Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
IBM Advances Cloud Pak for Security to Manage Threats Across Tools, Teams & Clouds
Open platform leverages AI and automation to streamline threat management across hybrid cloud environments and disparate security tools
October 26, 2020
6 Min Read
ARMONK, N.Y., Oct. 14, 2020 - IBM (NYSE: IBM) Security today announced new capabilities for Cloud Pak for Security, including a first of its kind data security solution that allows companies to detect and respond to threats to their most sensitive data across hybrid cloud environments. Designed to unify previously disconnected security technologies, IBM has expanded Cloud Pak for Security to include new data sources, integrations, and services that allow security operations teams to manage the full threat lifecycle from a single console.
With these updates, Cloud Pak for Security will include access to six threat intelligence feeds, 25 pre-built connections to IBM and third-party data sources, and 165 case management integrations which are connected through advanced AI to prioritize threats, and automation playbooks to streamline response actions for security teams.
As cloud adoption and remote work have dispersed the traditional IT perimeter, security response teams need deeper insights into security across hybrid cloud environments. User behavior, identities and data security have traditionally been siloed from threat management activities – with different teams, tools and workflows. With the new capabilities, Cloud Pak for Security has become the first platform in the industry to connect data-level insights and user behavior analytics with threat detection, investigation and response.
Today IBM is announcing new capabilities to advance the Cloud Pak for Security even further, including:
· Coordinated Threat Response + Data Security: A new industry-first approach provides security teams with visibility into data activity, compliance and risk – without needing to leave their primary response platform. The new built-in data security hub1 allows analysts to quickly gain context into where their sensitive data resides across hybrid cloud environments, as well as who has access to it, how it is used, and the best way to protect it. Bridging the disconnect between data security and threat management can help significantly reduce the timeline for responding to data breaches, which currently take more than six months to identify and contain on average.
· Access to Industry Leading Threat Intelligence: Cloud Pak for Security is expanding its collection of threat intelligence, helping clients detect early warning signs of active threat campaigns impacting companies around the world. In addition to IBM’s leading X-Force Threat Intelligence Feed, the platform will also include1 pre-built integrations for five additional threat intelligence feeds from third-party sources such as AlienVault OTX, Cisco Threatgrid, MaxMind Geolocation, SANS Internet StormCenter and Virustotal – with additional threat feeds to be added in 2021.
· Dedicated Services and Support: IBM is launching new dedicated Security Services offerings to get clients up and running with Cloud Pak for Security with a holistic approach connecting products and services. With a wide range of flexible service options, IBM experts can help clients deploy and manage Cloud Pak Security across any environment, with options such as end-to-end threat management, managed security services, as well as strategy consulting and integration support.
“Complexity is the greatest challenge facing our industry, forcing resource-strapped security teams to manually connect the dots between disparate tools and sources of security data,” said Justin Youngblood, Vice President, IBM Security. “Cloud Pak for Security is built on open, cloud native technologies from the ground up to connect any tool within the security ecosystem. With these updates, we will be the first in the industry to bring together external threat intelligence and threat management alongside data security and identity, helping organizations to modernize their security operations and create the foundation for a zero trust security strategy.”
Open Connections Across the Security Ecosystem
Cloud Pak for Security leverages open technologies to create an interoperable foundation and deeper connections between the IBM and third-party tools. For instance, the platform uses STIX-Shifter, an open-source library that allows security analysts to search for threat indicators across all connected data sources with a single query. Additionally, Cloud Pak for Security is built on Red Hat OpenShift, providing an open, containerized foundation that can be easily deployed across on-premise, public and private cloud environments.
This open approach allows Cloud Pak for Security to be more than simply a collection of security capabilities, but rather a platform to fully integrate security processes across tools and clouds. The platform uses advanced AI, analytics and automation to streamline the full lifecycle of threat management – including native capabilities for Security Information and Event Monitoring (SIEM), Threat Intelligence, User Behavior Analytics, Data Security and SOAR. These capabilities are delivered through a single, unified user interface that connects the entire threat management process via end-to-end workflows, from detection through response.
Through IBM Security’s participation in the Open Cybersecurity Alliance, the company will continue to work with the community to advance the development and adoption of open technologies to make security more interoperable.
Unified Product and Services Approach
Cloud Pak for Security’s open framework makes it an ideal solution for collaboration between security teams and external service providers that augment companies’ security skills and expertise. Cloud Pak for Security also supports multi-tenancy, enabling service providers to leverage a single instance of the platform to serve multiple companies and sub-organizations while keeping their data isolated.
The extensive capabilities of Cloud Pak for Security can be fully supported by and integrated with IBM Security Services, with unified offerings that connect technologies and services. Clients can take advantage of X-Force Threat Management, an ongoing, end-to-end threat management service that uses a programmatic approach to help clients mature their overall threat management strategy over time. Companies can also leverage a wide variety of IBM Managed Security Services, using Cloud Pak for Security to facilitate real time collaboration and visibility between clients and service teams. Alternatively, companies can leverage IBM Security expert consultants to help them plan for, deploy and integrate the Cloud Pak for Security with their existing security investments.
To learn more about IBM Cloud Pak for Security and stay up to date regarding its latest capabilities, visit https://www.ibm.com/products/cloud-pak-for-security.
About IBM Security
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned IBM X-Force® research, enables organizations to effectively manage risk and defend against emerging threats. IBM operates one of the world's broadest security research, development and delivery organizations, monitors 70 billion security events per day in more than 130 countries, and has been granted more than 10,000 security patents worldwide. For more information, please check www.ibm.com/security, follow @IBMSecurity on Twitter or visit the IBM Security Intelligence blog
 Reflects availability within Q4 2020.
 2020 Cost of a Data Breach Report, IBM Security and Ponemon Institute
You May Also Like
Your Everywhere Security guide: Four steps to stop cyberattacksFeb 27, 2024
Your Everywhere Security Guide: 4 Steps to Stop CyberattacksFeb 27, 2024
API Security: Protecting Your Application's Attack SurfaceFeb 29, 2024
API Security: Protecting Your Application's Attack SurfaceFeb 29, 2024
Securing the Software Development Life Cycle from Start to FinishMar 06, 2024
Laptop with ransomware, and bitcoin in the palm of a man's hand to illustrate ransomwareCyberattacks & Data Breaches