Strategies for assessing cloud security
|
|
- Gloria Carroll
- 5 years ago
- Views:
Transcription
1 IBM Global Technology Services Thought Leadership White Paper November 2010 Strategies for assessing cloud security
2 2 Securing the cloud: from strategy development to ongoing assessment Executive summary Cloud computing provides flexible, cost-effective delivery of business or consumer IT services over the Internet. Cloud resources can be rapidly deployed and easily scaled, with all processes, applications, and services provisioned on demand, regardless of the user location or device. As a result, cloud computing helps organizations improve service delivery, streamline IT management and better align IT services with dynamic business requirements. Cloud computing can also simultaneously support core business functions and provide capacity for new and innovative services. Both public and private cloud models, or a hybrid approach using both models, are now in use. Available to anyone with Internet access, public clouds are acquired as a service and paid for on a per-usage basis or by subscription. Private clouds are owned and used by a single organization. They offer many of the same benefits as public clouds, but give the owner greater flexibility and control. Although the benefits of cloud computing are clear, so is the need to develop proper security for cloud implementations whether public or private. Embracing cloud computing without adequate security controls can place the entire IT infrastructure at risk. Cloud computing introduces another level of risk because essential services are often outsourced to a third party, making it harder to maintain data integrity and privacy, support data and service availability, and demonstrate compliance. Even if IT workloads are transitioned to the cloud, users are still responsible for compliance and data security. As a result, subscribers must establish trust relationships with their cloud providers and understand the risk posed by public and/or private cloud computing environments. Security challenges in the cloud the need for a trusted third party evaluation One of the most significant differences between cloud security and traditional IT security stems from the sharing of infrastructure on a massive scale. Users spanning different corporations and trust levels often interact with the same set of computing resources. And public cloud services are increasingly being offered by a chain of providers all storing and processing data externally in multiple unspecified locations. Inside the cloud, it is difficult to physically locate where data is stored. Security processes that were once visible are now hidden behind layers of abstraction. This lack of visibility can cause concerns about data exposure and compromise, service reliability, ability to demonstrate compliance and meet SLAs, and overall security management. Visibility can be especially critical for compliance. The Sarbanes-Oxley Act, the Health Insurance Portability and Accountability Act (HIPAA), European privacy laws, and many
3 IBM Global Technology Services 3 other regulations require comprehensive auditing capabilities. Many public clouds may indeed be a black box to the subscriber, thus clients may not be able to demonstrate compliance. (A private or hybrid cloud, on the other hand, can be configured to meet those requirements.) In addition, providers are sometimes required to support third-party audits, or support e-discovery initiatives and forensic investigations. This adds even more importance to maintaining proper visibility into the cloud. Legal discovery of a co-tenant s data may affect the confidentiality of other tenants data if the data is not properly segmented. This may mean that some sensitive data may not be appropriate for certain cloud environments. Organizations considering cloud-based services must understand the associated risks and ensure appropriate visibility. IBM guidelines for securing cloud implementations focus on the following areas: Building a security program Confidential data protection Implementing strong access and identity Application provisioning and de-provisioning Governance audit management Vulnerability management Testing and validation Because cloud computing is available in several service models (and hybrids of these models), each presents different levels of responsibility for security management. Trusted third parties can help companies apply cloud security best practices to their specific business needs. Developing a strategic cloud security roadmap with IBM There is no one-size-fits-all model for security in the cloud. Organizations have different security requirements that are determined by the unique characteristics of the business workload they intend to migrate to the cloud or the services they are providing from their cloud. It is important when evaluating risk in a cloud computing model, that a cloud security strategy be developed. By partnering with IBM, clients can benefit from proven assessment methodologies and best practices that help ensure consistent, reliable results. They can also leverage comprehensive frameworks that address enterprise cloud strategy, implementation and management in a holistic approach that maximizes the business value of cloud investments while minimizing business risk. Defining business and IT strategy The first step to understanding security risks posed by a cloud computing model is to analyze business and IT strategies. What is the value of the information that will be stored, accessed and transmitted via the cloud? Is it business critical and/or confidential? Is it subject to regulatory compliance? Clients must also consider availability requirements. After determining the business and IT strategy and evaluating the data, clients can make a more informed, risk-based decision about which cloud computing model to pursue.
