IBM launches new product security embedded infrastructure Pao Yun Security

Source: Internet
Author: User
Keywords nbsp Security infrastructure
May 5, 2009, IBM announced the launch of new services, hardware and software designed to improve the security of the cloud computing environment, ensure data confidentiality, and protect against application attacks.

The latest research by IBM's X-force Security research team shows that global crime organizations are developing new attack technologies at an alarming rate. At the same time, companies are increasingly deploying more collaborative business models and using new IT infrastructures, including cloud computing, virtualization, and Web 2.0, all of which bring new complexities to the security team. IBM's new security portfolio is designed to meet customer needs, enables enterprises to take advantage of new technology patterns to cope with emerging risks, and can help address the cost and complexity of important security and compliance projects, such as identity verification and data security management, with simplified security solutions.

"The new computing model fundamentally requires companies to rethink how they respond to compliance, risk management, and data and application protection." "The approach the industry has taken is ' deploy first, then consider security '," said Brian Truskowski, general manager of IBM Internet Security System (ISS), which has created a situation where security costs are high and complex today. IBM drives innovation and securely embeds infrastructure through the platform, transforming security from costly impediments into business drivers. ”

New Cloud Security Products

A reliable security scenario depends on an understanding of where the data is stored and how the data is used. Even in traditional IT environments, it is difficult to have a comprehensive understanding of enterprise assets and their threats. As cloud computing grows, applications and data become flexible and mobile, and can be stored in many different places at specific times. This can lead to malicious behavior or attacks.

Today, IBM launched the Proventia Virtualization Network security Platform (Proventia virtualized receptacle), a virtual device that helps protect the security of your company's physical and cloud assets. As one of IBM's first offerings in the field of secure virtualization, the Proventia Virtualization Network security Platform is an extensible virtual security platform that integrates security applications including intrusion prevention, network application protection, and network policy execution into a single solution. With the Proventia Virtualization network security platform, customers can gain the power of virtualization through unprecedented scale, thereby providing X-FORCE-supported network protection to virtual networks, which is an important part of implementing a secure cloud service.

Like the real world of security, the virtual world has a problem of security costs and complexity.

"Today's complex single product creates management headaches for safe operations. "Bluelock is working with IBM to take the industry on a different path-embedding security in the virtual cloud," said Pat O ' Day, chief technology officer at Bluelock, a company focused on cloud services. Overall, IBM has been able to reduce the need for customers to install and manage multiple single solutions in their environment. ”

To protect against security threats in the cloud computing environment, IBM has implemented a company-wide project designed to create a unified and comprehensive security infrastructure for the cloud computing environment. This project involves systems, software, services, and IBM's renowned research and X-force teams dedicated to delivering highly automated, comprehensive security solutions, with particular emphasis on high levels of isolation, integrity, and resilience.

Comprehensive protection of the network against malware attacks

Because the operations of various organizations are implemented through global networks, the pervasive and dynamic nature of online applications poses new challenges to meeting compliance and security requirements. More worryingly, the growth of malware is becoming a major threat to network security.

Sites such as social networks, blogs, and wikis are attracting users to communicate and talk, and increased interactivity makes it easier for hackers and cyber criminals to embed malware in these applications. As a result, organizations are looking for ways to protect their customers ' data from being attacked and to verify that their sites are not compromised as a platform for launching attacks. Now, IBM has introduced new solutions to help eliminate these threats:

IBM Rational AppScan Malware Scan (Malware scanning for IBM rational AppScan)--This software will rational appscan powerful scanning and testing software and ISS X-force malware research is combined with the detection engine. With simple operations, users can automatically and proactively scan and test the site for embedded malware and analyze content to determine whether malicious content exists and where it exists. If malware is found, these issues are reported and purged from applications and Web sites, and users are protected.

Proventia Network application Firewall (Proventia Web Creator Firewall)-This new module is embedded in the IBM ISS Proventia Portfolio to help customers protect more network vulnerabilities through a single solution. The firewall is based on the IBM X-force Security team's research effort to provide protection within the network to protect against major vulnerabilities and attacks against network applications. This product provides a virtual application patching mechanism, which is also an important feature of the product because more than 50% of the application vulnerabilities are not patched for months. By combining rational AppScan and Proventia Network application firewalls, IBM can provide End-to-end application security and compliance solutions ranging from development to application. At the same time, by combining the Rational AppScan and Proventia Network application firewalls, IBM can also provide a comprehensive application security solution that covers from development to application.

New data and identity certification software, services for global integration, interoperability of enterprises

Today, IBM has launched four new security offerings for dynamic infrastructure and network-based environments to help business and IT security managers improve risk management, meet cost reduction requirements, and reduce complexity. In a dynamic infrastructure, managing risk means developing and managing a secure infrastructure that is built on the basis of trust. Trust in users, identities, information, business processes, and infrastructure will help customers flexibly and quickly deliver superior business and IT services while reducing the cost of infrastructure management, operations, and operations.

These new products include:

IBM Tivoli Identity and Access Assurance Services (IBM Tivoli Identity and Access Assurance) Help monitor, manage, and reduce the risk of identity and access through centralized identity, access, authentication, and review services. It also provides closed privileged user monitoring, control and remediation. This service will be provided through the IBM ISS Resilient Identity Authentication Service (IBM ISS Consolidator Identity Services) to help further reduce the cost of protection.

The IBM Tivoli Data and Application Security Service (IBM Tivoli Creator)-helps address the privacy and compliance risks associated with losing backup tapes and disks by encrypting storage data. This service will enhance access control and be able to track user policy compliance.

IBM Tivoli's security Management Service for z/OS (IBM Tivoli secure Management for z/OS) helps improve access control facilities for resources (Resource access controls facility, RACF) Operations management and compliance status. This new service strengthens centralized management of mainframes, monitors events and incidents, and reduces security vulnerabilities.

    IBM also announced that for the Tivoli Enterprise single sign-on Access Manager (IBM Tivoli Access Manager for Enterprise one Sign on) products, Six business partners support the second element "enhanced" certification. IBM can now provide customers with 250 Tivoli-related application configurations to integrate into their environment. Charismathics, digital technology (Digital Persona), ensure Technologies, Fujitsu, Rfideas, and Upek will help customers integrate logical and physical security management.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.