IBM Targets Cloud Computing With Security Infrastructure, Services - InformationWeek
Government // Mobile & Wireless
01:38 PM
The Real Impact of a Data Security Breach
Aug 02, 2017
In this webcast, experts discuss the real losses associated with a breach, both in the data center ...Read More>>

IBM Targets Cloud Computing With Security Infrastructure, Services

Seeking to allay widespread fear of data breaches, IBM introduces security assessments, SaaS offerings and hosted vulnerability management.

Slideshow: Cloud Security Pros And Cons
Slideshow: Cloud Security Pros And Cons
(click image for larger view and for full slideshow)
IBM on Wednesday announced initiatives aimed at overcoming many enterprises' current hesitation over adopting cloud computing: security.

According to a study also released on Wednesday by IBM, 77% of businesses think that adopting cloud computing requires privacy trade-offs, 50% worry that clouds lead to data breaches, and 23% fear that cloud computing will weaken corporate security. Those results come from a global survey of 556 IT managers.

To help address those security concerns, IBM outlined these moves: strategy roadmaps and security assessments; actual SaaS offerings, such as hosted security event and log management; and hosted vulnerability management.

In addition, IBM said it has research projects under way aimed at bolstering cloud security. Its Integrated Trusted Virtual Data Center project aims to harden everyday infrastructure by isolating more of its components.

For example, the underlying security mechanisms can "verify the integrity and correct configuration of infrastructure components, such as hypervisors, to help prevent low-level attacks such as spoofing or deceiving computer systems or other computer users by hiding or imitating one's Internet identity." Some of those capabilities have been added to the IBM Smart Business Test and Development cloud, as well as to IBM Systems Director VMControl.

Moreover, IBM has added "introspection monitoring" to its IBM Virtual Protection System. This capability provides a more holistic approach to virtualization security than current introspection systems do, said IBM, because it can look beyond just the inside of any given virtual machine. IBM said the capability "detects potential malware attacks from outside the virtual machine and scans the operating systems inside to confirm they are running properly." Accordingly, it can detect the presence of malicious code or exploits aimed at fooling the virtualized operating systems into granting inappropriate access rights.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll