SHARE
Facebook X Pinterest WhatsApp

IBM Unveils Threat Protection System

How Heartbleed Is Changing Security IBM today extended the scope of its security intelligence framework to create the IBM Threat Protection System, which is aimed at creating a closed-loop approach to security management that spans from the discovery of the vulnerability to remediation of known breaches. Based on an array of security technologies that IBM […]

Written By
MV
Mike Vizard
May 5, 2014
Slide Show

How Heartbleed Is Changing Security

IBM today extended the scope of its security intelligence framework to create the IBM Threat Protection System, which is aimed at creating a closed-loop approach to security management that spans from the discovery of the vulnerability to remediation of known breaches.

Based on an array of security technologies that IBM both developed and acquired, the IBM Threat Protection System includes a new IBM Trusteer Apex solution for quarantining malware on endpoints. The system also provides enhanced forensics tools and the ability to block identified security threats via a single click using the IBM QRadar security intelligence platform.

In addition, IBM is launching a Critical Data Protection Program designed to safeguard an organization’s most critical intellectual property.

Kevin Skapinetz, director for product and security strategy for IBM, says the IBM Threat Protection System is designed to help IT organizations counter everything from the most advanced persistent threats (APTs) to massive waves of attacks designed to overwhelm and paralyze IT security defenses.

Regardless of the increased scale and lethality of the attacks, IT organizations are still confronted with the same core security issues. IT organizations need to be right every day, while purveyors of malware need to be right only once. Unfortunately, there’s never been more at risk. Two IBM-commissioned surveys from the Ponemon Institute found the cost of a data breach increased by 15 percent, reaching an average of $3.5 million. The studies also found that targeted attacks can now cost businesses $9.4 million in brand equity alone.

No matter what the business is defending against, the organization’s war on modern malware requires more reliance on automation and intelligence than ever before. The challenge, of course, is that most organizations don’t have the time and resources needed to develop those capabilities on their own. Once you come to terms with that new reality, relying on IT security provided as a service is really the only IT security option that makes any sense.

Naturally, IBM isn’t the only company trying to deliver the security intelligence platforms to provide those services. But given the commitment IBM has made to craft those services, it would seem that IBM is determined to play a leading role in the IT security war that is likely to continue well into the middle of this century and beyond.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.