Wait!!! you say. What 's this about new product announcements? Well, of course, that's always the big news at a conference, and this installment of RSA was no different. Welcome IBM Network Intrusion Protection System (IPS) GX7800 to the IBM Security Solutions portfolio! Designed to help enterprises meet the challenges of an increasingly sophisticated and rapidly changing threat landscape, this new offering helps organizations protect their data and infrastructure from unauthorized access and attacks, without compromising on the performance and availability of business-critical applications. Read the press release to get the scoop on IBM Network IPS GX7800.
As you can see, RSA 2011 is proving to be a great lead-in to Pulse 2011, coming to Las Vegas February 27-March 2, where IBM Security will be front and center throughout the conference. In other words, the IBM Security Solutions story is to be continued...
Signing off for now, Your friendly roving Integrated Service Management reporter
When I saw Tom Cross give a talk at Innovate 2010 in June, I was first struck with the nonchalance with which he spoke of the black market business of Internet data. I could not have been more intrigued if I were watching a movie adapted from a John Grisham novel. He seemed to have some emotional distance from what creeps most of us out about our mail. And I’m not even talking about email. I mean the good old-fashioned USPS mail. I KNOW I am not the only one who has worn out a few paper shredders thanks to Citibank, Chase, and the like.
The second thing that hijacked my thought train for more than a few moments was how network vulnerabilities are created for the explicit purpose of learning cyber criminal behavior. Like signing up for as much spam as you can. Sure it makes sense to me now. But I am still vaguely uncomfortable talking publicly about threat and attacks. It seems akin to Batman and the Joker building websites to promote their plans to outsmart the other. What was I not getting? By now I was considering slipping quietly out of the room to silence the voice in my head saying I had been foolish, very, very foolish in my confidence as a clever and vigilant consumer of Internet Things.
Realizing that I had some mental catching up to do, I stayed for the lasting impression that could keep me awake at night: just how easy it is to steal digital data. As I struggled with the impartial irony of how enormous yet simple a cat and mouse game Web App security is, visions of Tom and Jerry danced in my boggled brain.
What is IBM Tivoli Software? We know you want the short version. Steven Wright of Tivoli Software breaks it all down for us in less than 7 minutes on a white grease board. Check it out while you have your morning coffee, afternoon tea, or while you get your miles in on the treadmill or trail with your smart phone. Then visit ibm.com/software/tivoli for more details on how IBM Tivoli Software can help you run a smarter business. .
IBM just introduced new software and services to help build security into the design of new applications instead of adding it later as an afterthought.
New technologies like cloud computing and virtualization are making organizations more efficient and competitive. These new technologies are also adding increased complexity and risk forcing businesses to find new ways to deal with compliance, risk management and data protection.
The new security software and services announced by IBM help organizations incorporate security into the initial design of applications, avoiding costly fixes down the road. The new offerings include:
Access Management: Software that can help organizations provide users with secure access to their servers, applications and environments, across new service delivery platforms, including cloud computing;
Security Testing: Software that enables businesses to automatically test source code and identify potential security and compliance risks during the earliest stages of software development;
Source Code Assessment Services: Services that help clients assess their application security, identify vulnerabilities and provide recommendations for resolution;
Secure Engineering Framework: A proven blueprint for building and deploying secure software.
Last Tuesday, we debuted new releases to the IBM Tivoli Access Management family with an announcement letter (210-159).
I suggested that we take the products down to the local Sears for a "family picture." We'd go for a tropical theme (to commemorate the ending of Lost) and maybe even let IBM Tivoli Unified Single Sign-On hold the teddy bear.
I was outvoted. I won't say by how much. But I was outvoted.
Instead, we did something a heck of a lot better. It's something that I retweeted last week.
As customers are driving new business initiatives, IBM can provide the secure access they need. Typical access requirements we're hearing from our customers are:
Enabling secure access to new service delivery platforms like cloud and SOA
Protecting access to critical data across the organization
Enabling secure access in complex portal and Web application environments
All of this is provided in detail on the Enhanced Security website, where there is more information on these initiatives. If you like what you read, contact your IBM sales representative or business partner.
And, no. See above, I do not have wallet-sized pictures of the Tivoli Security Policy Manager...maybe next time...
It almost goes without saying, but, hey, I'll say it anyway...Security is top of mind for everyone these days, no matter your industry, no matter the size of your organization - and even on a personal level, too. You certainly don't have to be a security manager to be concerned about security, particularly internet security.
Case in point: Which of the following internet vulnerabilities is keeping you up at night these days?
Perhaps a more precise answer would be "All of the above plus a few more."
So, how can you stay ahead of these types of threats - understanding what the most critical and recurrent vulnerabilities are and what you can do to prevent them? One excellent source of emerging information is the IBM X-Force Research and Development team. For more than a dozen years, these security specialists have tracked well over 40,000 different vulnerabilities, from Trojan horses to malware to Web spoofing, and documented them in the world's largest and most comprehensive threat database.
