IBM Targets Cloud Computing With Security Infrastructure, Services - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Government // Mobile & Wireless

IBM Targets Cloud Computing With Security Infrastructure, Services

Seeking to allay widespread fear of data breaches, IBM introduces security assessments, SaaS offerings and hosted vulnerability management.

Slideshow: Cloud Security Pros And Cons
Slideshow: Cloud Security Pros And Cons
(click image for larger view and for full slideshow)
IBM on Wednesday announced initiatives aimed at overcoming many enterprises' current hesitation over adopting cloud computing: security.

According to a study also released on Wednesday by IBM, 77% of businesses think that adopting cloud computing requires privacy trade-offs, 50% worry that clouds lead to data breaches, and 23% fear that cloud computing will weaken corporate security. Those results come from a global survey of 556 IT managers.

To help address those security concerns, IBM outlined these moves: strategy roadmaps and security assessments; actual SaaS offerings, such as hosted security event and log management; and hosted vulnerability management.

In addition, IBM said it has research projects under way aimed at bolstering cloud security. Its Integrated Trusted Virtual Data Center project aims to harden everyday infrastructure by isolating more of its components.

For example, the underlying security mechanisms can "verify the integrity and correct configuration of infrastructure components, such as hypervisors, to help prevent low-level attacks such as spoofing or deceiving computer systems or other computer users by hiding or imitating one's Internet identity." Some of those capabilities have been added to the IBM Smart Business Test and Development cloud, as well as to IBM Systems Director VMControl.

Moreover, IBM has added "introspection monitoring" to its IBM Virtual Protection System. This capability provides a more holistic approach to virtualization security than current introspection systems do, said IBM, because it can look beyond just the inside of any given virtual machine. IBM said the capability "detects potential malware attacks from outside the virtual machine and scans the operating systems inside to confirm they are running properly." Accordingly, it can detect the presence of malicious code or exploits aimed at fooling the virtualized operating systems into granting inappropriate access rights.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
IT Careers: 10 Industries with Job Openings Right Now
Cynthia Harvey, Freelance Journalist, InformationWeek,  5/27/2020
How 5G Rollout May Benefit Businesses More than Consumers
Joao-Pierre S. Ruth, Senior Writer,  5/21/2020
IT Leadership in Education: Getting Online School Right
Jessica Davis, Senior Editor, Enterprise Apps,  5/20/2020
White Papers
Register for InformationWeek Newsletters
Current Issue
Key to Cloud Success: The Right Management
This IT Trend highlights some of the steps IT teams can take to keep their cloud environments running in a safe, efficient manner.
Flash Poll