We are increasingly living our lives in online spaces, and as a result, the monetary value of those spaces seems to be rising every day. Billions and billions of dollars are spent every single year on online advertising. One of the challenges is not only making sure that your money is well spent, but also that your spend won't have a negative impact on your brand. If you're wondering how that could happen, think about this: it's estimated that about 10% of all online ads wind up in places they shouldn't be.
I actually had the pleasure of having lunch with Ian Lightstone (CFO ArtsandTV) a few months back while we were originally filming this video. It was my first exposure to the project and I have to say, it's pretty fascinating what they're working on. As someone who spends all their time talking about vulnerabilities and attack types and all the other pieces of the security conversation, advertising wasn't something that came up a lot. SEO attacks are probably the closest I'd ever gotten to thinking about advertising in the context of security. So how does security intersect with advertising?
ArtsandTV is a relatively small company that needed a lot of data. Data is something that IBM has. Specifically, we have one of the largest URL filtering databases in the world (Security Content Analysis SDK). This product is something typically used to enhance existing security offerings, but it is being used a bit differently here. The Project Sunblock team wanted to improve the way advertisers spend their money.
As you can probably imagine, there are a lot of inappropriate websites on the internet, places where you wouldn't want your brand to appear. In addition to the obvious places you want to avoid, there are other places that are more subtle. Imagine you are a bank, and you advertise a lot on some popular news site. One day, that site runs a story about the financial crisis and is extremely critical of the banking system. Despite the fact that you might frequently advertise on this site, you likely do not want your brand associated with that story.
So, ArtsandTV had the algorithms and IBM had the data. The combination of the two became Project Sunblock, an ad spend optimization and brand protection tool. Project Sunblock can help to keep your brand from appearing on inappropriate pages through the use of content and image analysis combined with a real-time decision making engine. This applies to both generally inappropriate sites, as well as the instances of specific articles and stories that you don't want your brand associated with.
One last thing to remember is that 10% figure I cited at the beginning this post. Not only is this solution protecting the image of a brand, it is also a way to get a better return on your investments. That 10% can be better spent elsewhere.
Today's post comes from Veronica Shelley, Market Manager, IBM Security.
With IBM's October 12th SmartCloud launch, perhaps you're considering cloud computing for your organization. After all, the benefits of cloud computing are well known. Cloud computing is flexible, scalable, and cost-effective, and it's a proven delivery platform for providing business or consumer IT services over the Internet. Cloud computing can help you cut costs and IT complexity, provide new services to customers, and streamline business processes. Cloud computing is gaining in popularity and may be the wave of the future. Yet, many organizations hesitate to get started due to security concerns and confusion over how to get started.
Perceived risk versus actual risk
Cloud computing may seem new, but the fact is companies have been outsourcing services and technology for years. Providers already deliver hosted technology offerings that are located off-site with client access via the Internet. This is a common scenario for services such as remote storage or hosted email and other software as a service (SaaS) solutions. And just because companies may give up some control to the provider when they move to a cloud-based environment (just as they give up some control in any outsourced arrangement), it doesn't mean they have to compromise on security. By asking the right questions and adequate preparation, companies can build a "trust and verify" relationship with the cloud provider they are working with.
Questions to ask to ensure cloud security
It's important to remember that the same factors apply to ensuring security whether it is cloud-based or within a traditional IT infrastructure. The key difference in the cloud model is that it includes external elements, and those elements will be managed by the cloud service provider. This means companies need to understand the environment beyond their own data center and consider how it impacts the organization from a security standpoint. To help ensure security and peace of mind, as well as a good working relationship with the cloud provider, the client company should always identify and prioritize cloud-specific security risks beforehand. Often, companies will find they have the same amount of control, if not more, with a cloud service.
There are specific tactics an organization can use to enhance cloud security. For identity and access management issues, companies need to control passwords, support privileged users and enable role-based access to these cloud services. With data protection, a key concern is knowing whether or not a company's hosted data is secure, especially if data from rival companies is also being stored on the provider's cloud service. Companies should also ensure the cloud provider is deploying antivirus software on all supported systems that could be exposed to attacks, and ensuring that selected programs can identify and protect against malicious software or processes. From an auditing and monitoring perspective, companies need to determine how the cloud provider is testing and monitoring the infrastructure to meet legal and regulatory requirements.
