Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

IBM Launches Open Technology to Speed Response to Cyber Threats Across Clouds

Industry-First Capability to Hunt Threats Across Security Tools and Clouds Without Moving Data

IBM announced Cloud Pak for Security, featuring industry-first innovations to connect with any security tool, cloud or on-premise system, without moving data from its original source. Available today, the platform includes open-source technology for hunting threats, automation capabilities to help speed response to cyberattacks, and the ability to run in any environment.

Cloud Pak for Security is the first platform to leverage new open-source technology pioneered by IBM, which can search and translate security data from a variety of sources, bringing together critical security insights from across a company’s multicloud IT environment. The platform is extensible, so that additional tools and applications can be added over time.

As businesses move further into cloud maturity, applications and data are frequently spread across multiple private and public clouds and on-premise resources. Attempts to protect this fragmented IT environment often require security teams to undertake complex integrations and continuously switch between different screens and point products. In a recent SANS Institute report, sponsored by IBM Security, more than half of security teams surveyed said they struggle to integrate data with disparate security and analytic tools and combine that data across their cloud environments to spot advanced threats.

Read More: NICE Integrations With Microsoft Teams to Be Showcased at Microsoft Ignite

Three initial capabilities of Cloud Pak for Security include:

  • Run anywhere. Connect security openly – IBM Cloud Pak for Security installs easily in any environment – on premises, private cloud or public cloud. It is comprised of containerized software pre-integrated with the Red Hat OpenShift, the industry’s most comprehensive enterprise Kubernetes platform. Through the OASIS Open Cybersecurity Alliance, IBM has also forged partnerships with dozens of companies to promote interoperability and help reduce vendor lock-in across the security community through co-developed open source technologies.
  • Gain security insights without moving data – Transferring data in order to analyze it creates additional complexity. IBM Cloud Pak for Security can connect data sources to uncover hidden threats and help make better risk-based decisions, while leaving the data where it resides. Through the use of open standards and IBM innovations, clients can access IBM and third-party tools to search for threat indicators across any cloud or on-premise location. Via the Cloud Pak for Security’s Data Explorer application, security analysts can streamline their hunt for threats across security tools and clouds. Without this capability, security teams would have to manually search for the same threat indicators (such as a malware signature or malicious IP address) within each individual environment. Cloud Pak for Security is the first tool that allows this type of search without needing to move that data into the platform for analysis.
  • Respond faster to security incidents with automation – IBM Cloud Pak for Security connects security workflows with a unified interface to help teams respond faster to security incidents. According to IBM Security estimates, security teams have to manage an average of 200,000 potential security events per day, and coordinate responses across dozens of tools. IBM Cloud Pak for Security allows clients to orchestrate and automate their security response so they can better prioritize their team’s time. The platform allows companies to orchestrate their response to hundreds of common security scenarios, guiding users through the process and providing quick access to security data and tools. IBM’s Security Orchestration, Automation and Response capability integrates with Red Hat Ansible for additional automation playbooks. By formalizing security processes and activities across the enterprise, companies can react quickly and efficiently, while arming themselves with information to help address regulatory requirements.

“As businesses move mission-critical workloads to hybrid multicloud environments, security data is spread across different tools, clouds and IT infrastructure. This can create gaps that allow threats to be missed, leading security teams to build and maintain costly, complex integrations and manual response plans,” said Mary O’Brien, General Manager, IBM Security. “With Cloud Pak for Security, we’re helping to lay the foundation for a more connected security ecosystem designed for the hybrid, multicloud world.”

Related Posts
1 of 40,647

IBM collaborated with dozens of clients and service providers during the design process, developing a solution to address critical interoperability challenges that permeate the security industry. The Cloud Pak for Security includes connectors for pre-built integrations with popular security tools from IBM, Carbon Black, Tenable, Elastic, BigFix, Splunk, as well as public cloud providers including IBM Cloud, Amazon Web Servicesand Microsoft Azure2. The solution is built on open standards so that it can connect additional security tools and data from across a company’s infrastructure.

Read More: NVIDIA Cuda-X AI and HPC Software Stack Now Available on Marvell ThunderX Platforms

“Organizations have rapidly adopted new security technologies to keep up with the latest threats, but are now juggling dozens of disconnected tools which don’t always work well together,” said Jon Oltsik, Senior Principal Analyst, Enterprise Strategy Group. “The industry needs to solve this issue for customers by shifting to more open technologies and unified platforms that can serve as the connective glue between security point tools. IBM’s approach aligns with this requirement and has the potential to bring together every layer of the security stack within a single, simplified interface.”

To further accelerate industry migration toward open security, IBM is also spearheading open-source projects to make security tools work together natively across the security ecosystem. As a founding member of the Open Cybersecurity Alliance, IBM and more than 20 other organizations are working together on open standards and open source technologies to help enable product interoperability and reduce vendor lock-in across the security community.

Designed for the Hybrid, Multicloud World

Seventy-six percent of organizations surveyed report they are already using between two and 15 hybrid clouds, and 98 percent forecast they will be using multiple hybrid clouds within three years.3 IBM’s Cloud Pak for Security is built on open source technologies that support companies’ cloud environments – including Red Hat OpenShift.

Creating Cloud Pak for Security on these open, flexible building blocks allows for easy “containerized” deployment across any cloud or on premise-environment. As companies continue adding new cloud deployments and migrations, Cloud Pak for Security can adapt and scale to these new environments – allowing clients to bring their sensitive and mission-critical workloads into the cloud while maintaining visibility and control from within a centralized security platform.

Cloud Pak for Security also provides a model to help Managed Security Services Providers (MSSP) efficiently operate at scale, connect security silos and streamline their security processes. Organizations can also hire IBM Security for a wide range of additional services, such as on-demand consulting, custom development and incident response.

Read More: Outreach Unveils Game-Changing AI Capabilities That Help Sales Reps Engage Smarter at Dreamforce 2019

1 Comment
  1. Copper scrap volume purchasing says

    Copper scrap import requirements Industrial copper scrap Metal recycling logistics
    Copper cable reclaiming, Eco-friendly metal recovery, Scrap copper purity standards

Leave A Reply

Your email address will not be published.