Security without Boundaries- Analysts respond to IBM Security product release
Melissa Stevens 270005B76W MELISSAS@US.IBM.COM | | Tags:  cloud-security security-intelligence mobile-security security data-security ibm-security
0 Comments | 2,640 Visits
This post is written by John Burnham, Strategic Communications for IBM Security.
Last week, IBM Security announced the release 10 new products designed to help customers resolve security challenges as they leverage cloud services, mobility, and Big Data analytics. This is a major milestone, as it is the largest release of new and improved products since the Security Systems division was created just one year ago.
At the risk of sounding like I’m bragging, I wanted to share with you what some leading analysts have said about our news:
"Within relatively few years compared to some security leaders, IBM has built a remarkably comprehensive portfolio of security products and services. Its longstanding leadership in identity and access management and landmark research in areas such as cryptography was significantly augmented in network security, threat research and security services. The company has added market-leading assets in application security, highly flexible endpoint management and, most recently, security information and event management (SIEM). When security intelligence is combined with resources from Cognos and InfoSphere Streams in information management, to assets such as Algorithmics, SRD and i2 in risk management and intelligence, the IBM portfolio is both one of the most dominant, as well as one of the most forward-looking, in the industry." --Scott Crawford, Enterprise Management Associates
“With the formation of divisions focused on security software and services, IBM now provides an end-to-end product and services portfolio and is quickly establishing a position of security technology leadership.”
“Since the formation of IBM’s new Security Systems division late in 2011, IBM has moved with alacrity to integrate its once dispersed and highly fragmented security portfolio and to create greater value for its customers through that integration.”
As perimeters become optimized for data security the need for integrated analytics becomes paramount due to the massive amounts of data being collected. Whether for compliance, defending against APTs, data loss, fraud, or all of the above, applying security intelligence to what could be the security industry’s largest portfolio of products, services and solutions, is gaining traction. Stay tuned for more, a lot more!
Watch this video to learn more about "Security without Boundaries".