IBM recently announced that it has completed the acquisition of Trusteer, Ltd., a privately held leading provider of software that helps protect organizations against fraud and advanced security threats. On August 15, IBM announced that it had entered into a definitive agreement to acquire Trusteer. Financial terms were not disclosed.
"The acquisition of Trusteer builds on more than 40 years of IBM’s rich contribution to the security space,” said Brendan Hannigan, General Manager, IBM Security Systems. “Trusteer will extend our data security capabilities further into the cloud, mobile and endpoint security space. This acquisition helps provide our clients with comprehensive network and endpoint anti-malware solutions.”
Also announced on August 15, IBM is forming a cybersecurity software lab in Israel that will bring together more than 200 Trusteer and IBM researchers and developers to focus on mobile and application security, advanced threat protection, malware, counter-fraud, and financial crimes. This lab is an addition to IBM’s existing research and development facilities in Israel.
IBM Placed in Leaders Quadrant by Leading Analyst Firm for IBM MobileFirst
IBM recently announced that Gartner has positioned IBM as a Leader in the Magic Quadrant for Mobile Application Development Platforms.[i]
The new report places IBM in the Leaders Quadrant, as measured by completeness of vision and execution ability of IBM Worklight, IBM’s mobile application development platform. Acquired by IBM in February 2012, IBM Worklight is a member of the IBM MobileFirst family of solutions. In just one year, IBM has advanced from the Niche Quadrant to the Leaders Quadrant.
This announcement follows a string of strong showings for IBM MobileFirst services and software capabilities, including IBM Worklight, in Gartner Magic Quadrants this summer. In July, IBM was named a Leader in the Gartner Magic Quadrant for Application Security Testing.[ii] IBM is also named a visionary in Magic Quadrants for Managed Mobility Services[iii] and Mobile Device Management[iv].
According to the report, as this market reaches early mainstream status, Gartner expects Leaders to be profitable, and to present lower risk and consistently high project results as the market begins to consolidate and competition grows. Leaders must not only be good at cross-platform development and deployment, but also have a good vision of the multichannel enterprise, support for standards, a solid understanding of IT requirements, and scalable channels and partnerships to market. Leaders must provide platforms that are easy to purchase, program, deploy and upgrade. Leaders can focus primarily on either business-to-consumer or business-to-enterprise, but vision and execution scores are higher for vendors that can cover both use cases today.
Vulnerability management, say hello to Security Intelligence
IBM recently announced an integrated security intelligence solution that helps organizations identify key vulnerabilities in real-time, while reducing total cost of security operations.
IBM QRadar Vulnerability Manager gives security officers a prioritized view across their entire network, helping them to quickly strengthen and fortify their defenses. By aggregating vulnerability information into a single view, security teams can see the results from multiple network, endpoint, database or application scanners where it can be quickly reviewed and managed.
In this video, Marc van Zadelhoff, Kevin Skapinetz, Sandy Bird and Brendan Hannigan talk about the introduction of a new approach to vulnerability management, one built around the principles of Security Intelligence.
IBM Accelerates Cloud Computing on System z with Acquisition of CSL International
IBM recently announced a definitive agreement to acquire CSL International, a leading provider of virtualization management technology for IBM’s zEnterprise system. CSL International is a privately held company headquartered in Herzliya Pituach, Israel.
A strategic investment in the System z portfolio, the acquisition deepens the consolidation and cloud capabilities by offering simplified management of the virtualization environment. CSL International’s CSL-WAVE software enables companies to monitor and manage their z/VM and Linux on System z environments using a powerful and easy-to-use interface. The software provides drag and drop simplicity to instantly create, discover, visualize and connect virtual servers to resources allowing clients to free up more skilled staff to address other business challenges.
The zEnterprise System enables clients to host the workloads of thousands of commodity servers on a single system for simplification, improved security and cost reduction. The combination of IBM and CSL International technologies will allow clients to manage all aspects of z/VM and Linux on System z virtualization, including CPU, memory, storage, and network resources.
