cloud security, Cloud Security Solution, IBM Cloud Security, IBM Cloud Security Solution, Security

Current IBM Cloud Security Solution blends existing device information

IBM revealed on Wednesday that Cloud Pak for Safety, a platform designed to help companies hunt down hazards by integrating data from multiple platforms and clouds, is broadly available.

Security Cloud Pak can access and convert security information from existing tools. The applications IBM, Carbon Black, Elastic, Tenable, Splunk and BigFix are currently supported. As it utilizes open source technologies, however, customers can also connect other data sources, says IBM.

IBM is one of the founding members of the newly established Open Cybersecurity Alliance (OCA) which has allowed it to develop partnerships with many major suppliers.

Cloud Pak for Security can easily be built in buildings, private cloud or public cloud settings, the company claims. IBM Cloud, AWS, and Microsoft Azure are the answer.

One of Cloud Pak’s main advantages for security, IBM says, is that organizations can obtain useful insights without having to move any data to the analysis platform.

“Moving data to analyze it often leads to unnecessary costs, difficulty and enforcement problems,” IBM Security Vice President Justin Youngblood explained.

The Data Explorer framework of the new solution will help security analysts quickly identify risk indicators in their environments without manual searches in any context.

Cloud Pak for Security also offers the orchestration and optimization of incident response tools that can help security teams save time.

“Organizations are quick to adopt new security technologies to meet recent threats, but now they’re jongling with dozens of connected tools that don’t always work together well,” said Enterprise Strategy Group senior analyst Jon Oltsik. “The industry must resolve this problem for consumers by moving to more open technology and integrated networks that can act as the connection between safety points. IBM’s approach is aligned with this requirement and can unite all security stack layers in a single simplified interface.

Source : HackerCombat

Previous ArticleNext Article

Send this to a friend