4 4 Securing the cloud: from strategy development to ongoing assessment Identifying the risks Each type of cloud public, private and hybrid carries a different level of IT security risk. Security experts from IBM can help clients identify the vulnerabilities, threats and other values at risk based on public, private or hybrid cloud architecture. From there, IBM will work with clients to design initial mechanisms and controls to mitigate risk, and outline the maintenance and testing procedures that will help ensure ongoing risk mitigation. Documenting the plan IBM clients will benefit from a documented roadmap addressing cloud security strategy. The plan should identify the types of workloads or applications that are candidates for cloud computing and should account for the legal, regulatory and security requirements. IBM will work with clients to plan for compensating controls to mitigate perceived risks, including how to address identity and access management, and how to balance security controls between the cloud provider and the subscriber. Assessing cloud security with IBM In addition to developing a strategy for cloud security, IBM can perform a cloud security assessment for public or private cloud offerings. This service can provide helpful due diligence for cloud providers, or help subscribers understand the security posture of their provider s cloud. The IBM cloud security assessment reviews cloud architecture from a security standpoint, including policies and processes for data access and storage. IBM security experts assess the current state of cloud security against best practices, and against providers own security objectives. Security requirements and best practices criteria is based on unique characteristics of the subject cloud, including workload, trust level of end users, data protection requirements and more. For example, clouds supporting will have different security requirements than those supporting electronic Protected Health Information (ephi). A gap assessment against security objectives and best practices will reveal strengths and weaknesses of the current security architecture and processes. IBM experts will provide recommendations for improvements and continuous security measures to bridge the gaps. These can include the use of additional network security controls, modifications to existing security policies and procedures, implementation of new identity and access management controls, acquisition of managed security services for offloading critical security management tasks, or any number of other remediation steps. In addition to a thorough review of the cloud security program, IBM advises steady state technical testing of the cloud s network infrastructure and supporting applications via remote penetration and application testing. This provides a hacker s eye view of cloud components and provides insight into how cloud security weaknesses can significantly impact data and information protection.
5 IBM Global Technology Services 5 Why IBM? To fully benefit from cloud computing, clients must ensure that data, applications and systems are properly secured so that cloud infrastructure won t expose the organization to risk. Cloud computing has the usual requirements of traditional IT security, though it presents an added level of risk because of the external aspects of a cloud model. This can make it more difficult to maintain data integrity and privacy, support data and service availability, and demonstrate compliance. Assessing the risks associated with cloud computing, such as data integrity, recovery, privacy, and tenant isolation is critical to the adoption of cloud technologies. These risks call for automated end-to-end security with a heavier emphasis on strong isolation, integrity and resiliency in order to provide visibility, control and automation across the cloud computing infrastructure. IBM helps clients put risk management strategies into action by transforming security from a cost of doing business to a way to improve the business. IBM draws from a broad portfolio of consulting services, software and hardware and managed security services that enable a business-driven approach to securing your cloud computing as well as your physical IT environments. IBM s capabilities empower you to dynamically monitor and quantify security risks, enabling you to better: Understand threats and vulnerabilities in terms of business impact, Respond to security events with security controls that optimize business results, Prioritize and balance your security investments. IBM also securely operates its own public clouds, including IBM LotusLive. IBM continuously invests in research and development of stronger isolation at all levels of the network, server, hypervisor, process and storage infrastructure to support massive multitenancy while mitigating risk. Through world-class solutions that address risk across all aspects of your business, IBM is able to help you create an intelligent infrastructure that drives down costs, is secure, and is just as dynamic as today s business climate. IBM cloud security solutions and services build on the strong foundation of the IBM security framework to extend benefits from traditional IT environments to cloud computing environments.
6 For more information To learn more about the IBM Cloud Security Services, please contact your IBM marketing representative or IBM Business Partner, or visit the following website: ibm.com/cloud Additionally, financing solutions from IBM Global Financing can enable effective cash management, protection from technology obsolescence, improved total cost of ownership and return on investment. Also, our Global Asset Recovery Services help address environmental concerns with new, more energy-efficient solutions. For more information on IBM Global Financing, visit: ibm.com/financing Copyright IBM Corporation 2010 Route 100 Somers, NY U.S.A. Produced in the United States of America November 2010 All Rights Reserved IBM, the IBM logo, ibm.com and LotusLive are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol ( or ), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the web at Copyright and trademark information at ibm.com/legal/copytrade.shtml Other company, product or service names may be trademarks or service marks of others. Please Recycle SEW03022-USEN-01
Leveraging security from the cloud
IBM Global Technology Services Thought Leadership White Paper IBM Security Services Leveraging security from the cloud The who, what, when, why and how of cloud-based security services 2 Leveraging security
Cloud Security Who do you trust?
Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
IBM Tivoli Netcool network management solutions for enterprise
IBM Netcool network management solutions for enterprise The big picture view that focuses on optimizing complex enterprise environments Highlights Enhance network functions in support of business goals
Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.
Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?
IBM Internet Security Systems October 2007. FISMA Compliance A Holistic Approach to FISMA and Information Security
IBM Internet Security Systems October 2007 FISMA Compliance A Holistic Approach to FISMA and Information Security Page 1 Contents 1 Executive Summary 1 FISMA Overview 3 Agency Challenges 4 The IBM ISS
Effective storage management and data protection for cloud computing
IBM Software Thought Leadership White Paper September 2010 Effective storage management and data protection for cloud computing Protecting data in private, public and hybrid environments 2 Effective storage
Safeguarding the cloud with IBM Dynamic Cloud Security
Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from
How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1
How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1 2 How does IBM deliver cloud security? Contents 2 Introduction 3 Cloud governance 3 Security governance, risk management
IBM Software Cloud service delivery and management
IBM Software Cloud service delivery and management Rethink IT. Reinvent business. 2 Cloud service delivery and management Virtually unparalleled change and complexity On this increasingly instrumented,
IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview
IBM Internet Security Systems The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview Health Insurance Portability and Accountability Act
IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet
IBM PowerSC Security and compliance solution designed to protect virtualized datacenters Highlights Simplify security management and compliance measurement Reduce administration costs of meeting compliance
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
Cloud computing: Innovative solutions for test environments
IBM Global Services April 2009 Cloud computing: Innovative solutions for test environments Speed test cycles and reduce cost to gain a competitive edge Page No.2 Contents 2 Executive summary 3 Leading
Safeguarding the cloud with IBM Security solutions
Safeguarding the cloud with IBM Security solutions Maintain visibility and control with proven solutions for public, private and hybrid clouds Highlights Address cloud concerns with enterprise-class solutions
IBM Tivoli Netcool network management solutions for SMB
IBM Netcool network management solutions for SMB An integrated approach enhances IT as it supports business needs for the SMB environment Highlights Automate management tasks to reduce IT workload and
For healthcare, change is in the air and in the cloud
IBM Software Healthcare Thought Leadership White Paper For healthcare, change is in the air and in the cloud Scalable and secure private cloud solutions can meet the challenges of healthcare transformation
Supporting information technology risk management
IBM Global Technology Services Thought Leadership White Paper October 2011 Supporting information technology risk management It takes an entire organization 2 Supporting information technology risk management
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
Cloud computing White paper November 2009. IBM Point of View: Security and Cloud Computing
White paper November 2009 IBM Point of View: Security and Cloud Computing Page 2 Table of Contents Introduction... 3 Address cloud security the grand challenge... 4 Evaluate different models of cloud computing...
IBM Software Integrated Service Management: Visibility. Control. Automation.
IBM Software Integrated Service Management: Visibility. Control. Automation. Enabling service innovation 2 Integrated Service Management: Visibility. Control. Automation. Every day, the world is becoming
IBM Unstructured Data Identification and Management
IBM Unstructured Data Identification and Management Discover, recognize, and act on unstructured data in-place Highlights Identify data in place that is relevant for legal collections or regulatory retention.
50x 2020 40 Zettabytes*
IBM Global Technology Services How to integrate cloud-based disaster recovery into your existing business continuity plans Richard Cocchiara: IBM Distinguished Engineer; CTO IBM Business Continuity & Resiliency
Security and Cloud Computing
Martin Borrett, Lead Security Architect, Europe, IBM 9 th December 2010 Outline Brief Introduction to Cloud Computing Security: Grand Challenge for the Adoption of Cloud Computing IBM and Cloud Security
IBM Security QRadar Vulnerability Manager
IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk
Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.
Security management solutions White paper IBM Tivoli and Consul: Facilitating security audit and March 2007 2 Contents 2 Overview 3 Identify today s challenges in security audit and compliance 3 Discover
Drive Growth and Value with proven BPM solutions from IBM
IBM Software Thought Leadership White Paper June 2011 Drive Growth and Value with proven BPM solutions from IBM 2 Drive Growth and Value with proven BPM solutions from IBM Contents 2 Executive summary
IBM Tivoli Storage Manager for Virtual Environments
IBM Storage Manager for Virtual Environments Non-disruptive backup and instant recovery: Simplified and streamlined Highlights Simplify management of the backup and restore process for virtual machines
Defining a framework for cloud adoption
IBM Global Technology Thought Leadership White Paper Computing Defining a framework for cloud adoption How common ground can help enterprises drive success with cloud computing 2 Defining a framework for
Effective Storage Management for Cloud Computing
IBM Software April 2010 Effective Management for Cloud Computing April 2010 smarter storage management Page 1 Page 2 EFFECTIVE STORAGE MANAGEMENT FOR CLOUD COMPUTING Contents: Introduction 3 Cloud Configurations
IBM Endpoint Manager for Core Protection
IBM Endpoint Manager for Core Protection Device control and endpoint protection designed to guard against malware and loss of sensitive data Highlights Delivers real-time endpoint protection against viruses,
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
Driving workload automation across the enterprise
IBM Software Thought Leadership White Paper October 2011 Driving workload automation across the enterprise Simplifying workload management in heterogeneous environments 2 Driving workload automation across
Breaking down silos of protection: An integrated approach to managing application security
IBM Software Thought Leadership White Paper October 2013 Breaking down silos of protection: An integrated approach to managing application security Protect your enterprise from the growing volume and velocity
Accelerate server virtualization to lay the foundation for cloud
IBM Global Technology Services Thought Leadership White Paper January 2012 Accelerate server virtualization to lay the foundation for cloud Analytics combine with standard, repeatable processes for quicker
IBM Rational AppScan: Application security and risk management
IBM Software Security November 2011 IBM Rational AppScan: Application security and risk management Identify, prioritize, track and remediate critical security vulnerabilities and compliance demands 2 IBM
IBM Global Business Services Microsoft Dynamics AX solutions from IBM
IBM Global Business Services Microsoft Dynamics AX solutions from IBM Powerful, agile and simple enterprise resource planning 2 Microsoft Dynamics AX solutions from IBM Highlights Improve productivity
Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.
Security solutions To support your IT objectives Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services. Highlights Balance effective security with
Zend and IBM: Bringing the power of PHP applications to the enterprise
Zend and IBM: Bringing the power of PHP applications to the enterprise A high-performance PHP platform that helps enterprises improve and accelerate web and mobile application development Highlights: Leverages
White paper September 2009. Realizing business value with mainframe security management
White paper September 2009 Realizing business value with mainframe security management Page 2 Contents 2 Executive summary 2 Meeting today s security challenges 3 Addressing risks in the mainframe environment
Easily deploy and move enterprise applications in the cloud
Easily deploy and move enterprise applications in the cloud IBM PureApplication solutions offer a simple way to implement a dynamic hybrid cloud environment 2 Easily deploy and move enterprise applications
Networking for cloud computing
IBM Global Technology Services Thought Leadership White Paper Cloud computingi IBM Global Technology Services Networking for cloud computing Optimize your network to make the most of your cloud 2 Networking
WebSphere Cast Iron Cloud integration
Cast Iron Cloud integration Integrate in days Highlights Speeds up time to implementation for Cloud and on premise integration projects with configuration, not coding approach Offers cost savings with
Platform as a Service: The IBM point of view
Platform as a Service: The IBM point of view Don Boulia Vice President Strategy, IBM and Private Cloud Contents 1 Defining Platform as a Service 2 The IBM view of PaaS 6 IBM offerings 7 Summary 7 For more
Empowering intelligent utility networks with visibility and control
IBM Software Energy and Utilities Thought Leadership White Paper Empowering intelligent utility networks with visibility and control IBM Intelligent Metering Network Management software solution 2 Empowering
Business resilience: The best defense is a good offense
IBM Business Continuity and Resiliency Services January 2009 Business resilience: The best defense is a good offense Develop a best practices strategy using a tiered approach Page 2 Contents 2 Introduction
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to
Move beyond monitoring to holistic management of application performance
Move beyond monitoring to holistic management of application performance IBM SmartCloud Application Performance Management: Actionable insights to minimize issues Highlights Manage critical applications
IBM Software IBM Business Process Manager Powerfully Simple
IBM Software IBM Business Process Manager Powerfully Simple A single BPM platform that provides total visibility and management of your business processes 2 IBM Business Process Manager Powerfully Simple
IBM Cognos TM1 on Cloud Solution scalability with rapid time to value
IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.
