29
Fri, Nov
0 New Articles

IBM Helps Organizations Secure Vulnerable Smartphones, Meters, and More

New Products, Agreements and Trends
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

Steve Robinson to industry: The proliferation of intelligent systems is creating new security loopholes that businesses must address.

IBM has announced new initiatives to extend security to the growing number of mobile and instrumented devices beyond an organization's own four walls, such as smartphones, ATMs, retail kiosks, traffic systems, meters, buildings and sensors.

By 2015, it's estimated that there will be one trillion connected devices, many of which will be instrumented with real-time capabilities to respond quickly and accurately to the environment. While this intelligence provides great opportunities, it is also creating emerging security vulnerabilities that companies need to address. Businesses today are tasked with managing thousands of computing devices and ensuring they remain available, secure and at their proper configurations according to policies and requirements. As the risks associated with securing these endpoints grows more complex, the cost of managing and securing them is escalating rapidly. IDC expects that the endpoint security market will increase at a compound annual growth rate of 8.3 percent and reach nearly $10 billion in 2014.(1)

Today, IBM is unveiling new research projects, software, and services partnerships to help organizations better manage the security of their increasingly intelligent, interconnected and intelligent infrastructures.  Highlights include:

  • New endpoint management software to secure PCs, laptops and point-of-sale devices such as ATMs and retail kiosks
  • Investments in R&D to secure mobile smartphones such as Android-based devices, and smart meters
  • New joint work with Juniper Networks to deliver security services for mobile devices

"From electrical grids to mobile devices, transportation systems and buildings, the proliferation of these intelligent systems is creating new security loopholes that businesses need to address," said Steve Robinson, general manager, IBM Security Solutions. "On today's smarter planet, everything is an endpoint, and must be managed and secured like any other critical business asset."

Computing endpoints are proliferating daily to include sensors, water systems, mobile devices, cars, electric grids, transportation systems and cities. As corporate infrastructures continue to interact with these endpoints, which reside outside of their organization, the demand for greater security controls is growing.

Protecting Endpoints throughout the Enterprise

IBM today is announcing Tivoli Endpoint Manager, a new offering that integrates the assets acquired with BigFix into the IBM portfolio. The software extends IBM's capabilities to manage the security and compliance of servers, desktops, roaming laptops, and point-of-sale devices, such as ATMs and self-service kiosks.

The new offering combines endpoint and security management into a single solution and enables organizations to see and manage physical and virtual endpoints. Now, clients can better secure and manage their IT assets and gain visibility, control and automation into their most time-intensive IT tasks, such as asset inventory and patch management. Tivoli Endpoint Manager can be deployed in days for any network size or configuration and can identify which devices are not in compliance with corporate IT policies and recommend security fixes and timely software updates to 500,000 machines in a matter of minutes. The new software can also display all of an organization's virtual and physical assets in a single view to help locate, manage and protect these systems.

Protecting Mobile Devices

While the influx of personal mobile devices on corporate networks is bringing convenience and efficiency to many employees and companies, it can also raise concerns for organizations as they struggle to manage the security risks associated with these new devices accessing their networks. To enable clients to more securely manage their mobile workforce:

  • IBM Security Services and Business Partner, Juniper Networks, are delivering joint security services for mobile devices for leading platforms such as Apple iOS, Android, Symbian, Blackberry OS and Windows through the Juniper Networks Junos Pulse Mobile Security Suite. This fully managed service goes beyond securing mobile devices, and also integrates policy-based enforcement that prevents these smartphones from accessing key corporate resources unless required security policies and applications are in place. The service is designed to use IBM's worldwide managed security services capability along with critical mobile security management technology from Juniper to optimize a client's security operations in order to maintain compliance and secure information assets from Internet attacks, often at a fraction of in-house security resources and regardless of device type or vendor.  
  • IBM researchers and developers are also prototyping new technologies to seamlessly manage security and compliance challenges involving mobile smart phones, such as Android-based devices. Using a single management platform, organizations will be able to extend management across any mobile device on their network.   With the ability to install in minutes, customers will quickly be able to remotely set policies, monitor employees devices to identify potential data compromise and wipe data off the devices if they are lost or stolen.