The IBM X-Force researches and monitors the latest internet threat trends, develops security content for IBM customers, and helps advise customers and the general public on how to respond to emerging and critical threats. Twice a year, the team releases a detailed report discussing the latest security complexities. These reports are far more than just abstract information. They are actionable intelligence, designed to lead to more comprehensive security and a better business outcome. Take a look at the latest report.
For more information about how the IBM X-Force research can help your organization (and perhaps even keep you from losing sleep worrying about security threats), check out this Service Management in Action article.
Signing off for this week,
Your friendly roving Integrated Service Management reporter
Recent IBM news on “Smarter Cities” is invoking fond
memories of one of my favorite courses at Rensselaer
Polytechnic Institute: Politics
of design taught by Professor
Langdon Winner. Some of my favorite discussions during this course focused
on urban theory and planning and environmentally and ethically responsible
innovations. A few of my favorite personal readings included:
While innovations and technologies always fascinate
me, personally I’m most interested in the political, socio-cultural aspects of
Palmisano’s statement below:
“All the ways in which the world
works come together in our cities. They are the proverbial melting pot -- not
only for immigrants, but for systems, blending them together to engender new
forms of commerce, of culture, of science, of life and of society. Which is why
cities -- more than states, provinces or even nations -- are likely to be the
crucible for human progress and evolution in the coming century.”
Smart cities require smart people and deliberate thinking. How will SmarterCity designs and innovations enable and constrain our attempts
to build ethical, sustainable, humane systems and relationships? What are key
philosophical and socio-cultural issues to consider in this endeavor?
If you are friends of Tivoli experts on Twitter, you may see #tivtour tweets quite a bit this week. See my recent write up on this topic to learn more about the mystery event. Also, see Twitter Search for #tivtour on Twazzup
for a running stream of related tweets and photos. The Tivoli Tour runs
at many IBM locations this week and in Brazil on May 29. So you can
expect to see more Twitter conversations in the near future.
This week IBM kicked off the Impact conference from May 3 - 8 in Las Vegas at the Venetian Resort Hotel Casino. In addition to focusing on Smart SOA and WebSphere, themes will concentrate on Smart, Economic Climate, Cost Optimization & Agility, Cloud computing, and Service Management.
The Impact conference is using social media in some of the most creative ways I’ve seen at IBM yet! They have a cool social media game where you can earn points for participating in Twitter, blogs, videos, etc. Hmm, I wonder how many points I can earn? Check out these links to learn more:
IBM Service Management is a big theme at the conference since Smart SOA makes business processes easy to change, but those changes create the demand for a Dynamic Infrastructure to be adaptive and support those business processes. IBM Service Management anticipates how business processes shift their pressures on the infrastructure, enabling the infrastructure to adapt quickly while enabling smart choices for a smarter world.
As Robert LeBlanc said at Pulse 2008, you can have Service Management without SOA, but you can’t have SOA without Service Management. Al Zollar, IBM General Manager of Tivoli Software, will give a keynote on May 5 during the Impact general session, discussing how a smarter planet requires a dynamic infrastructure based on IBM Service Management capabilities.Expect to hear announcements on ServiceManagementCenter for Cloud Computing, ITCAM for SOA Platform, and IBM Service Management for Healthcare.
IBM Service Management has the following activities at Impact:
18 IBM Service Management experts and executives will be available for one-on-one meetings with clients.
Smart SOA Service Management in the IBMSOAFitnessCenter.
Two pedestals in the Expo:
-Service Management (ITCAM for Transactions | OMEGAMON XE for Messaging, TBSM | ITCAM for SOA Platform, TUAM, ITCAM for WebSphere)
-Security Management (TSPM/TFIM)
Service Management speaking sessions include:
TSM - Managing the Virtual Enterprise
Rob Goodling, IBM
Venetian - Murano 3305
TSM - SOA Management on IBM System z®,
Divyesh Vaidya, IBM
Venetian - Murano 3203
BIA - The Last Mile to SOA Success: Service Management,
Casey Plunkett, IBM
Venetian - Galileo 1003
BID - Transforming Your Business Through BPM - Four Primary Use-Cases ,
Janelle Hill, Gartner, Inc , Kramer Reeves, IBM
Venetian - Galileo 904
TMC - Managing your IBM WebSphere MQ and IBM WebSphere Message Broker Environment
Jim Palistrant, IBM
Venetian - Delfino 4105
TSM - Lab: Monitoring Transactions in SOA Infrastructure,
Pradeep Nambiar, IBM, Jim Palistrant, IBM
Venetian - Marcello 4403
TMC - Meet the Experts and Demo for WebSphere MQ and Message Broker management
Divyesh Vaidya, IBM
Venetian - Tech Zone – Messaging
TSM - Manage your SOA Environment with IBM Tivoli
Todd Kindsfather, IBM and Jim Palistrant, IBM
Venetian - Palazzo D
BIS - Extending SOA Principles to the Infrastructure for Greater Flexibility and Cost Effectiveness
Kristin Hansen, IBM and Bruce Otte, IBM
Venetian - Galileo 907
BIS - Creating Secure and Compliant SOA Environments
Casey Plunkett, IBM and Ravi Srinivasan, IBM
Venetian - Galileo 906
TSM - Service Automation: Key To Exploiting and Managing the Virtual Enterprise
When IBM first kicked off the Dynamic Infrastructure announcement at Pulse 2009 conference, we heard some rumblings on whether Dynamic Infrastructure was just another executive buzzword or if there was real meat behind "the concept."
