IBM secures mobile and instrumented devices
IBM announced new initiatives to extend security to the growing number of mobile and instrumented devices beyond an organization’s own four walls, such as smartphones, ATMs, retail kiosks, traffic systems, meters, buildings and sensors.
By 2015, it’s estimated that there will be one trillion connected devices, many of which will be instrumented with real-time capabilities to respond quickly and accurately to the environment. While this intelligence provides great opportunities, it is also creating emerging security vulnerabilities that companies need to address.
Businesses today are tasked with managing thousands of computing devices and ensuring they remain available, secure and at their proper configurations according to policies and requirements.
As the risks associated with securing these endpoints grows more complex, the cost of managing and securing them is escalating rapidly. IDC expects that the endpoint security market will increase at a compound annual growth rate of 8.3% and reach nearly $10 billion in 2014.
Today, IBM is unveiling new research projects, software, and services partnerships to help organizations better manage the security of their increasingly intelligent, interconnected and intelligent infrastructures. Highlights include:
- New endpoint management software to secure PCs, laptops and point-of-sale devices such as ATMs and retail kiosks
- Investments in R&D to secure mobile smartphones such as Android-based devices, and smart meters
- New joint work with Juniper Networks to deliver security services for mobile devices.
Computing endpoints are proliferating daily to include sensors, water systems, mobile devices, cars, electric grids, transportation systems and cities. As corporate infrastructures continue to interact with these endpoints, which reside outside of their organization, the demand for greater security controls is growing.
IBM announced Tivoli Endpoint Manager, a new offering that integrates the assets acquired with BigFix into the IBM portfolio. The software extends IBM’s capabilities to manage the security and compliance of servers, desktops, roaming laptops, and point-of-sale devices, such as ATMs and self-service kiosks.
While the influx of personal mobile devices on corporate networks is bringing convenience and efficiency to many employees and companies, it can also raise concerns for organizations as they struggle to manage the security risks associated with these new devices accessing their networks. To enable clients to more securely manage their mobile workforce:
- IBM Security Services and Business Partner, Juniper Networks, are delivering joint security services for mobile devices for platforms such as Apple iOS, Android, Symbian, Blackberry OS and Windows through the Juniper Networks Junos Pulse Mobile Security Suite.
- IBM researchers and developers are also prototyping new technologies to seamlessly manage security and compliance challenges involving mobile smart phones, such as Android-based devices. Using a single management platform, organizations will be able to extend management across any mobile device on their network. With the ability to install in minutes, customers will quickly be able to remotely set policies, monitor employees devices to identify potential data compromise and wipe data off the devices if they are lost or stolen.