Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

10/25/2020
05:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

IBM Advances Cloud Pak for Security to Manage Threats Across Tools, Teams & Clouds

ARMONK, N.Y., Oct. 14, 2020 - IBM (NYSE: IBM) Security today announced new capabilities for Cloud Pak for Security, including a first of its kind data security solution that allows companies to detect and respond to threats to their most sensitive data across hybrid cloud environments. Designed to unify previously disconnected security technologies, IBM has expanded Cloud Pak for Security to include new data sources, integrations, and services that allow security operations teams to manage the full threat lifecycle from a single console.

With these updates, Cloud Pak for Security will include[1] access to six threat intelligence feeds, 25 pre-built connections to IBM and third-party data sources, and 165 case management integrations which are connected through advanced AI to prioritize threats, and automation playbooks to streamline response actions for security teams.

As cloud adoption and remote work have dispersed the traditional IT perimeter, security response teams need deeper insights into security across hybrid cloud environments. User behavior, identities and data security have traditionally been siloed from threat management activities – with different teams, tools and workflows. With the new capabilities, Cloud Pak for Security has become the first platform in the industry to connect data-level insights and user behavior analytics with threat detection, investigation and response.

Today IBM is announcing new capabilities to advance the Cloud Pak for Security even further, including:

·       Coordinated Threat Response + Data Security: A new industry-first approach provides security teams with visibility into data activity, compliance and risk – without needing to leave their primary response platform. The new built-in data security hub1 allows analysts to quickly gain context into where their sensitive data resides across hybrid cloud environments, as well as who has access to it, how it is used, and the best way to protect it. Bridging the disconnect between data security and threat management can help significantly reduce the timeline for responding to data breaches, which currently take more than six months to identify and contain on average.[2]

·       Access to Industry Leading Threat Intelligence: Cloud Pak for Security is expanding its collection of threat intelligence, helping clients detect early warning signs of active threat campaigns impacting companies around the world. In addition to IBM’s leading X-Force Threat Intelligence Feed, the platform will also include1 pre-built integrations for five additional threat intelligence feeds from third-party sources such as AlienVault OTX, Cisco Threatgrid, MaxMind Geolocation, SANS Internet StormCenter and Virustotal – with additional threat feeds to be added in 2021.

·       Dedicated Services and Support: IBM is launching new dedicated Security Services offerings to get clients up and running with Cloud Pak for Security with a holistic approach connecting products and services. With a wide range of flexible service options, IBM experts can help clients deploy and manage Cloud Pak Security across any environment, with options such as end-to-end threat management, managed security services, as well as strategy consulting and integration support.

“Complexity is the greatest challenge facing our industry, forcing resource-strapped security teams to manually connect the dots between disparate tools and sources of security data,” said Justin Youngblood, Vice President, IBM Security. “Cloud Pak for Security is built on open, cloud native technologies from the ground up to connect any tool within the security ecosystem. With these updates, we will be the first in the industry to bring together external threat intelligence and threat management alongside data security and identity, helping organizations to modernize their security operations and create the foundation for a zero trust security strategy.”

Open Connections Across the Security Ecosystem

Cloud Pak for Security leverages open technologies to create an interoperable foundation and deeper connections between the IBM and third-party tools. For instance, the platform uses STIX-Shifter, an open-source library that allows security analysts to search for threat indicators across all connected data sources with a single query. Additionally, Cloud Pak for Security is built on Red Hat OpenShift, providing an open, containerized foundation that can be easily deployed across on-premise, public and private cloud environments.  

This open approach allows Cloud Pak for Security to be more than simply a collection of security capabilities, but rather a platform to fully integrate security processes across tools and clouds. The platform uses advanced AI, analytics and automation to streamline the full lifecycle of threat management – including native capabilities for Security Information and Event Monitoring (SIEM), Threat Intelligence, User Behavior Analytics, Data Security and SOAR. These capabilities are delivered through a single, unified user interface that connects the entire threat management process via end-to-end workflows, from detection through response.

Through IBM Security’s participation in the Open Cybersecurity Alliance, the company will continue to work with the community to advance the development and adoption of open technologies to make security more interoperable.

Unified Product and Services Approach

Cloud Pak for Security’s open framework makes it an ideal solution for collaboration between security teams and external service providers that augment companies’ security skills and expertise. Cloud Pak for Security also supports multi-tenancy, enabling service providers to leverage a single instance of the platform to serve multiple companies and sub-organizations while keeping their data isolated.

The extensive capabilities of Cloud Pak for Security can be fully supported by and integrated with IBM Security Services, with unified offerings that connect technologies and services. Clients can take advantage of X-Force Threat Management, an ongoing, end-to-end threat management service that uses a programmatic approach to help clients mature their overall threat management strategy over time. Companies can also leverage a wide variety of IBM Managed Security Services, using Cloud Pak for Security to facilitate real time collaboration and visibility between clients and service teams. Alternatively, companies can leverage IBM Security expert consultants to help them plan for, deploy and integrate the Cloud Pak for Security with their existing security investments.

To learn more about IBM Cloud Pak for Security and stay up to date regarding its latest capabilities, visit https://www.ibm.com/products/cloud-pak-for-security.

 

About IBM Security

IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned IBM X-Force® research, enables organizations to effectively manage risk and defend against emerging threats. IBM operates one of the world's broadest security research, development and delivery organizations, monitors 70 billion security events per day in more than 130 countries, and has been granted more than 10,000 security patents worldwide. For more information, please check www.ibm.com/security, follow @IBMSecurity on Twitter or visit the IBM Security Intelligence blog



[1] Reflects availability within Q4 2020.

[2] 2020 Cost of a Data Breach Report, IBM Security and Ponemon Institute

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-29367
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
CVE-2020-26245
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
CVE-2017-15682
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
CVE-2017-15683
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.
CVE-2017-15684
PUBLISHED: 2020-11-27
Crafter CMS Crafter Studio 3.0.1 has a directory traversal vulnerability which allows unauthenticated attackers to view files from the operating system.