IBM recently announced that it has completed the acquisition of SoftLayer Technologies Inc., a privately held cloud computing infrastructure company based in Dallas, Texas. On June 4, IBM announced that it had entered into a definitive agreement to acquire SoftLayer. Financial terms were not disclosed.
SoftLayer joins IBM’s new cloud services division, which combines SoftLayer with IBM SmartCloud into a global platform. The new division, led by General Manager James Comfort, will provide a broad range of choices to both IBM and SoftLayer clients, ISVs, and channel and technology partners.
“Cloud computing provides a profound and transformative change in business and government,” said Comfort at IBM. "With SoftLayer in IBM’s portfolio, it will be easier and faster for organizations to adopt game-changing cloud services.”
SoftLayer will enable IBM to deliver an industry first: marrying the security, privacy and reliability of private clouds with the economy and speed of a public cloud. SoftLayer offers a breakthrough capability that provides a cloud "on ramp" for born-on-the-web companies, government and the Fortune 500.
IBM MobileFirst Helps Organizations
Strengthen App Security
IBM recently announced
security software that helps organizations proactively reduce the security risk
to iOS enterprise apps. Clients will be able to build security testing into the
initial design of mobile apps so that vulnerabilities can be detected early in
the development process, before being deployed to customers or employees.
Today's announcement further expands the IBM MobileFirst portfolio, which
marries deep expertise with a comprehensive set of mobile software and
According to Gartner,
more than 45.6 billion mobile apps were downloaded in 2012. As the rate of app
use on mobile devices increases, securing smartphones and other endpoint
devices is a top priority for organizations and Chief Information Security
Officers. With the proliferation of consumer and enterprise mobile apps,
organizations cannot always control or restrict the apps installed on user
devices, so they must test how apps send and save data. IBM’s new security
software can automatically identify where data enters and leaves a mobile app,
helping to prevent mobile data leakage.
AT&T and IBM Transform the App
Experience with IBM MobileFirst
IBM and AT&T Inc.
recently announced an expanded relationship to provide software developers with
a set of powerful new tools to create and deploy next generation mobile apps.
Customers benefit from access to secure, high quality apps, including those
featuring advanced speech recognition and mobile payment capabilities, which
can transform how they engage in everyday activities.
AT&T has been expanding
its network capabilities and increasing access to research from AT&T Labs
across a range of mobile development platforms, including IBM Worklight. Part
of the IBM MobileFirst Application and Data Platform, IBM Worklight is an open,
comprehensive and advanced mobile app platform for mobile devices.
Now, the AT&T API
Platform, featuring IBM Worklight Adapters, will enable the more than 31,000
members of the AT&T Developer Program to quickly create and securely deploy
enterprise apps that improve subscriber engagement and customer loyalty. With
these adapters that support AT&T’s ecosystem of APIs including those for
speech, SMS, device capabilities, notary management and payment, developers can
quickly and securely create rich, business-ready apps across a variety of
platforms including iOS, Android and Windows.
"AT&T is committed to the success of our rapidly growing developer community. By expanding our platform's reach and making our API toolkit available on an expanding number of platforms, including IBM Worklight, our developers have the information, tools, and resources to continue to build great things and contribute to the mobile ecosystem in meaningful new ways", said Carlton Hill, vice president, developer services, AT&T.
IBM Unveils the Most Comprehensive Mobile Portfolio for Global Businesses: IBM MobileFirst
IBM recently unveiled IBM MobileFirst, the most
comprehensive mobile portfolio that combines security, analytics and app
development software, with cloud-based services and deep mobile expertise.
Using IBM MobileFirst solutions, businesses can now streamline everything from
the management of employee mobile devices, to the creation of a new mobile commerce
app that will transform their entire business model.
This move by IBM builds off
of its experience helping nearly 1,000 customers become mobile enterprises, and
takes advantage of its thousands of mobile experts and 270 patents in wireless
innovations. Additionally, IBM has made 10 mobile-related acquisitions in the
past four years alone.