Protecting Instrumented Endpoints - Smart Meters

In another R&D project, IBM researchers are also identifying ways to help customers secure instrumented endpoints for smart electrical meters. By 2015, it is expected that more than 300 million smart meters will be deployed worldwide.(2) While smart meters have great potential for cost-savings and efficiency, their ability to sense and interact with other devices can also cause them to be vulnerable to security breaches if not managed correctly. Through this new project, IBM is now able to demonstrate for clients how software can be used to manage and secure a meter remotely, while helping to ensure they are also tamper proof.

IBM Security Solutions

IBM Security Solutions include an extensive portfolio of hardware, software solutions, professional and managed services offerings covering the spectrum of IT and business security risks. This includes: people and identity, data and information, application and process, network, server and endpoint and physical infrastructure. IBM Security Solutions empower clients to innovate and operate their businesses on highly secure infrastructure platforms.

Following the acquisitions of Watchfire, Ounce Labs, Telelogic, and BigFix, IBM continues to grow its portfolio of capabilities designed to strengthen the security of smarter devices. With more than 40-years of security development and innovation, IBM is the only company with the breadth and depth of research, products, services, consulting and global business partners to deliver end-to-end security.  IBM has nine worldwide research labs innovating security technology and nine security operations centers around the world to help global clients maintain the appropriate security posture.

For more information on IBM Security Solutions, visit: http://www.ibm.com/security and http://www.ibm.com/press/security.

IBM is a leading global hybrid cloud and AI, and business services provider, helping clients in more than 175 countries capitalize on insights from their data, streamline business processes, reduce costs and gain the competitive edge in their industries. Nearly 3,000 government and corporate entities in critical infrastructure areas such as financial services, telecommunications and healthcare rely on IBM's hybrid cloud platform and Red Hat OpenShift to affect their digital transformations quickly, efficiently, and securely. IBM's breakthrough innovations in AI, quantum computing, industry-specific cloud solutions and business services deliver open and flexible options to our clients. All of this is backed by IBM's legendary commitment to trust, transparency, responsibility, inclusivity, and service.

For more information, visit: www.ibm.com.

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$

Book Reviews

Resource Center

  • SB Profound WC 5536 Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here. In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform. Attend this webinar to learn:

  • SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation. Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects. The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the company are not aligned with the current IT environment.

  • SB HelpSystems ROBOT Generic IBM announced the E1080 servers using the latest Power10 processor in September 2021. The most powerful processor from IBM to date, Power10 is designed to handle the demands of doing business in today’s high-tech atmosphere, including running cloud applications, supporting big data, and managing AI workloads. But what does Power10 mean for your data center? In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux. In this action-packed hour, Tom will share trends from the IBM i and AIX user communities while Dan and Dylan dive into the tech specs for key hardware, including:

  • Magic MarkTRY the one package that solves all your document design and printing challenges on all your platforms. Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product. Make sure your data survives when catastrophe hits. Request your trial now!  Request Now.

  • SB HelpSystems ROBOT GenericForms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works.

  • SB HelpSystems ROBOT GenericIT security is a top priority for businesses around the world, but most IBM i pros don’t know where to begin—and most cybersecurity experts don’t know IBM i. In this session, Robin Tatam explores the business impact of lax IBM i security, the top vulnerabilities putting IBM i at risk, and the steps you can take to protect your organization. If you’re looking to avoid unexpected downtime or corrupted data, you don’t want to miss this session.

  • SB HelpSystems ROBOT GenericCan you trust all of your users all of the time? A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later. A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime. In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • FORTRA Disaster protection is vital to every business. Yet, it often consists of patched together procedures that are prone to error. From automatic backups to data encryption to media management, Robot automates the routine (yet often complex) tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:

  • FORTRAManaging messages on your IBM i can be more than a full-time job if you have to do it manually. Messages need a response and resources must be monitored—often over multiple systems and across platforms. How can you be sure you won’t miss important system events? Automate your message center with the Robot Message Management Solution. Key features include:

  • FORTRAThe thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing. Manage your reports with the Robot Report Management Solution. Key features include:

  • FORTRAFor over 30 years, Robot has been a leader in systems management for IBM i. With batch job creation and scheduling at its core, the Robot Job Scheduling Solution reduces the opportunity for human error and helps you maintain service levels, automating even the biggest, most complex runbooks. Manage your job schedule with the Robot Job Scheduling Solution. Key features include:

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed. Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

  • LANSASupply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals. In this webinar, we discuss how:

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • Profound Logic Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: