Skip to main content

IBM Security Systems

Small Banner

Today's Smarter Planet is driving great opportunity for businesses around the globe.; By 2015, it's estimated that there will be one trillion connected devices, many of which will be instrumented with real-time capabilities to respond quickly and accurately to the environment. However, as the planet becomes increasingly interconnected, intelligent and instrumented, it is also creating emerging security vulnerabilities that organizations need to address.; IBM Security Solutions draws on the company's 40-years of deep security expertise in vertical industries, research, products, services, consulting and global business partners to deliver end-to-end security.  IBM has nine worldwide research labs innovating security technology and nine security operations centers around the world to help global clients maintain the appropriate security posture.

News releases
Date Title
18 Jun 2014 IBM Opens IT Security Operations Center in Costa Rica
30 May 2014 Made in IBM Labs: Patented IBM Invention Helps Eliminate Fraudulent Behavior in the Cloud
05 May 2014 IBM Advances Fight against Cyber Threats with Comprehensive Threat Protection System and Critical Data Protection Services
05 May 2014 Global Cost of Data Breach Increases by 15 percent, According to Ponemon Institute
18 Feb 2014 IBM Announces Security Forensics Capabilities to Help Protect Critical Data
15 Aug 2013 IBM to Acquire Trusteer to Help Companies Combat Financial Fraud and Advanced Security Threats
21 Feb 2013 IBM MobileFirst Helps Organizations Strengthen App Security
31 Jan 2013 IBM Announces Breakthrough with Combination of Security Intelligence and Big Data
18 Oct 2012 IBM Addresses Security Challenges of Big Data, Mobile and Cloud Computing
20 Sep 2012 IBM X-Force 2012 Mid-Year Trend and Risk Report: Rising Attacks Focus on Browsers and Social Media Networks
31 Jul 2012 IBM Introduces New Class of Network Security Appliance to Help Control Social Media and Web Browsing Risks
05 Jun 2012 New IBM Software Helps Strengthen Security of Mobile Devices in the Workplace
03 May 2012 IBM Study Reveals Critical Shift in the Role of Chief Information Security Executives Globally
22 Mar 2012 IBM X-Force Report: 2011 Shows Progress Against Security Threats But Attackers Adapt
22 Feb 2012 IBM Advances Security Intelligence to Help Organizations Combat Increasing Threats
07 Feb 2012 IBM Releases Free Internet Security Training Tools to Educate Students, Teachers and Parents on Digital Responsibility
11 Jan 2012 Made in IBM Labs: IBM Attacks the Complexity of Security with Identity Intelligence
11 Nov 2011 IBM Unveils Mobile Security Service to Protect Sensitive Corporate Data
03 Nov 2011 IBM Advances its Security Intelligence Portfolio with New Analytics
04 Oct 2011 IBM to Acquire Q1 Labs to Drive Greater Security Intelligence
29 Sep 2011 IBM X-Force Report Reveals Mobile Security Exploits to Double in 2011
31 Mar 2011 IBM X-Force Report: 2010 Marked a Year of Sophisticated, Targeted Security Attacks
01 Mar 2011 Survey: 90 Percent of IT Decision Makers Investing to Secure Computing Endpoints
15 Feb 2011 IBM Launches New Appliance to Extend Enterprise Security
09 Feb 2011 IBM Helps Organizations Secure Mobile and Instrumented Devices - Smartphones, Meters and Beyond

Images

  • Web Application Vulnerability

    Web Application Vulnerability

    Date added: 22 Mar 2012

    Figure 51 shows a steady decline in the instances of input control related vulnerabilities such as cross-site scripting (XSS) and SQL injection since X-Force began recording these statistics in 2007. In 2011, the statistics suggest that the likelihood of encountering XSS in a given test continues to decrease but shows signs of leveling out at approximately a 40 percent chance of occurring. Injection vulnerabilities and specifically SQL injection appears to have leveled out at around a 20 percent chance of occurring in a given test.

  • Mobile Operating System Exploits:

    Mobile Operating System Exploits:

    Date added: 22 Mar 2012

    Figure 43 shows an increase in mobile operating system exploits in 2011 due to an uptick in malicious activity targeting mobile devices. Because of the two-tiered relationship between phone end users, telecommunications companies, and mobile operating system vendors, disclosed mobile vulnerabilities can remain unpatched on phones for an extended period of time, providing a large window of opportunity to attackers.

  • The Source of Greatest Risk to Sensitive Data

    The Source of Greatest Risk to Sensitive Data

    Date added: 27 Feb 2012

    IBM and the Ponemon Institute recently conducted a survey of more than 265 C-level executives to determine what organizations believe are the most important factors when considering sensitive data and complying with strict security regulations. (credit: IBM)


Contact(s) for the Press kit

Tod Freeman
IBM Media Relations
1-415-320-5893
tefreema@us.ibm.com

Colleen Haikes
IBM Media Relations
1-415-545-4003
chaikes@us.ibm.com

Darcy Hansen
IBM Media Relations
1-415 806 4139
hansenda@us.ibm.com

Nicole Trager
IBM Media Relations
1-978-621-3076
ntrager@us.ibm.com