Industryweek 6635 Ibm 1

IBM Deepens Move into Computer Defense

May 5, 2014
Saying its computer security unit has been ‘growing like gangbusters’, IBM ramped up its offerings with a Threat Protection System and a Critical Data Protection Program.

SAN FRANCISCO -- IBM (IW 500/10) on Monday moved deeper into defending business computers with a new service aimed at thwarting hackers before they do damage.

"The need for security to become part of our strategy has been natural," said IBM vice president of security strategy Marc van Zadelhoff .

The century-old business technology titan made a priority of defending computer networks about two years ago, unifying resources from more than a dozen security firms it acquired.

IBM's computer security unit has been "growing like gangbusters," according to van Zadelhoff.

According to industry tracker IDC, IBM significantly outpaced overall computer protection company market growth and last year was the third largest seller of cyber defense software.

IBM on Monday ramped up its offerings with a Threat Protection System and a Critical Data Protection Program.

Introduction of the new cyber security weapons came with the release of IBM-funded Ponemon Institute studies showing that the number of hacker attacks is climbing along with the cost.

The average cost of a hack to a business has risen 15% to $6.2 million including lost revenue and productivity, according to Ponemon findings released by IBM.

The Critical Data Protection program uses an array of techniques to safeguard the data equivalent of a company's "crown jewels," according to van Zadelhoff.

IBM has tapped into intelligence about threats and hacker tactics from computer networks it cares for around the world.

Defensive techniques go beyond maintaining watch-lists for known malicious codes to identifying when applications in networks act unusually and then pouncing to see whether hacker mischief is the cause.

"Traditional methods of prevention have often failed, leaving many to believe detection is the only way forward," IBM security systems general manager Brendan Hannigan said.

"You must be able to prevent exploitations of known and unknown vulnerabilities."

  Copyright Agence France-Presse, 2014 

Popular Sponsored Recommendations

Why DataOps may be the key to unlocking the full potential of digital transformation

Nov. 3, 2023
Read the 2023 market survey conducted by IndustryWeek

Shifting Your Business from Products to Service-Based Business Models: Generating Predictable Revenues

Oct. 27, 2023
Executive summary on a recent IndustryWeek-hosted webinar sponsored by SAP

Powering Up Productivity: The Transformative Power of AP Automation in Manufacturing

Oct. 25, 2023
Discover how AP Automation is revolutionizing the manufacturing industry, driving efficiency, cost savings, and security. In today's world, automation is the key to staying competitive...

Gain a competitive edge with real-world lessons on private 5G networks

Nov. 16, 2023
The use of private networks in manufacturing applications is rapidly growing. In this paper, we present valuable insights and lessons learned from the field with the goal of enhancing...

Voice your opinion!

To join the conversation, and become an exclusive member of IndustryWeek, create an account today!