Big data, what about security?

Source: Internet
Author: User
Keywords Security solution delivery large data

To reduce the security problems faced by companies in implementing cloud, mobile, and large data technologies, IBM recently announced a series of security software to help businesses fully protect data and identity.

New IBM security software helps businesses better maintain security controls on mobile devices, reduce internal and external security threats, reduce security risks in the cloud environment, extend database security to gain real-time insight into large data environments such as Hadoop, and automate compliance and data security management. With IBM's security services and the world's leading research and development capabilities, the new security software offerings will provide enterprises with a more comprehensive and forward-looking solution to protect the security of enterprise employees, data, applications, and infrastructure with their strong scalability.

"There has been an important shift in the way companies protect data today," said Brendan Hannigan, general manager of IBM Security systems. Whether it's a mobile device, a cloud, or a social media platform, data can now be generated anywhere and generate massive amounts of data every day. This enables the enterprise to abandon the data security Domain traditional single boundary, uses the multiple boundary, the omni-directional method to maintain the information security, but this method also makes the security intelligence application more close to the goal. ”

IBM Global Credit risk and IT survey report (IBM World reputational disorientated and it Survey) show that in terms of data theft to new technologies such as cloud computing, mobile and social media, Global executives see it risk as a key concern.

The launch of the new security software was another event after IBM announced the creation of a security system earlier this year. The newly released product and product enhancements will provide real-time security for businesses in large data, mobile, and cloud computing.

Real-time security in large data environments

Key Data security Solutions:

 New solutions: IBM infosphere Guardium for Hadoop

 Enhanced version: IBM infosphere Optim Data Privacy

Enhanced version: IBM Tivoli Key Lifecycle Manager

In today's society, the quantity, type and production speed of information are increasing, enterprises are gaining insights from relevant data resources, making the business more agile, and solving the new problems never encountered before. Today, the advent of new technologies, including the Hadoop environment, opens the door to a world of infinite possibilities for businesses. But at the same time, companies are absorbing more data and facing more risks in a more complex security threat environment. In addition, they also need to follow a series of specifications. Traditional data protection methods are often unable to meet these requirements.

With the launch of the new product, IBM is one of the first companies to launch a deep security intelligence solution for Hadoop and other large data environments in the marketplace. In particular, the Infosphere Guardium solution is now capable of providing real-time monitoring and automatic compliance reporting for Hadoop based systems such as Infosphere biginsights and Cloudera. Depending on the joint control of the data resources, the enterprise will be able to understand the data and application access patterns, prevent data leakage and implement data change control. The embedded audit report function can be used to generate compliance reports on a planned basis, to send reports to the regulatory team for electronic sign-off and escalation, and to record corrective actions. Enterprises can detect vulnerabilities and recommend priority patching actions in heterogeneous infrastructures. In addition, IBM provides data shielding capabilities to identify sensitive data when data flows into and out of large data systems.

In addition to protecting data security in a volatile environment, IBM has announced improvements in data encryption management, enabling enterprises to automate key recovery and support the latest Key Management Interoperability Protocol (KMIP).

For more product information please visit http://www.ibm.com/security/data/products.html

Improved access and threat protection in a mobile security framework

Key Mobile Security Solutions:

New solution: IBM security Access Manager for Cloud and Mobile

Enhanced version: IBM Endpoint Manager for Mobile Devices

IBM announced the introduction of risk-based Mobile user Identity control, integrating access management into the development and deployment of mobile applications and enhanced control of mobile devices. IBM has also announced the launch of a comprehensive mobile security framework, which helps businesses develop a suitable security situation in access and applications.

With the introduction of a new access management solution, IBM is now able to provide mobile users with stronger association control, improved mobile security, and increased control over mobile devices. With a wide range of mobile security and management solutions products, such as mobile application security, mobile Security intelligent Solutions, IBM can help organizations protect against security vulnerabilities caused by employee malicious or unintentional high risk access to data and applications.