Reaping the benefits of cloud
Organizations interested in reaping the benefits of cloud can best begin by understanding the security ramifications of a cloud deployment to their business, keeping in mind they can start small by deploying cloud in low-risk workload areas like email services. This easing-in process gives organizations valuable time to become familiar with cloud on a scale that's simpler to grasp and doesn't put them at increased security risk. And as familiarity of cloud and trust in the provider grows over time, companies can expand their use of cloud computing into other areas of business. By following this gradual path, companies can start enjoying the benefits of cloud in a way that's safe and secure.
Recent IBM news on “Smarter Cities” is invoking fond
memories of one of my favorite courses at Rensselaer
Polytechnic Institute: Politics
of design taught by Professor
Langdon Winner. Some of my favorite discussions during this course focused
on urban theory and planning and environmentally and ethically responsible
innovations. A few of my favorite personal readings included:
While innovations and technologies always fascinate
me, personally I’m most interested in the political, socio-cultural aspects of
Palmisano’s statement below:
“All the ways in which the world
works come together in our cities. They are the proverbial melting pot -- not
only for immigrants, but for systems, blending them together to engender new
forms of commerce, of culture, of science, of life and of society. Which is why
cities -- more than states, provinces or even nations -- are likely to be the
crucible for human progress and evolution in the coming century.”
Smart cities require smart people and deliberate thinking. How will SmarterCity designs and innovations enable and constrain our attempts
to build ethical, sustainable, humane systems and relationships? What are key
philosophical and socio-cultural issues to consider in this endeavor?
IBM customers: Join IBM on April 21 for the exciting SC Magazine awards presentation and dinner! RSVP to Karen Krieger at firstname.lastname@example.org if you would like to attend.
Date: April 21, 2009
Time: 6:30 pm – 10:30 pm
Where: Hilton San Francisco, 333 O’Farrell Street
We are very excited since IBM is a finalist in several categories:
Best Security Company!
Best Enterprise Firewall: IBM Proventia Network Intrusion Prevention as Layer II Firewall
Best Identity Management Solution: IBM Tivoli Access Manager for Enterprise Single Sign-On
Best Integrated Security Solution: IBM Proventia SiteProtector
Best Vulnerability Management Solution: IBM Proventia Network Enterprise Scanner
Best Web Application Security Solution: IBM Rational AppScan
Best Security Software Development Solution: IBM Rational AppScan Developer Edition
As part of the IT security industry's leading global awards program, the SC Awards U.S. was organized to honor the professionals, companies and products that help fend off the myriad security threats confronted in today's corporate world.
SC Awards hones in on the achievements of the guys and gals in the trenches, the innovations happening in the vendor and service provider communities, and the passionate work of government, commercial and nonprofits working to help the industry.
Today's post comes from Anne Lescher, Product Marketing Manager, IBM Security.
Many enterprises run their mission critical application workloads on their mainframe systems. They would like to centralize their application security controls, security policy enforcement, data protection, auditing reporting and compliance management for a consolidated view of security. They are looking for smarter security intelligence that will help them leverage the mainframe as their enterprise security hub.
IBM Security zSecure suite V1.13 consists of multiple individual components designed to help you administer your mainframe security server, monitor for threats, enforce policy compliance, audit usage and configurations, and assist in compliance management and audit reporting.
• IBM Security zSecure Admin, Visual, and CICS Toolkit provide administrative, provisioning, and management components that can significantly reduce administration time, effort, and costs, and help improve productivity and response time, as well as help reduce training time for new administrators.
• IBM Security zSecure Audit, Alert, and Command Verifier provide security policy enforcement, audit, monitoring and compliance management components. These offerings help ease the burden of compliance audits, can improve security and incident handling, and can increase overall operational effectiveness.
New Security zSecure suite V1.13 capabilities offer enhancements for DB2, CICS, and IMS application security auditing that:
• Automates security analysis of CICS and IMS transactions and programs
• Provides automated determination of which System Authorization Facility (SAF) classes are being used by each active IBM DB2, IBM CICS, or IBM IMS subsystem
• Enhances Access Monitor and allows you to improve data consolidation
• Allows annotating userid displays with data from external human resource files such as department and employee number
• Adds globalization enhancements to support international language support and auditing
• Allows addition of your own sensitivity classification, audit concern, and priority to data set names and general resources
• Supports currency with z/OS V1R13, ACF2 R14 and R15, CICS V4R2, and Top Secret R12, R14, and R15
• Extends integration with Communications Server and provides various interface improvements
It almost goes without saying, but, hey, I'll say it anyway...Security is top of mind for everyone these days, no matter your industry, no matter the size of your organization - and even on a personal level, too. You certainly don't have to be a security manager to be concerned about security, particularly internet security.
