IBM Expands its Cyber-Security Offerings With Two New Weapons

Advertisement
By Agence France-Presse | Updated: 6 May 2014 10:31 IST
IBM Expands its Cyber-Security Offerings With Two New Weapons

IBM on Monday moved deeper into defending business computers with a new service aimed at thwarting hackers before they do damage.

"The need for security to become part of our strategy has been natural," IBM vice president of security strategy Marc van Zadelhoff told AFP.

The century-old business technology titan made a priority of defending computer networks about two years ago, unifying resources from more than a dozen security firms it acquired.

IBM's computer security unit has been "growing like gangbusters," according to van Zadelhoff.

Advertisement

According to industry tracker IDC, IBM significantly outpaced overall computer protection company market growth and last year was the third largest seller of cyber-defense software.

IBM on Monday ramped up its offerings with a Threat Protection System and a Critical Data Protection Program.

Advertisement

Introduction of the new cyber-security weapons came with the release of IBM-funded Ponemon Institute studies showing that the number of hacker attacks is climbing along with the cost.

The average cost of a hack to a business has risen 15 percent to $6.2 million including lost revenue and productivity, according to Ponemon findings released by IBM.

Advertisement

The Critical Data Protection program uses an array of techniques to safeguard the data equivalent of a company's "crown jewels," according to van Zadelhoff.

IBM has tapped into intelligence about threats and hacker tactics from computer networks it cares for around the world.

Defensive technics go beyond maintaining watch-lists for known malicious codes to identifying when applications in networks act unusually and then pouncing to see whether hacker mischief is the cause.

"Traditional methods of prevention have often failed, leaving many to believe detection is the only way forward," IBM security systems general manager Brendan Hannigan said in a release.

"You must be able to prevent exploitations of known and unknown vulnerabilities."

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Advertisement

Related Stories

Popular Mobile Brands
  1. iPhone 17 Air Battery Specifications, Weight and Other Details Leaked
  2. iPhone 17 Pro Max Design, Thicker Chassis Seen in Leaked Hands On Video
  3. You Can Now Buy Pixel 9 and More Pixel Devices from Google Store in India
  4. Nothing Phone 3 Design Teaser Shows Textured Button
  5. CMF Phone 2 Pro Review: A Perfect Blend of Style and Speed
  6. Honor Earbuds X9 With Up to 42 Hours Total Battery Life Launched
  1. WhatsApp Working on Logout Option for Primary Phones on Latest Beta Release: Report
  2. Tecno Pova Curve 5G With MediaTek Dimensity 7300 Ultimate SoC Launched in India: Price, Specifications
  3. Telegram to Distribute Grok Chatbot to Users After $300 Million xAI Deal
  4. Cyberpunk 2077 Sequel Sheds 'Project Orion' Codename, Enters Pre-Production Phase
  5. Honor Earbuds X9 With IP54 Rating, Up to 42 Hours Total Battery Life Launched
  6. Apple Updates Logic Pro for iPad and Mac With Flashback Capture, New Sound Packs and More
  7. Vallamai Now Streaming on Aha Tamil: Everything You Need to Know
  8. iPhone 17 Pro Max Spotted in Leaked Hands On Video That Reveals Design, Thicker Chassis
  9. iPhone 16 Tops Global Smartphone Sales in Q1 2025 as Apple Leads the Chart: Counterpoint
  10. Pixel 9, Pixel Watch 3 Now Directly Available for Purchase from Google Store in India; Offers Announced
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.