Digital Edition

SYS-CON.TV
IBM Integrates Tivoli Into Its Global Services
Daily Security Intelligence Aims to Cut Time and Cost Associated with Manual Checks

"Imagine you’re the network manager of a huge corporation tasked with identifying security vulnerabilities across the entire IT organization," says an IBM security spokesperson. "Now consider that security threats to businesses worldwide shift on a monthly, weekly and even daily basis. Consider what’s involved with protecting the very PC you’re working on right now and then multiply the scale and sophistication of security threats to incredible levels."

This type of concern has prompted Big Blue to integrate the daily security intelligence comprising the IBM Global Business Security Index with Tivoli Security Compliance Manager. As a result of the integration, daily updates on security threats worldwide are fed into Tivoli Security Compliance Manager, "enabling organizations to automatically recognize IT systems that are missing key security patches based on the latest advisory information on current and emerging threats," the company states.

In addition to identifying vulnerable operating systems and software prior to costly damage inflicted by security breaches, the integration of SCM and the Global Business Security Index aims to facilitate the creation of consistent and highly advanced security policies in line with current and emerging threats.

 "By automatically scanning servers and desktop systems within the organization and enforcing security policy via a centralized tool, SCM significantly reduces the cost and time associated with performing manual security checks," the company says.

Compiled by 2,700 IBM security professionals and half a million monitored devices from Fortune 500 companies and government entities in 34 countries, the Global Business Security Index serves as a barometer of the daily changing threat landscape, helping organizations with tactical incident response and strategic security planning.

On average, IBM's monitoring service detects 100 million suspected or actual attacks against customers each month., the company reports.

About Security News Desk
SYS-CON's Security News desk trawls the world of security for news of software, hardware, products, and services that seems likely to be of interest to infosec professionals and summarizes them for easy assimilation by busy IT managers and staff.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1



ADS BY GOOGLE
Subscribe to the World's Most Powerful Newsletters

ADS BY GOOGLE

With the rise of Docker, Kubernetes, and other container technologies, the growth of microservices h...
Isomorphic Software is the global leader in high-end, web-based business applications. We develop, m...
As you know, enterprise IT conversation over the past year have often centered upon the open-source ...
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple ho...
DevOps is under attack because developers don’t want to mess with infrastructure. They will happily ...
Technology has changed tremendously in the last 20 years. From onion architectures to APIs to micros...
Kubernetes is an open source system for automating deployment, scaling, and management of containeri...
IT professionals are also embracing the reality of Serverless architectures, which are critical to d...
In his session at 20th Cloud Expo, Mike Johnston, an infrastructure engineer at Supergiant.io, will ...
"There is a huge interest in Kubernetes. People are now starting to use Kubernetes and implement it,...
Is advanced scheduling in Kubernetes achievable?Yes, however, how do you properly accommodate every ...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with exp...
Today most companies are adopting or evaluating container technology - Docker in particular - to spe...
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually ne...
Using serverless computing has a number of obvious benefits over traditional application infrastruct...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with exp...
When a company wants to develop an application, it must worry about many aspects: selecting the infr...
At its core DevOps is all about collaboration. The lines of communication must be opened and it take...
Modern software design has fundamentally changed how we manage applications, causing many to turn to...
In an age of borderless networks, security for the cloud and security for the corporate network can ...