New IBM Software Delivers Real-Time Security Across Computer Networks
ARMONK, NY - 13 Jul 2006: IBM today announced new security software that helps corporate IT departments, telecom service providers and IT outsourcing companies keep their computer networks and systems up and running despite security attacks by malicious outsiders, employees or contractors. The software secures networks by automatically detecting and managing security threats as they happen, rather than after the damage is done.
By using IBM’s real-time network security watchdog, organizations can react quickly when their networks are struck by denial-of-service attacks or hackers. It can also spot insider attacks, such as when a former employee with lingering company access tries to access sensitive company information, such as financial or customer data, which can lead to compliance violations.
The new software -- IBM Tivoli Security Operations Manager -- will be the company’s first product to incorporate technology from IBM’s acquisition of Micromuse, and comes only five months after the acquisition closed in February 2006. The software expands on the capabilities of the Neusecure product, which was recently positioned in the leaders quadrant in the Gartner Magic Quadrant for Security Information and Event Management.
Today’s service providers support always-on global data networks that deliver customer information, sales records and shipping updates. A denial-of-service attack can cripple an online retailer’s ability to conduct transactions, stop an ISP from serving its clients, or prevent employees from accessing healthcare information on their company intranet.
By integrating network, security, identity and systems management, IBM Tivoli Security Operations Manager can minimize how computer networks are affected by computer worms, which are a growing scourge. A single worm could potentially cause $50 billion of worldwide damage, according to the International Computer Science Institute.
The new IBM software automates how security data is collected and analyzed across an IT infrastructure and prioritizes security incidents via a real-time dashboard. This cuts a company’s response time from minutes to milliseconds and can make it less expensive for IT outsourcers, ISPs and corporations to maintain secure, available networks.
The software can help IT outsourcers and telecom service providers deliver more reliable service to their customers. Not only can the software monitor how security incidents impact the network’s health; network performance can be measured against service level agreements signed with their customers.
Companies can also use the software to monitor security controls in accordance with compliance initiatives such as Sarbanes-Oxley, Basel II, ISO17799 and CoBIT (Control Objectives for Information and related Technology), an industry framework for controlling and governing the use of technology.
“Current compliance initiatives, such as Sarbanes-Oxley, have moved security from being an esoteric practice to a boardroom-level initiative,” said Lloyd Carney, general manager, network management technology, IBM Tivoli. “Converging critical areas within network, systems and security management will make networks more dependable, a key benefit of IT service management.”
Software Monitors Security Policies, Compliance Reporting
IBM Tivoli Security Operations Manager enables companies to automatically monitor security controls and show their level of effectiveness through real-time and historical reporting. Automation is a major benefit for organizations struggling with yearly audits required by Sarbanes-Oxley and other mandates, which have become major financial drains on IT budgets.
The software offers a variety of rule and report templates that make it easier to monitor and report on security controls. Integration with different security, system and network devices, such as firewalls and host intrusion detection systems, enables the software to generate reports around audit-worthy security event details.
Tivoli Security Operations Manager integrates with network and systems management from Netcool Omnibus and Tivoli Enterprise Console -- especially to simplify workflow and communications between security and the rest of the IT organization. The software’s ability to pull security data from Netcool Omnibus enables companies to monitor security incidents tied to the growing adoption of voice, video and data over IP being delivered by service providers.
Tivoli Security Operations Manager derives other security features from Tivoli Identity Manager and Tivoli Access Manager, helping companies enforce internal security policies and detect foul play by employees and contractors. Insider attacks such as identity theft, whether perpetrated by employees or contractors, typically require access to sensitive systems. This user account and access information is managed by Tivoli Access Manager and Tivoli Identity Manager, and leveraged by Tivoli Security Operations Manager for proactive assessment of security threats.
IBM Tivoli Security Operations Manager will become available on July 17, 2006.
For more information on IBM, visit www.ibm.com
The Magic Quadrant for Security Information and Event Management, 1H06 is copyrighted May 12, 2006 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner’s analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the “Leaders” quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
IBM and Tivoli are trademarks of International Business Machines Corporation in the United States, other countries, or both. Other company, product or service names may be trademarks or service marks of others.
- Contact Information
- Libra White
- IBM Media Relations
- Contact via E-mail
This news content was configured by WebWire editorial staff. Linking is permitted.
News Release Distribution and Press Release Distribution Services Provided by WebWire.