IBM Takes Action to Improve Cloud Security


New services and IBM Research innovations reduce barriers to cloud adoption

ARMONK, N.Y., Oct. 20 - IBM (NYSE: IBM) today unveiled a new security initiative focused on making cloud computing safer. IBM aims to help both users and providers of cloud computing more easily navigate security challenges through new cloud security planning and assessment services, managed services to help clients secure their clouds, and the introduction of several technology innovations from its global research labs.

According to IBM's Institute for Business Value 2010 Global IT Risk Study, cloud computing raised serious concerns among respondents about the use, access and control of data: 77 percent of respondents believe that adopting cloud computing makes protecting privacy more difficult; 50 percent are concerned about a data breach or loss; and 23 percent indicate that weakening of corporate network security is a concern. As the study illustrates, businesses see the promise of the cloud model, but security remains an inhibitor to adoption.

While an information technology (IT) foundation pertains to all cloud computing, providers and users do not generally rely on one generic model for data security. Both cloud providers and users should consider a variety of factors, including the kind of work a client wants to do in the cloud and the mechanisms and controls used. For example, clients who have collaboration tools and email work in the cloud should think about access and policy controls, while clients focused on healthcare in the cloud should be concerned with data isolation and encryption.

To help meet these specific needs, IBM's cloud security experts work closely with clients to address their individual concerns and provide the appropriate services and offerings. This process includes evaluations of the security positioning of planned or existing cloud implementations as well as recommendations for various security strategies.

"IBM understands the 'one size fits all' cloud security strategy will not work for most businesses," said Steve Robinson, general manager, IBM Security Solutions. "Our enterprise clients are looking for a trusted advisor to provide the right mix of security consulting services and offerings to match. By offering these new services and innovations, we aim to help clients create tailored solutions that will allow them to get the most out of their cloud environments."

Additionally, IBM has a team of security professionals around the world and holds a number of security and risk management patents, which can be used to help clients solve their toughest cloud problems. As the cloud computing model evolves with the changing needs of a client's business, IBM researchers are designing new technologies to ensure the integrity of data in the cloud regardless of the business or industry scenario.

New IBM Cloud Security Infrastructure and Services

IBM is using its expertise to outline a two-pronged approach for clients seeking to dramatically improve cloud security:

1. Plan and Assess the Security Strategy for the Cloud

o IBM Cloud Security Strategy Roadmap - For clients who are embarking on a
cloud strategy as either a provider or subscriber, the new roadmap is
designed to help organizations understand, establish and outline the
steps for realizing their security goals in relation to their cloud
computing strategy. IBM security experts conduct an onsite working
session with clients to help define the cloud computing initiative and
goals, identify associated security and privacy concerns, determine
appropriate vulnerability mitigation strategies and develop a high-level
security strategy roadmap designed to achieve their cloud security
objectives.

o IBM Cloud Security Assessment - For clients with cloud infrastructure in
place or planning their cloud environment, the new assessment is
designed to help provide an in-depth understanding of the current state
of a current or planned cloud solution's security controls, mechanisms
and architecture. IBM assessment professionals help compare the cloud
solution's security program against industry best practices and the
client's own cloud security objectives, then identifies steps to help
improve the overall security environment.

o IBM Application Security Services for Cloud - The new offering allows
CIOs to have a clear picture of how and where sensitive data will
circulate in a cloud environment. It assesses current or proposed cloud
application environments to help ensure that the appropriate
information, security, and privacy controls are in place for a client's
specific business requirements. By identifying and prioritizing
cloud-specific security vulnerabilities, internally and within their
service providers, the offering can help clients determine the right
balance of internal control and service provider autonomy required to
maintain efficiency and service level requirements before implementing
the solution.

2.Obtain Security Services from the Cloud

o IBM Managed Security Services Hosted Security Event and Log Management -
This enhanced offering is a cloud-based solution for security incident
and event management that consolidates the security event and log data
of operating systems, applications and infrastructure equipment,
providing a seamless platform from which to assess and respond to
real-time and historical traffic. It dramatically improves the speed of
security investigations and compliance initiatives, offering the full
life cycle of security information and event management, and provides
options to outsource these tasks to security experts located in IBM's
worldwide Security Operation Centers.

o IBM Managed Security Services Hosted Vulnerability Management - This
enhanced cloud-based scanning service helps companies to identify
vulnerabilities across network devices, servers, web applications and
databases to help manage concerns and reduce the cost of security
operations. This service is available to companies of all sizes who want
to quickly and more easily address compliance mandates.

"We needed a remote scanning solution that can help us identify critical vulnerabilities throughout our infrastructure and assist us in meeting external audit requirements," said Henrique Matiole, IT supervisor, ArcelorMittal Sistemas S.A. of Brazil. "The enhanced hosted vulnerability management scanning solution carries advanced scanning capabilities for complicated security challenges and provides strong reporting capabilities through a web-based portal that helps us easily satisfy our audit requirements."

Top Security Experts Develop Next Generation of Solutions to Secure Cloud

Researchers at the IBM Watson and Zurich research labs are working on a variety of projects that examine new ways to bolster cloud security by enabling enhanced data integrity, recovery, privacy, and customer isolation in a public cloud environment.

For example, IBM researchers have developed mechanisms that enhance cloud security by providing "infrastructure hardening," or stronger isolation between different workloads. These mechanisms verify the integrity and correct configuration of infrastructure components such as hypervisors to help prevent low-level attacks such as spoofing, or deceiving computer systems or other computer users by hiding or imitating an Internet identity. IBM recently added some of these security capabilities to the IBM Smart Business Test and Development cloud. Some of these security mechanisms are also currently offered in the IBM Systems Director VMControl(TM).

Another example of IBM's ability to rapidly take advantage of new cloud security techniques pioneered by its researchers is the integration of "introspection monitoring" into the IBM Security Virtual Server Protection for VMware offering. This capability enables a kind of "virtual doorman," in the cloud environment, which detects potential malware attacks from outside the virtual machine and scans the operating systems inside to confirm they are running properly. The capability will then determine whether or not they contain malicious code, such as root-kits, which are software programs designed to provide a user with administrator access to a computer without being detected. This level of security isn't available from conventional introspection solutions that can only communicate and check inside the virtual machine.

IBM's Institute for Business Value 2010 Global IT Risk Study

IBM's Institute for Business Value 2010 Global IT Risk Study was commissioned to understand how information technology (IT) managers are working to mitigate risk. Core objectives of the study included evaluating the manner in which innovations like cloud and mobile computing are influencing overall IT risk strategies and exploring how the role of the IT Manager is changing in relation to these innovations. The survey included 556 respondents from all geographies, representing companies with revenues of less than $500M to more than $10B. Respondents worked across a diverse set of industries and sectors including finance, healthcare, biotechnology, manufacturing, government and information technology services.

For more information on the IBM 2010 Global IT Risk Study please see: www.ibm.com/services/riskstudy.

IBM Security Solutions include an extensive portfolio of hardware, software solutions, professional and managed services offerings covering the spectrum of IT and business security risks, including: people and identity, data and information, application and process, network, server and endpoint and physical infrastructure. IBM Security Solutions empowers clients to innovate and operate their businesses on highly secure infrastructure platforms.

For more information on IBM Security Solutions, visit: www.ibm.com/security.

Contact:

Darcy Hansen

IBM Media Relations

917-472-3692

hansenda@us.ibm.com

SOURCE IBM

Web Site: www.ibm.com

All Topics