unboxing
  • Bass Egg Verb Unboxing
  • Welcome to the new server
  • Gmail Gets Optional Preview Pane
  • HBO Go on Consoles
  • HP Touchpad Update
Latest Articles
  • D-Link Exo AC2600 Smart Mesh Wi-Fi Router DIR-2660-US
  • HyperX Double Shot PBT Keys
  • Avantree ANC032 Wireless Active Noise Cancelling Headphones
  • ScharkSpark Beginner Drones
  • HyperX Alloy FPS RGB Mechanical Gaming Keyboard
  • D-Link DCS-8300LH Full HD 2-Way Audio Camera
  • Contour Unimouse Wireless Ergonomic Mouse
  • HyperX Cloud Alpha Pro Gaming Headset
  • Linksys Wemo Smart Home Suite
  • Fully Jarvis Adjustable Standing Desk
Latest Topics
  • Hello
  • Welcome to the new server at ASE Labs
  • Evercool Royal NP-901 Notebook Cooler at ASE Labs
  • HyperX Double Shot PBT Keys at ASE Labs
  • Avantree ANC032 Wireless Active Noise Cancelling Headphones at ASE Labs
  • ScharkSpark Beginner Drones at ASE Labs
  • HyperX Alloy FPS RGB Mechanical Gaming Keyboard at ASE Labs
  • D-Link DCS-8300LH Full HD 2-Way Audio Camera at ASE Labs
  • Kingston SDX10V/128GB SDXC Memory at ASE Labs
  • What are you listening to now?
  • Antec Six Hundred v2 Gaming Case at HardwareLogic
  • Sans Digital TR5UTP 5-Bay RAID Tower at HardwareLogic
  • Crucial Ballistix Smart Tracer 6GB PC3-12800 BL3KIT25664ST1608OB at HardwareLogic
  • Cooler Master Storm Enforcer Mid-Tower Gaming Case at HardwareLogic
  • Arctic M571-L Gaming Laser Mouse at ASE Labs
  • Contour Unimouse Wireless Ergonomic Mouse at ASE Labs
Advertisement
Advertisement
Press Release
  • Huntkey Has Launched Its New Power Strips with USB Chargers on Amazon US
  • Inspur Releases TensorFlow-Supported FPGA Compute Acceleration Engine TF2
  • Hot Pepper Introduces Spicy New Smartphones in US Markets
  • Sharp Introduces New Desktop Printers For The Advanced Office
  • DJI Introduces Mavic 2 Pro And Mavic 2 Zoom: A New Era For Camera Drones
  • DJI Introduces Mavic 2 Pro And Mavic 2 Zoom: A New Era For Camera Drones
  • Fujifilm launches "instax SQUARE SQ6 Taylor Swift Edition", designed by instax global partner Taylor Swift
  • Huawei nova 3 With Best-in-class AI Capabilities Goes on Sale Today
  • Rand McNally Introduces Its Most Advanced Dashboard Camera
  • =?UTF-8?Q?My_Size_to_Showcase_Its_MySizeId=E2=84=A2_Mobil?= =?UTF-8?Q?e_Measurement_Technology_at_CurvyCon_NYC?=
Home - ASE Publishing - About Us
© 2010 Aron Schatz (ASE Publishing) [Queries: 16 (8 Cached)] [Rows: 292 Fetched: 35] [Page Generation time: 0.012985944747925]