IBM Expands its Cyber-Security Offerings With Two New Weapons

Advertisement
By Agence France-Presse | Updated: 6 May 2014 10:31 IST

IBM on Monday moved deeper into defending business computers with a new service aimed at thwarting hackers before they do damage.

"The need for security to become part of our strategy has been natural," IBM vice president of security strategy Marc van Zadelhoff told AFP.

The century-old business technology titan made a priority of defending computer networks about two years ago, unifying resources from more than a dozen security firms it acquired.

Advertisement

IBM's computer security unit has been "growing like gangbusters," according to van Zadelhoff.

Advertisement

According to industry tracker IDC, IBM significantly outpaced overall computer protection company market growth and last year was the third largest seller of cyber-defense software.

IBM on Monday ramped up its offerings with a Threat Protection System and a Critical Data Protection Program.

Advertisement

Introduction of the new cyber-security weapons came with the release of IBM-funded Ponemon Institute studies showing that the number of hacker attacks is climbing along with the cost.

The average cost of a hack to a business has risen 15 percent to $6.2 million including lost revenue and productivity, according to Ponemon findings released by IBM.

Advertisement

The Critical Data Protection program uses an array of techniques to safeguard the data equivalent of a company's "crown jewels," according to van Zadelhoff.

IBM has tapped into intelligence about threats and hacker tactics from computer networks it cares for around the world.

Defensive technics go beyond maintaining watch-lists for known malicious codes to identifying when applications in networks act unusually and then pouncing to see whether hacker mischief is the cause.

"Traditional methods of prevention have often failed, leaving many to believe detection is the only way forward," IBM security systems general manager Brendan Hannigan said in a release.

"You must be able to prevent exploitations of known and unknown vulnerabilities."

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. One Piece: Into the Grand Line OTT Release Date Revealed: What You Need to Know
  1. Hubble Observes Massive Stellar Eruption from EK Draconis, Hinting at Life’s Origins
  2. Scientists Detect Hidden Magnetic Waves That Could Explain the Sun’s Mysterious Heat
  3. Scientists Propose Space-Based Carbon-Neutral Data Centres for Sustainable Computing
  4. SpaceX Falcon Heavy Launch of Private Griffin Moon Lander Pushed to 2026 Amid Testing Phase
  5. Russian Cosmonauts Complete Second Spacewalk to Install New Experiments on ISS Exterior
  6. Tsinghua Scientists Create Light-Powered AI Chip Running at 12.5 GHz
  7. LIGO Detect Possible Second-Generation Black Holes with Extreme Spins
  8. Scientists Stunned as Earth’s Magnetosphere Shows Reversed Electric Charge Patterns
  9. One Piece: Into the Grand Line OTT Release Date Revealed: What You Need to Know
  10. Ballad of a Small Player Streaming Online: Know Where to Watch This Collin Farrell Starrer Movie
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.