Doug McClure summarized the feeling well in his blog: “While this is great for executive level folks, I think we needed to drive this message into consumable and actionable things that lower level technical attendees could take back to their companies. They may be the ones who need to execute and show how previous or planned investments could help their company become smarter and more dynamic.”
After IBM’s announcement yesterday on new Dynamic Infrastructure offerings, critics will be hard-pressed to wonder whether Dynamic Infrastructure is actionable.Not only did IBM announce new products and services in the areas of Information Infrastructure, Virtualization, Service Management, and Energy Efficiency, but they also demonstrated how these solutions are helping three of our clients--the Taiwan High Speed Rail Corporation, Tricon Geophysics and the United States Bowling Congress--build new, more dynamic infrastructures to help reduce costs, improve service and manage risk.
A key piece of the announcement is the IBM Service Management Center for Cloud Computing, which now includes new IBM Tivoli Identity and Access Assurance, IBM Tivoli Data and Application Security, and IBM Tivoli Security Management for z/OS, for Cloud environments. I don’t know about you, but all that’s more meat than this vegetarian can handle. :)
To continue driving home the Dynamic Infrastructure success, IBM is sponsoring a variety of events for the public to learn more. Register for a free, local Pulse Comes to You event to see how Service Management is a key component for enabling a DyanmicInfrastructure for a Smarter Planet.
This post is dedicated specifically to IBM Business Partners, but we encourage all security professionals to help make our world a better place to live. So read on.
If you haven’t heard by now, IBM will be talking security at the place where “the world talks security” next week—the RSA 2009 conference. On April 23, Brian Truskowski, GM of Internet Security Systems (ISS), will provide an RSA keynote on “Securing the Smarter Planet.” His talk will address how security professionals are in a key position to enable effective change to create a smarter planet as our world and systems become more instrumented, interconnected, and intelligent.
As an IBM Business Partner, you are critical to the success of using innovative security solutions to enable a smarter planet. We'd like you to join us in shaping this conversation and activity in new IBM Security social media channels on ibm.com, LinkedIn, Twitter, and YouTube.
Use this presentation to get a quick overview of these new channels and how you can help.
Personally, I never really got hooked on American Idol, but next month IBM is releasing a Software Development reality TV series at the 2009 Rational Software Conference that I'd love to watch! Yup, I'm a nerd. :) This stuff fascinates me. I'm looking forward to the drama, laughs and intrigue. Get an overview of the new reality TV series and view a trailer with the videos below:
Overview: IBM Rational's Walker Royce discusses the Reality TV series as he fills you in on some of what you can expect to see at RSC 2009.
IBM customers: Join IBM on April 21 for the exciting SC Magazine awards presentation and dinner! RSVP to Karen Krieger at firstname.lastname@example.org if you would like to attend.
Date: April 21, 2009
Time: 6:30 pm – 10:30 pm
Where: Hilton San Francisco, 333 O’Farrell Street
We are very excited since IBM is a finalist in several categories:
Best Security Company!
Best Enterprise Firewall: IBM Proventia Network Intrusion Prevention as Layer II Firewall
Best Identity Management Solution: IBM Tivoli Access Manager for Enterprise Single Sign-On
Best Integrated Security Solution: IBM Proventia SiteProtector
Best Vulnerability Management Solution: IBM Proventia Network Enterprise Scanner
Best Web Application Security Solution: IBM Rational AppScan
Best Security Software Development Solution: IBM Rational AppScan Developer Edition
As part of the IT security industry's leading global awards program, the SC Awards U.S. was organized to honor the professionals, companies and products that help fend off the myriad security threats confronted in today's corporate world.
SC Awards hones in on the achievements of the guys and gals in the trenches, the innovations happening in the vendor and service provider communities, and the passionate work of government, commercial and nonprofits working to help the industry.
It’s Good Friday, and it not only has been a good, but a GREAT week. Did you hear? IBM made the list of Top 50 social brands for March 2009: “The Social Radar Top 50 measures the most social brands by the number of unique topics of conversation. These brands are top of mind for consumers and bloggers today.”
If you haven’t noticed by now. IBM’s presence is growing more and more in the social media arena. Below are some of the hot topics lighting up this space this month.
Ewwww, that almost sounds as decadent as eating chocolate. If you’re into networking with SOA strategists and architects, learning about real-life examples and benefits of SOA in action, then this event is for you. Dressed in character as an Imperial Servant, an IBM virtual guide will lead a tour of Virtual Worlds and share how SOA can solve architectural challenges, adding immediate value and business flexibility.
IBM will be showcasing many of its innovative security solutions at RSA conference and hosting many keynote sessions, pedestals, demos, customer appreciation events, and more. You can find out more in the following ways: