IBM deepens move into computer defense

May 05, 2014
IBM on Monday moved deeper into defending business computers with a new service aimed at thwarting hackers before they do damage

IBM on Monday moved deeper into defending business computers with a new service aimed at thwarting hackers before they do damage.

"The need for security to become part of our strategy has been natural," IBM vice president of security strategy Marc van Zadelhoff told AFP.

The century-old business technology titan made a priority of defending computer networks about two years ago, unifying resources from more than a dozen security firms it acquired.

IBM's unit has been "growing like gangbusters," according to van Zadelhoff.

According to industry tracker IDC, IBM significantly outpaced overall computer company market growth and last year was the third largest seller of cyber defense software.

IBM on Monday ramped up its offerings with a Threat Protection System and a Critical Data Protection Program.

Introduction of the new weapons came with the release of IBM-funded Ponemon Institute studies showing that the number of is climbing along with the cost.

The average cost of a hack to a business has risen 15 percent to $6.2 million including lost revenue and productivity, according to Ponemon findings released by IBM.

The Critical Data Protection program uses an array of techniques to safeguard the data equivalent of a company's "crown jewels," according to van Zadelhoff.

IBM has tapped into intelligence about threats and hacker tactics from it cares for around the world.

Defensive technics go beyond maintaining watch-lists for known malicious codes to identifying when applications in networks act unusually and then pouncing to see whether hacker mischief is the cause.

"Traditional methods of prevention have often failed, leaving many to believe detection is the only way forward," IBM systems general manager Brendan Hannigan said in a release.

"You must be able to prevent exploitations of known and unknown vulnerabilities."

Explore further: Enabling secure notifications to mobile devices via the cloud

add to favorites email to friend print save as pdf

Related Stories

IBM posts lower 1Q earnings amid hardware slump (Update)

Apr 16, 2014

IBM's first-quarter earnings fell and revenue came in below Wall Street's expectations amid an ongoing decline in its hardware business, one that was exacerbated by weaker demand in China and emerging markets.

IBM to invest $1b in Linux, open-source

Sep 17, 2013

IBM said Tuesday it would invest $1 billion in new Linux and open source technologies for its servers in a bid to boost efficiency for big data and cloud computing.

Recommended for you

After a data breach, it's consumers left holding the bag

10 hours ago

Shoppers have launched into the holiday buying season and retailers are looking forward to year-end sales that make up almost 20% of their annual receipts. But as you check out at a store or click "purchase" on your online shopping cart ...

Hacked emails slice spam fast

Nov 26, 2014

Spam spreads much faster and to more people when it is being propagated by hacked, or otherwise compromised, email accounts rather than legitimate accounts, according to research published in the International Journal of ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.