Cyber Security

IBM rolls out new zero trust capabilities to Cloud Pak for Security

Technology giant IBM adds zero trust capabilities to Cloud Pak for Security, a containerized software platform that integrates organizations’ existing security tools to generate deeper insights into threats.

IBM said the features’ new Software as a Service (SaaS) version is designed to enable customers to easily adopt a zero trust approach to security by applying the principles of least privilege access. The partnership with Zscaler, a network security provider, will ensure the new features will help customers adopt the zero trust approach to security.

Applying the core principles of zero trust — least privilege access; never trust, always verify, and assume breach — new IBM Security zero trust blueprints will enable companies to build their own prescriptive roadmap of security capabilities along with guidance on how to integrate them as part of a zero trust architecture.

IBM Security stresses need to ‘reimagine’ cybersecurity threats

IBM: Open source platform can help clients modernize security programs end to end

Among the key features of these capabilities are providing customer privacy, securing the hybrid and remote workforce, reducing the risk of insider threat, and protecting the hybrid cloud.

Connecting security ecosystem

Employing an open approach to security will help address the increasing security concerns of a multi-location office of the remote workforce. The partnership with Zscaler is meant to simplify and connect security across the organizations’ ecosystem of vendors to achieve a zero trust approach.

IBM Cloud Pak for Security now combines capabilities in threat management and data security into a single, modular, easier to consume solution. And with the new IBM Cloud Pak for Security as a Service, customers gain the option to choose between an owned or hosted deployment model, whichever is best suited for their environment and needs. It also provides access to a unified dashboard across threat management tools, with the option to easily scale with a usage-based pricing approach.

“Our customers need to secure their rapidly changing business environments without causing delays or friction in their daily operations,” said Mary O’Brien, GM, IBM Security. “It’s not uncommon to have users, data and applications operating in different environments. They all need to connect to one another quickly, seamlessly, and securely. A zero trust approach offers a better way to address the security complexity that is challenging businesses today.”