Company News


1 New Orchard Rd., Armonk, NY, 10504, US

  • 914-499-1900
  • 800-426-4968

Mitchell Derman
Phone: 571-216-8712
E-mail this person

Share Like Tweet Add Email

Latest New Product News from
IBM (Corporate Headquarters)

Computer Hardware & Peripherals

Mainframe Computer processes 2.5 billion transactions per day.

January 19, 2015

Enabling transactions that are persistent, protected, and auditable from end-to-end, Model Z13 adds assurance as mobile transactions grow. Unit speeds real-time encryption of mobile transactions to help protect transaction data and ensure response times consistent with positive customer experience. With embedded analytics that provide real-time insights on all transactions, mainframe helps guarantee ability of client to run real-time fraud detection on 100% of their business transactions. Read More


Mobile Law Enforcement App delivers data to officers in field.

December 4, 2014

With i2 COPLINK Everywhere, law enforcement officials can access real-time data while they are in field — away from vehicle or office terminals. Officers can validate information and compare partial observations, such as vehicle license plates, distinguishing markings, known affiliations, and recent addresses during ongoing investigation. Photo match and mug shot identification provide crucial information during interviews with victims, witnesses, and others at scene. Read More


Enterprise Intelligence Analytics Software fights cybercrime.

November 4, 2014

Designed to uncover hidden criminal threats, i2 Enterprise Insight Analysis can find non-obvious relationships masked within hundreds of terabytes of data and trillions of objects in seconds. Solution unravels hidden connections that can be divided by as many as 6 degrees of separation between disparate sources—from corporate records and social media chatter to data accessed by remote sensors. As developments unfold, EIA proactively alerts analysts to new related abnormalities at speed of attack. Read More


Security Software targets travel and transportation industry.

November 3, 2014

With Analytics Software and Services, companies in Travel and Transportation industry can mitigate IT security risks and address advanced threats and data compromising incidents. QRadar Security Intelligence Platform creates unified architecture that integrates security information, anomaly detection, and incident forensics, as well as event, log, and vulnerability management. Optimizing web and mobile application security, Security AppScan strengthens regulatory compliance. Read More

Computer Hardware & Peripherals

Big Data Servers offer alternative to commodity servers.

October 9, 2014

Built on OpenPOWER stack, IBM Power S824L Servers give clients ability to run data-intensive tasks on POWER8 processor while offloading other compute-intensive Big Data workloads to GPU accelerators, which are capable of running millions of data computations in parallel. With optimized computing performance, banks can better analyze risk, energy companies can precisely locate oil reserves, and scientists can more quickly identify cures for diseases. Read More


Endpoint Protection Software tackles advanced malware.

May 30, 2014

Providing automated threat analysis, Trusteer Apex Software blocks attempts to exploit vulnerabilities on endpoint that lead to data breaches. Program prevents malicious Java applications through assessing application trust and activity risk, and blocking untrusted apps from performing high-risk activities. If phishing email is opened, Trusteer Apex can identify malware and stop it from exploiting endpoint. Program also prevents employees from re-using corporate credentials on untrusted sites. Read More


Security Software/Service help organizations protect critical data.

May 13, 2014

Leveraging security intelligence and behavioral analytics, IBM Threat Protection System disrupts attacks across entire attack chain from break-in to exfiltrate. End-to-end architecture of analytic and forensics software helps organizations continuously prevent, detect, and respond to ongoing and sophisticated cyber attacks. In some cases, threat can be eliminated before damage occurs. Critical Data Protection Program, based on Data Centric Security Model, helps safeguard critical data. Read More

Computer Hardware & Peripherals

Flexible Computing Platform delivers HPC experience.

September 18, 2013

Able to handle social media, analytics, technical computing, and cloud delivery workloads, NeXtScale System™ incorporates up to 84 x 86-based systems and 2,016 processing cores in standard EIA 19 in. rack. Industry-standard components, including I/O cards and top-of-rack networking switches, promote flexibility. Operating up to 104°F and supporting 1,866 MHz memory, platform is offered as single node, empty or configured chassis, and complete, pre-tested IBM Intelligent Cluster solution. Read More

Other Company News from
IBM (Corporate Headquarters)