Skip to main content

IBM Security Solutions

Press and analyst reports


Get the latest news about IBM Security Solutions

Subscribe to the IBM Security Solutions XML feed

Analyst reports

Featured report
EMA Report: High Performers and Foundational Controls: Building A Strategy For Security and Risk Management

With all the attention given to the increasing sophistication of threats, and the security implications of technology trends such as Virtualization and Cloud Computing, is your enterprise ready for tomorrow's security risks? Download this informative white paper from Enterprise Management Associates® (EMA™) to learn about the broad domains of controls enterprises must consider in order to build a solid foundation for IT security management, and how IBM offers solutions that combine breadth as well as depth in security expertise backed by primary research and development that only IBM can deliver.

Securing Cloud Computing using IBM Solutions: An IBM publication featuring analysis from Gartner

A look at cloud computing and its security issues. Organizations potentially can gain a competitive or cost advantage through selective adoption of cloud computing, but not without first taking a comprehensive look at the associated risks, ensuring that they are consistent with business goals, along with the expectations of regulators, auditors, shareholders and partners. Assessing the risks associated with cloud computing and how they can impact critical applications and services in the organization is a critical factor in this decision-making process. Organizations can also consider options to mitigate and manage these IT security risks.

SC Magazine Best Buy Award

SC Magazine recently awarded IBM Managed Protection Service 5 stars and the Best Buy Award.

Gartner: MarketScope for Enterprise Single Sign-On

The ESSO market has matured in 2009, with market leaders accelerating their growth at the expense of smaller players. ESSO is still a valid choice for enterprises with users who must manage an unacceptable number of passwords for two or more years.

EMA Report: The Creation of the IBM Security Tiger Team Could Be the Roar the Security Market Has Been Waiting For

IBM announced the creation of a new Security Tiger Team. Over the past few years, IBM has acquired some of the most powerful, well-respected IT security vendors on the market. Unfortunately, from a security perspective, these acquisitions were made tactically and not strategically. As a result, IBM's security capabilities have remained segmented between their software, hardware, and services divisions. This, however, is changing very rapidly. In late 2007 IBM created their security framework in order to build the roadmap for a unified IBM security strategy. The Tiger Team is an extension of this effort. The IBM Security Tiger Team will deliver deep consultative skills in an effort to help clients understand how the deployment of IBM products can address issues of security, risk, and compliance. For IBM, this is an important step toward revealing the company as the large and powerful security vendor it truly is.

Butler Group View: Technology Audit - IBM Identity and Access Management

IBM offers a range of products that address a very broad scope of requirements in the Identity and Access Management (I&AM) space, and positions these within its overall approach to security and service management, and on a platform of standards that pervades end-to-end.

Review of Rational AppScan

A hands-on look at IBM Rational AppScan Standard Edition by Enterprise Management Associates (EMA).

Gartner: Magic Quadrant for User Provisioning

User provisioning delivers the ability to manage identities across systems, applications and resources. Economic conditions stress efficiency as the main driver, but compliance remains crucial. Identity and access management intelligence and role life cycle management are increasingly top of mind.

Gartner: Magic Quadrant for Security Information and Event Management

Broad adoption of SIEM technology is driven by compliance and security needs. New use cases in areas such as application activity monitoring are emerging.

IDC: IBM Security Summit

The IBM Security Summit took place in Boston, Massachusetts, on October 1, 2008. This event was an opportunity for market analysts to get a better understanding of how IBM has integrated security companies it has recently purchased to provide security solutions to enterprises and hear the latest announcements on new security initiatives.

Gartner: Web Access Management

Gartner analysis of the Web access management market. Larger vendors capitalizing on installed customer bases are experiencing the most growth, while smaller vendors are less able to differentiate themselves in this mature market.

The EMA™ All-Stars™ in Enterprise Systems Management for 2008

In this EMA™ Research Report, Enterprise Management Associates highlights what it considers to be the best available software solutions in 18 specific enterprise systems management disciplines, in order to form a 'Systems Management All-Star' team.

Not an end in itself: Information protection and return on risk

2007 survey shows two-thirds of responding companies decided against using a technology or service (instant messaging, wikis, etc.) due to security concerns. Enhancing security can allow companies to reap the rewards of valuable technology.

We're here to help

We're here to help

Easy ways to get the answers you need.

or call us at
Priority code:

Internet threat information

Related links