Case in point: Which of the following internet vulnerabilities is keeping you up at night these days?
Perhaps a more precise answer would be "All of the above plus a few more."
So, how can you stay ahead of these types of threats - understanding what the most critical and recurrent vulnerabilities are and what you can do to prevent them? One excellent source of emerging information is the IBM X-Force Research and Development team. For more than a dozen years, these security specialists have tracked well over 40,000 different vulnerabilities, from Trojan horses to malware to Web spoofing, and documented them in the world's largest and most comprehensive threat database.
The IBM X-Force researches and monitors the latest internet threat trends, develops security content for IBM customers, and helps advise customers and the general public on how to respond to emerging and critical threats. Twice a year, the team releases a detailed report discussing the latest security complexities. These reports are far more than just abstract information. They are actionable intelligence, designed to lead to more comprehensive security and a better business outcome. Take a look at the latest report.
For more information about how the IBM X-Force research can help your organization (and perhaps even keep you from losing sleep worrying about security threats), check out this Service Management in Action article.
Signing off for this week,
Your friendly roving Integrated Service Management reporter
When I saw Tom Cross give a talk at Innovate 2010 in June, I was first struck with the nonchalance with which he spoke of the black market business of Internet data. I could not have been more intrigued if I were watching a movie adapted from a John Grisham novel. He seemed to have some emotional distance from what creeps most of us out about our mail. And I’m not even talking about email. I mean the good old-fashioned USPS mail. I KNOW I am not the only one who has worn out a few paper shredders thanks to Citibank, Chase, and the like.
The second thing that hijacked my thought train for more than a few moments was how network vulnerabilities are created for the explicit purpose of learning cyber criminal behavior. Like signing up for as much spam as you can. Sure it makes sense to me now. But I am still vaguely uncomfortable talking publicly about threat and attacks. It seems akin to Batman and the Joker building websites to promote their plans to outsmart the other. What was I not getting? By now I was considering slipping quietly out of the room to silence the voice in my head saying I had been foolish, very, very foolish in my confidence as a clever and vigilant consumer of Internet Things.
Realizing that I had some mental catching up to do, I stayed for the lasting impression that could keep me awake at night: just how easy it is to steal digital data. As I struggled with the impartial irony of how enormous yet simple a cat and mouse game Web App security is, visions of Tom and Jerry danced in my boggled brain.
Welcome to the IBM Service Management blog.A variety of authors who represent different
parts of IBM will discuss a range of Service Management topics such as service
availability and performance, green IT, IT asset and financial management, IT
governance, service delivery and process, storage management, SOA management,
enterprise asset management, and service assurance for service providers.
We'll discuss industry trends and happenings, analyst
perspectives, new product and solution announcements, support and services
offerings, upcoming events, helpful resources, and heroes in the broader IBM
Service Management network. This blog provides multi-directional communication
with the public, and we encourage and look forward to your feedback, thoughts,
and questions. For extended sharing, check out our new IBM Service Management community.
I'm Tiffany Winman, the
IBM Service Management community and social media program manager, and my blog
topics tend to focus on communities, people, companies, heroes, and stories in
the broader Service Management and Tivoli "ecosystem" and the use of innovative social
technologies to facilitate online social networking and collaboration. When I'm
not blogging on group blogs such as Service Management, Tivoli, Pulse, and Web 2.0 Goes to Work,
you can join me in riveting conversation ;) on my individual blog.
us know if you have any questions or we can assist in any way.
It’s Good Friday, and it not only has been a good, but a GREAT week. Did you hear? IBM made the list of Top 50 social brands for March 2009: “The Social Radar Top 50 measures the most social brands by the number of unique topics of conversation. These brands are top of mind for consumers and bloggers today.”
If you haven’t noticed by now. IBM’s presence is growing more and more in the social media arena. Below are some of the hot topics lighting up this space this month.
Ewwww, that almost sounds as decadent as eating chocolate. If you’re into networking with SOA strategists and architects, learning about real-life examples and benefits of SOA in action, then this event is for you. Dressed in character as an Imperial Servant, an IBM virtual guide will lead a tour of Virtual Worlds and share how SOA can solve architectural challenges, adding immediate value and business flexibility.
IBM will be showcasing many of its innovative security solutions at RSA conference and hosting many keynote sessions, pedestals, demos, customer appreciation events, and more. You can find out more in the following ways:
Today's post comes from Vidhi Desai, Market Manager, IBM Security Solutions.