Not only that, the simplicity of mobile devices also makes it ubiquitous and seamless into the consumer's daily life. New security threats based on popular mobile apps, such as retail purchasing, managing bank accounts and social networking updates, are emerging and evolving. The ubiquity of mobile commerce or consumers makes it necessary to protect the security of smartphones, including the protection of devices, networks, and applications on devices, so that employees, consumers and even business partners can trade in a secure environment.

For more information, please visit http://www.ibm.com/security/mobile/products.html

IBM's security for the cloud

Key Cloud Security Solutions:

New solution: IBM SmartCloud for Patch Management

New solution: IBM security Access Manager for Cloud and Mobile

New solution: IBM Security Privileged Identity Manager

Enhanced version: Qradar SIEM and Qradar Log Manager

While cloud computing can increase productivity by getting information at any point in any location, it also poses a challenge to enterprise security. To realize the value of cloud computing, companies are looking for integrated security solutions to address these risks.

IBM's enhanced version of the Security Solutions product line focuses on these new challenges, improves visibility, improves automation and patch management levels to demonstrate compliance, blocks unauthorized access, and uses advanced Security intelligence to protect businesses from the latest threats.

With IBM's newly released smartcloud™ Patch management solution, companies can automate patches in any location, and the repair cycle has been reduced from weeks to hours to reduce security risks. Not only that, IBM has released an enhanced version of the Qradar Security Intelligence platform, providing a unified architecture for collecting, storing, analyzing and querying all security-related logs from dispersed locations, as well as potentially compromising security-related data, and providing insight into the cloud, Help companies detect risks in business decisions in advance.

IBM's new security Privileged Identity Manager solution is designed to proactively respond to growing internal threats to meet internal enterprise specifications. The IBM Security Access Manager solution for cloud computing and Mobility provides enhanced federated SSO for cloud applications and a unique integration of improved and universally adopted SaaS applications and services.

Through cooperation with IBM and Securit, Flanders government as a "quasi-IBM Security Intelligent Partner", built a cloud-based platform. The platform includes IBM security identification and access management software, as well as Securit trustbuilder® software, to help businesses protect asset security from unauthorized access. As a client of IBM, the Flemish Government provides services to 6 million residents by digitally accessing more than 100 government websites. But previously, they lacked the flexibility to introduce new internal and external applications, as well as to manage public identification. For example, a person may have only one identity, but can have many titles or "roles", such as "Citizen", "civil servant" or "Notary Public".

The Flemish government strategy manager Wim Martens said: "The new infrastructure will enable our citizens and employees to access all available government resources in a simpler, safer and faster way." The new platform enables the public to seamlessly access all government services, and provides us with associated digital authentication by means of multiple proof methods for individual individuals in accordance with a centrally defined security strategy. ”

Molson Coors Brewing Company (MCBC), the world's second-largest beer manufacturer with more than 65 brands worldwide, needs to maintain compliance in identity authentication and access management. The company wants to provide a single identity for its employees to gain seamless access to network resources and to implement a new identity management strategy. The strategy includes security, auditing, and service three. The company eventually used a cloud security solution from the Lighthouse security Group, a quasi-IBM secure Smart partner. Its core uses IBM software for faster start-up speeds, maximum budget savings, and professional engineering expertise from IBM and lighthouse.

"We need a solution to improve visibility and transparency of security and audit-related data," said Kevin Schmitt, Molson Coors Brewing Company's chief information security executive. This helps us to recognize the remarkable progress of the company's security maturity, while saving the enterprise a lot of time and money in deploying similar solutions. ”

In addition, IBM has released a comprehensive end-to-end Host security management, policy execution, real-time alerting and audit reporting capabilities integrated with Qradar Security intelligence solutions. The host is able to provide industry-leading generic assessment guidelines for logical partitions eal5+ (Common Criteria evaluation Assurance level 5+) certification, while providing a platform to consolidate systems, protect private clouds, and through zsecure automated audits to ensure that the virtual environment security, implementation of security policies and simplified management.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.