Cloud computing: defined and demystified
IBM Global Services April 2009 Cloud computing: defined and demystified Explore public, private and hybrid cloud approaches to help accelerate innovative business solutions Page 2 Contents 2 Executive
IBM ediscovery Identification and Collection
IBM ediscovery Identification and Collection Turning unstructured data into relevant data for intelligent ediscovery Highlights Analyze data in-place with detailed data explorers to gain insight into data
Stay ahead of insiderthreats with predictive,intelligent security
Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz sarah.cucuz@spyders.ca IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent
Create Operational Flexibility with Cost-Effective Cloud Computing
IBM Sales and Distribution White paper Create Operational Flexibility with Cost-Effective Cloud Computing Chemicals and petroleum 2 Create Operational Flexibility with Cost-Effective Cloud Computing Executive
Applying IBM Security solutions to the NIST Cybersecurity Framework
IBM Software Thought Leadership White Paper August 2014 Applying IBM Security solutions to the NIST Cybersecurity Framework Help avoid gaps in security and compliance coverage as threats and business requirements
IBM SmartCloud Monitoring
IBM SmartCloud Monitoring Gain greater visibility and optimize virtual and cloud infrastructure Highlights Enhance visibility into cloud infrastructure performance Seamlessly drill down from holistic cloud
IBM Software IBM Business Process Management Suite. Increase business agility with the IBM Business Process Management Suite
IBM Software IBM Business Process Management Suite Increase business agility with the IBM Business Process Management Suite 2 Increase business agility with the IBM Business Process Management Suite We
Breaking through the haze: understanding
Cloud computing To support your business objectives Breaking through the haze: understanding and leveraging cloud computing. Intelligence explosion demands a new computing model A new, intelligent planet
IBM Rational AppScan: enhancing Web application security and regulatory compliance.
Strategic protection for Web applications To support your business objectives IBM Rational AppScan: enhancing Web application security and regulatory compliance. Are untested Web applications putting your
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Visualize current and potential network traffic patterns
The Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
IBM Security re-defines enterprise endpoint protection against advanced malware
IBM Security re-defines enterprise endpoint protection against advanced malware Break the cyber attack chain to stop advanced persistent threats and targeted attacks Highlights IBM Security Trusteer Apex
Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations
White Paper September 2009 Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations Page 2 Contents 2 Executive
Reduce your data storage footprint and tame the information explosion
IBM Software White paper December 2010 Reduce your data storage footprint and tame the information explosion 2 Reduce your data storage footprint and tame the information explosion Contents 2 Executive
Service assurance for communications service providers White paper. Improve service quality and enhance the customer experience.
Service assurance for communications service providers White paper Improve service quality and enhance the customer experience. December 2007 2 Contents 2 Overview 2 Move to a competitive business model
The IBM Solution Architecture for Energy and Utilities Framework
IBM Solution Architecture for Energy and Utilities Framework Accelerating Solutions for Smarter Utilities The IBM Solution Architecture for Energy and Utilities Framework Providing a foundation for solutions
IBM WebSphere application integration software: A faster way to respond to new business-driven opportunities.
Application integration solutions To support your IT objectives IBM WebSphere application integration software: A faster way to respond to new business-driven opportunities. Market conditions and business
Integrated service management and cloud computing:
IBM Global Technology Services Thought Leadership White Paper September 2010 Integrated service management and cloud computing: More than just technology best friends 2 Integrated service management and
Improve business agility with WebSphere Message Broker
Improve business agility with Message Broker Enhance flexibility and connectivity while controlling costs and increasing customer satisfaction Highlights Leverage business insight by dynamically enriching
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
Choosing a partner for enterprise cloud production workloads
IBM Global Technology Services Thought Leadership White Paper Cloud computingi IBM Global Technology Services Choosing a partner for enterprise cloud production workloads Migrating production workloads
Using the cloud to improve business resilience
IBM Global Technology Services White Paper IBM Business Continuity and Resiliency Services Using the cloud to improve business resilience Choose the right managed services provider to limit reputational
Consolidated security management for mainframe clouds
Security Thought Leadership White Paper February 2012 Consolidated security management for mainframe clouds Leveraging the mainframe as a security hub for cloud-computing environments 2 Consolidated security
IBM Security Intrusion Prevention Solutions
IBM Security Intrusion Prevention Solutions Sarah Cucuz sarah.cucuz@spyders.ca IBM Software Solution Brief IBM Security intrusion prevention solutions In-depth protection for networks, servers, endpoints
Address IT costs and streamline operations with IBM service desk and asset management.