Today’s business environment calls for information sharing at an unprecedented scale. Sensitive information is shared between organizations, end consumers and even business partners. The biggest challenge that organizations face in doing so, is how to ensure that sensitive information is securely shared with different parties and that the right people are accessing the data. With the adoption of cloud and Software as a service deployment models, ensuring secure access is even more critical and challenging.
Consider a scenario where a government agency needs to share information with different agencies, local governments, citizens or even with other business entities (eg. Revenue agency that needs to share information with citizens and other entities like a tax preparation service). If one of the entities is operating in a public cloud environment, its becomes critical for government to ensure that right person is accessing the right data without sacrificing privacy, security or scalability (party requesting information really is the government revenue agency or tax preparer they claim to be).
Over the past couple years, we have seen how the US government has taken steps to ensure secure sharing of data between agencies with regulations such as FISMA, which was introduced in 2002, bringing attention to the critical nature of cyber security and its impact on national security.
Identity is at the core of any information sharing transaction. Hence whenever an individual attempts to access secure online sites or web portals, their identity has to be verified to ensure they are authorized to view that data. Additionally from the end user or citizen’s perspective, they should be able to set up their identity once and then log in to multiple systems without having to log in multiple times.
Federated identity management is the solution which enables multiple applications to share user credentials based on trust. This is especially critical in supporting cloud deployments for secure information sharing across private, public and hybrid clouds. With federated SSO, users can log on to the sites of multiple businesses and organizations by using the same user id and password, hence gaining a seamless and secure entry to multiple applications.
Tivoli Federated identity manager from IBM is an access management solution that provides web and federated single sign on to end users across multiple applications resulting in improved user experience. Tivoli Federated Identity Manager enables central management of access, enhanced user productivity and facilitates trust by delivering single sign on across separately managed infrastructure domains, both within an organization and across organizations.
Personally, I never really got hooked on American Idol, but next month IBM is releasing a Software Development reality TV series at the 2009 Rational Software Conference that I'd love to watch! Yup, I'm a nerd. :) This stuff fascinates me. I'm looking forward to the drama, laughs and intrigue. Get an overview of the new reality TV series and view a trailer with the videos below:
Overview: IBM Rational's Walker Royce discusses the Reality TV series as he fills you in on some of what you can expect to see at RSC 2009.
If you are friends of Tivoli experts on Twitter, you may see #tivtour tweets quite a bit this week. See my recent write up on this topic to learn more about the mystery event. Also, see Twitter Search for #tivtour on Twazzup
for a running stream of related tweets and photos. The Tivoli Tour runs
at many IBM locations this week and in Brazil on May 29. So you can
expect to see more Twitter conversations in the near future.
Wait!!! you say. What 's this about new product announcements? Well, of course, that's always the big news at a conference, and this installment of RSA was no different. Welcome IBM Network Intrusion Protection System (IPS) GX7800 to the IBM Security Solutions portfolio! Designed to help enterprises meet the challenges of an increasingly sophisticated and rapidly changing threat landscape, this new offering helps organizations protect their data and infrastructure from unauthorized access and attacks, without compromising on the performance and availability of business-critical applications. Read the press release to get the scoop on IBM Network IPS GX7800.
As you can see, RSA 2011 is proving to be a great lead-in to Pulse 2011, coming to Las Vegas February 27-March 2, where IBM Security will be front and center throughout the conference. In other words, the IBM Security Solutions story is to be continued...
Signing off for now, Your friendly roving Integrated Service Management reporter
Last Tuesday, we debuted new releases to the IBM Tivoli Access Management family with an announcement letter (210-159).
I suggested that we take the products down to the local Sears for a "family picture." We'd go for a tropical theme (to commemorate the ending of Lost) and maybe even let IBM Tivoli Unified Single Sign-On hold the teddy bear.
I was outvoted. I won't say by how much. But I was outvoted.
Instead, we did something a heck of a lot better. It's something that I retweeted last week.
As customers are driving new business initiatives, IBM can provide the secure access they need. Typical access requirements we're hearing from our customers are:
Enabling secure access to new service delivery platforms like cloud and SOA
Protecting access to critical data across the organization
Enabling secure access in complex portal and Web application environments
All of this is provided in detail on the Enhanced Security website, where there is more information on these initiatives. If you like what you read, contact your IBM sales representative or business partner.
And, no. See above, I do not have wallet-sized pictures of the Tivoli Security Policy Manager...maybe next time...