IBM Introduces New Security Solutions for Big Data, Mobility and Cloud

IBM announced a wide range of security software solutions to help organizations protect their information and identities within and outside the company in massive data environments such as Big Data, mobile and cloud computing.

Specifically, IBM presented ten products and improvements for organizations to deal with new security threats and challenges arising as a result of the increased use of these emerging technologies. In fact, according to the IBM 2012 Global Reputational Risk and IT study, a major cause of concern of executives worldwide is how to ensure the security of their data in real time outside the traditional security perimeter of the company.

The new capabilities of IBM software to help customers better manage the security of mobile devices, mitigate threats and reduce internal and external security risks in cloud environments, enhance security of the databases in real-time such as data security solutions for Hadoop and other big data environments, and automate compliance and security management information.

IBM InfoSphere Data Security Solutions

IBM security solutions such as IBM InfoSphere Guardium for Hadoop and IBM InfoSphere Optim Data Privacy enables security monitoring in real time and automated report on compliance with standards and regulations for Hadoop based systems such as InfoSphere BigInsights and Cloudera.

IBM also offers a special masking of sensitive data as they move in and out of systems. In addition, the control functionality improved data encryption, which now allows you to automate the recovery of encryption keys and supports the latest version of the KMIP protocol (Key Management Interoperability Protocol).

Mobile Security Solutions

IBM announced the access control for mobile users on the basis of risk, integrating access control features in the design and deployment of mobile applications, as well as enhanced control of mobile devices. In addition, IBM introduced comprehensive basic infrastructure Mobile Security Framework to help organizations in the formation of a flexible approach to data protection at the device level, application level and at the gateway level to access control.

Releasing new packages like IBM Security Access Manager for Cloud and Mobile and IBM Endpoint Manager for Mobile Devices, IBM offered an improved, context-based access control for mobile users, as well as increased protection against mobile threats and enhanced control of mobile devices. This broad portfolio of solutions for mobile security and management can help customers protect against threats posed by vulnerabilities by either inadvertent or malicious actions of employees to corporate data and applications – at any time, any place and on any device.

Cloud Security Solutions

Despite the fact that the cloud solution can boost productivity with the ability to access information anytime and anywhere, this technology entails additional risks associated with information security companies. In order to take full advantage of cloud computing, organizations are looking for integrated security solutions that help reduce these risks.

IBM announced enhancements portfolio of security tools designed to meet these new challenges, providing increased transparency and levels of automation and update management software to support compliance with regulatory requirements for security, prevent unauthorized access and protect against the latest threats with advanced analytics.

The big blue has introduced three new solutions. First, IBM SmartCloud for Patch Management to automatically manage patches regardless of location; IBM Security Access Manager for Cloud and Mobile, offering web design for improved cloud applications and services with SaaS applications and improved IBM Security Privileged Identity Manager, to ensure compliance and avoid identity intrusion threats.

IBM also enhanced its QRadar security intelligence platform with a unified architecture to collect, store, analyze and retrieve information on a log, threat, vulnerability and security from distributed locations.

Leave a Reply

Your email address will not be published. Required fields are marked *