Asset management and service desk solutions To support your IT objectives Address IT costs and streamline operations with IBM service desk and asset management. Highlights Help improve the value of IT
Automated file management with IBM Active Cloud Engine
Automated file management with IBM Active Cloud Engine Redefining what it means to deliver the right data to the right place at the right time Highlights Enable ubiquitous access to files from across the
Three significant risks of FTP use and how to overcome them
Three significant risks of FTP use and how to overcome them Management, security and automation Contents: 1 Make sure your file transfer infrastructure keeps pace with your business strategy 1 The nature
Cloud Security Who do you trust?
Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud
Securing the mobile enterprise with IBM Security solutions
Securing the mobile enterprise with IBM Security solutions Gain visibility and control with proven security for mobile initiatives in the enterprise Highlights Address the full spectrum of mobile risks
IBM Tivoli Netcool Configuration Manager
IBM Netcool Configuration Manager Improve organizational management and control of multivendor networks Highlights Automate time-consuming device configuration and change management tasks Effectively manage
Real-time asset location visibility improves operational efficiencies
Real-time asset location visibility improves operational efficiencies Offering smart capabilities for asset tracking to dramatically improve efficiency and lower cost Highlights Improve asset utilization
IBM Security Privileged Identity Manager helps prevent insider threats
IBM Security Privileged Identity Manager helps prevent insider threats Securely provision, manage, automate and track privileged access to critical enterprise resources Highlights Centrally manage privileged
The business value of improved backup and recovery
IBM Software Thought Leadership White Paper January 2013 The business value of improved backup and recovery The IBM Butterfly Analysis Engine uses empirical data to support better business results 2 The
Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation
Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns
Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture
Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture 2 Data Security and Privacy Principles for IBM SaaS Contents 2 Introduction
IBM PowerSC. Security and compliance solution designed to protect virtualised data centres. Highlights. IBM Systems and Technology Data Sheet
IBM PowerSC Security and compliance solution designed to protect virtualised data centres Highlights Simplify security management and compliance measurement Reduce administration costs of meeting compliance
Beyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives.
Security solutions To support your business objectives Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives. For an On Demand Business, security
IBM Rational systems and software solutions for the medical device industry
IBM Software August 2011 IBM Rational systems and software solutions for the medical device industry Improve processes, manage IEC 61508 and IEC 62304 standards, develop quality products Highlights Manage
IBM SmartCloud Workload Automation
IBM SmartCloud Workload Automation Highly scalable, fault-tolerant solution offers simplicity, automation and cloud integration Highlights Gain visibility into and manage hundreds of thousands of jobs
Taking control of the virtual image lifecycle process
IBM Software Thought Leadership White Paper March 2012 Taking control of the virtual image lifecycle process Putting virtual images to work for you 2 Taking control of the virtual image lifecycle process
Simplify security management in the cloud
Simplify security management in the cloud IBM Endpoint Manager and IBM SmartCloud offerings provide complete cloud protection Highlights Ensure security of new cloud services by employing scalable, optimized
Dispelling the vapor around cloud computing in the financial services industry
IBM Financial Services Dispelling the vapor around cloud computing in the financial services industry Executive summary There are marked differences between the workloads that the financial services industry
Quality management across the product and application life cycle
IBM Software Product and application life cycle June 2011 Quality across the product and application life cycle IBM solutions for a Smarter Planet 2 Quality across the product and application life cycle
IBM System x and VMware solutions
IBM Systems and Technology Group Cross Industry IBM System x and VMware solutions Enabling your cloud journey 2 IBM System X and VMware solutions As companies require higher levels of flexibility from
Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.
Security solutions To support your IT objectives Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services. Highlights Balance effective security with
IBM asset management solutions White paper. Using IBM Maximo Asset Management to manage all assets for hospitals and healthcare organizations.
IBM asset management solutions White paper Using IBM Maximo Asset Management to manage all assets for hospitals and healthcare organizations. September 2007 2 Contents 2 Executive summary 3 Introduction
Accelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
When millions need access: Identity management in an increasingly connected world
IBM Software Thought Leadership White Paper January 2011 When millions need access: Identity management in an increasingly connected world Best practice solutions that scale to meet today s huge numbers