IBM is also announcing an
expanded relationship with AT&T to provide developers with tools to create
faster, richer mobile apps and services for customers. For instance,
organizations can now quickly incorporate payment and messages into their
“To date, mobile computing
has been dominated by discussions of new smartphones, operating systems, games
and apps,” said Robert LeBlanc, senior vice president,
middleware software, IBM. “But enterprises have yet to tap into the potential
of mobile business. Just as the Internet transformed the way we bank, book
vacations and manage our healthcare, mobile computing is also transforming
industries. As these devices become ingrained in everything that we do,
businesses are now in the palms of their customers’ hands. IBM MobileFirst is
designed to make the transformation to becoming a mobile enterprise a reality.”
IBM Announces Breakthrough with
Combination of Security Intelligence and Big Data
Advanced attacks, widespread
fraud and the pervasive use of social media, mobile and cloud computing are
drastically altering the security landscape. As organizations increasingly need
to manage Big Data, the way that corporate data needs to be protected is
To aid in the detection of
stealthy threats that can hide in the increasing mounds of data, IBM recently
announced IBM Security Intelligence with Big Data, combining leading security
intelligence with big data analytics capabilities for both external cyber
security threats and internal risk detection and prevention. IBM Security
Intelligence with Big Data provides a comprehensive approach that allows
security analysts to extend their analysis well beyond typical security data
and to hunt for malicious cyber activity.
This new solution combines
real-time correlation for continuous insight, custom analytics across massive
structured data (such as security device alerts, operating system logs, DNS
transactions and network flows) and unstructured data (such as emails, social
media content, full packet information and business transactions), and forensic
capabilities for evidence gathering. The combination helps organizations
address the most vexing security challenges, including advanced persistent
threats, fraud and insider threats.
AT&T and IBM Create
Breakthrough Global Cloud Service for Businesses
Innovative Technology and Private Networking Are
Combined to Create Highly-Secure Shared Cloud
AT&T* and IBM recently announced a business
agreement to deliver a highly secure, first-of-its-kind “network-enabled” cloud
service that uses private networks rather than the public Internet.
The companies are combining AT&T virtual private
networking and IBM SmartCloud Enterprise+ cloud capabilities with breakthrough
technology from AT&T Labs to create a new, fast and highly-secure shared
cloud service. Targeted to Fortune 1000 companies globally, the service will be
offered in early 2013 as a powerful new option for clients who are deploying
cloud solutions that demand high levels of security and availability. Many
businesses often cite security as a key inhibitor to cloud computing
Grow your value by deploying your private or hybrid cloud with IBM
SmartCloud Foundation – a workshop
September 13th – 14th
Location: IBM Montpellier, France
An event for European Consultants and
Based on the same reliable technology as our
public cloud offerings, IBM has developed a comprehensive product portfolio for
building your own private or hybrid cloud. IBM SmartCloud Foundation features a
range of cloud architecture components including physical infrastructure,
virtual infrastructure, management, middleware, integration, security and
consulting services. These components offer unparalleled time-to-market, integration
and management capabilities.
This one-and-a-half day workshop, targeted
specifically to Consultants & Systems Integrators will go into the details
of IBM SmartCloud Foundation solutions to optimize your Cloud implementation.
We look forward to meeting you in Montpellier. Limited
seats available, please register via your IBM Representative or Technical
IBM Introduces New Class
of Network Security Appliance to Help Control Social Media and Web Browsing
As employee access to the Web has become
ubiquitous, enterprises are struggling with massive increases in malware as
well as Advanced Persistent Threats (APTs), which can compromise proprietary
data. Many of today's security solutions often offer limited visibility and
control over network activity, which can put the company at risk.
To help clients proactively protect against
evolving security threats, including those posed by social media sites and
malicious websites, IBM recently announced a new class of network security
appliance that delivers a more granular view of a company’s security posture
and a simplified security management interface. This new next-generation
intrusion prevention appliance helps clients address advanced attacks targeting
their organization, providing visibility into exactly what applications are
being used on the network, where users are going on the Web, with the ability
to monitor and control this activity, which can result in improved security and
reduced operational costs.