IBM Expands its Cyber-Security Offerings With Two New Weapons

Advertisement
By Agence France-Presse | Updated: 6 May 2014 10:31 IST

IBM on Monday moved deeper into defending business computers with a new service aimed at thwarting hackers before they do damage.

"The need for security to become part of our strategy has been natural," IBM vice president of security strategy Marc van Zadelhoff told AFP.

The century-old business technology titan made a priority of defending computer networks about two years ago, unifying resources from more than a dozen security firms it acquired.

Advertisement

IBM's computer security unit has been "growing like gangbusters," according to van Zadelhoff.

Advertisement

According to industry tracker IDC, IBM significantly outpaced overall computer protection company market growth and last year was the third largest seller of cyber-defense software.

IBM on Monday ramped up its offerings with a Threat Protection System and a Critical Data Protection Program.

Advertisement

Introduction of the new cyber-security weapons came with the release of IBM-funded Ponemon Institute studies showing that the number of hacker attacks is climbing along with the cost.

The average cost of a hack to a business has risen 15 percent to $6.2 million including lost revenue and productivity, according to Ponemon findings released by IBM.

Advertisement

The Critical Data Protection program uses an array of techniques to safeguard the data equivalent of a company's "crown jewels," according to van Zadelhoff.

IBM has tapped into intelligence about threats and hacker tactics from computer networks it cares for around the world.

Defensive technics go beyond maintaining watch-lists for known malicious codes to identifying when applications in networks act unusually and then pouncing to see whether hacker mischief is the cause.

"Traditional methods of prevention have often failed, leaving many to believe detection is the only way forward," IBM security systems general manager Brendan Hannigan said in a release.

"You must be able to prevent exploitations of known and unknown vulnerabilities."

 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Advertisement

Related Stories

Popular Mobile Brands
  1. iOS 26 Update Brings These New Features to AirPods Pro 3, Pro 2, AirPods 4
  2. iPhone 17 Pro Max Cosmic Orange Variant Out of Stock in the US, India: Report
  3. Samsung Galaxy Tab A11, Tab A11+ Design, Features Leaked Ahead of Launch
  4. Flipkart Big Billion Days Sale: Check Discounts on These Poco Smartphones
  5. iOS 26 Released Alongside iPadOS 26, macOS Tahoe: Here's How to Download It
  6. MediaTek Confirms Dimensity 9500 Launch Date; Timeline to Its First 2nm Chip
  1. Sony Said to Be Planning State of Play Broadcast for Next Week
  2. France Could Block Crypto Firms With MiCA Licenses Due to Enforcement Gap Concerns
  3. Oppo Find X9 Pro With Dimensity 9500 SoC Scores 4 Million Points on AnTuTu; Spotted on Geekbench
  4. Xiaomi 17 Pro Design Render Gives Us a Good Look at Its Leica-Branded Rear Cameras, Secondary Display
  5. Clair Obscur: Expedition 33 Has Sold 4.4 Million Copies in Less Than Six Months of Launch
  6. Materialists Now Streaming on Netflix: What You Need to Know About Dakota Johnson’s Starrer Movie
  7. The Trial Season 2 OTT Release Date: When and Where to Watch Kajol’s Legal Drama Series Online
  8. Ghaati OTT Release Reportedly Revealed Online: When and Where to Watch Anushka Shetty-Starrer Movie Online?
  9. American Express Launches NFT Passport Stamps to Commemorate Travel Memories
  10. Huawei Watch GT 6, GT 6 Pro Price, Specifications Leak Ahead of September 19 Launch: Report
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.