Posts Tagged ‘security intelligence’
Batten Down The Hatches! IBM’s X-Force 2012 Trend And Risk Report
It’s been a busy year for IT security incidents. Yesterday, John Markoff and Nicole Perlroth with The New York Times told us about yet another incident, this time a cyberattack involving antispam group Spamhaus and an anonymous group unhappy with their efforts.

Click to enlarge. Based on disclosed incident details such as the vulnerability used and attack type, IBM X-Force was able to determine that the majority of the security incidents disclosed in 2012 were carried out by the top left quadrant above, with attackers going after a broad target base while using off-the-shelf tools and techniques. This can be attributed to the wide public availability of toolkits, and to the large number of vulnerable web applications that exist on the Internet.
But the list goes on and on. From the discovery of sophisticated toolkits with ominous names like Flame to cross-platform zero-day vulnerabilities, both consumers and corporations have been inundated with advisories and alerts regarding emerging threats. The frequency of data breaches and incidents—which had already hit a new high in 2011—continued their upward trajectory.
At the mid-year of 2012, IBM’s X-Force team predicted that the explosive nature of attacks and security breaches seen in the first half would continue. Indeed this was the case. While talk of sophisticated attacks and widespread distributed denial-of-service (DDoS) attempts made the year’s headlines, a large percentage of breaches relied on tried and true techniques such as SQL injection.
What continues to be clear is that attackers, regardless of operational sophistication, will pursue a path-of-least-resistance approach to reach their objectives. Integration of mobile devices into the enterprise continues to be a challenge. In the previous report, X-Force looked at some of the pitfalls and perils of implementing BYOD programs without strict formulations of policy and governance to support the use of these devices.
That said, recent developments have indicated that while these dangers still exist, and X-Force believes mobile devices should be more secure than traditional user computing devices by 2014. While this prediction may seem far fetched on the surface, it is based on security control trends and requirements that are being driven into the market by knowledgeable security executives.
In its latest report, X-Force explores how security executives are advocating the separation of personas or roles on employee-owned devices. It also addresses some secure software mobile application development initiatives that are taking place today. The distribution and installation of malware on end-user systems has been greatly enabled by the use of Web browser exploit kits built specifically for this purpose.

Click to enlarge. The intense proliferation of social networking across the Internet poses new challenges to companies that need to control the sharing of confidential information. Any employee that has access to the Internet is going to be exposed to social networking sites and because they are so frequently accessed,
they have become a favorite target of scam and phishing.
Exploit kits first began to appear in 2006 and are provided or sold by their authors to attackers that want to install malware on a large number of systems. They continue to be popular because they provide attackers a turnkey solution for installing malware on end-user systems.
Java vulnerabilities have become a key target for exploit kits as attackers take advantage of three key elements: reliable exploitation, unsandboxed code execution, and cross-platform availability across multiple operating systems. Java exploits have become key targets in 2012 and IBM X-Force predicts this attack activity to continue into 2013.
As X-Force also reported in the mid-year, spam volume remained nearly flat in 2012, with India claiming the top country of origin for spam distribution, but the nature of spam is changing. Broadly targeted phishing scams, as well as more personalized spear-phishing efforts continue to fool end users with crafty social-engineering email messages that look like legitimate businesses. Also, fake banking alerts and package delivery service emails have been effective as attackers refine their messages to look like the authentic messages that customers might normally receive.
Whether the target is individuals or the enterprise, once again, X-Force reminds organizations that many breaches were a result of poorly applied security fundamentals and policies and could have been mitigated by putting some basic security hygiene into practice.
Web applications are still topping the chart of most disclosed vulnerabilities, rising 14% in 2012 over the 2011 end of year numbers. As reported earlier in the mid-year report, cross-site scripting (XSS) dominated the web vulnerability disclosures at 53% of all publicly released vulnerabilities. Although SQL injection attack methods remain as a top attack technique, the actual disclosures of new SQL injection vulnerabilities remain lower than the 2010 peak X-Force recorded.
Social media has dramatically changed our lives with new ways to connect, personally and professionally. From this constant availability of information about individuals, attackers can readily access data to use in their activities.
Now, more than ever, individual employees who share personal details in their social profiles can be targeted for attacks.

Click to enlarge. The values for the evaluated threat and residual threat can be determined by comparing the likelihood or frequency of a threat occurring (high, medium, low) against the damage impact that could happen if the threat occurred (catastrophic, high, medium, low). The goal is to implement mitigation processes that either reduce the frequency of the threat occurring or reduce the impact if the threat does occur. A requirement for this to be successful is to have a specific, designated monitoring mechanism to monitor the implementation of the treatment processes and for the appearance of the threats.
2012 X-Force Trend And Risk Report Highlight
Malware and the malicious web
- In 2012, near daily leaks of private information about victims were announced like game scoreboards through tweets and other social media. Personal details, such as email addresses, passwords (both encrypted and clear text), and even national ID numbers were put on public display.
- Based on data for 2012, it is not surprising that the bulk of the security incidents disclosed were carried out with the majority of attackers going after a broad target base while using off-the-shelf tools and techniques. X-Force attributes this to the wide public availability of toolkits and to the large number of vulnerable web applications that exist on the Internet.
- The year began and ended with a series of politically motivated, high-profile DDoS attacks against the banking industry. An interesting twist to the banking DDoS attacks was the implementation of botnets on compromised web servers residing in high bandwidth data centers. This technique assisted in much higher connected uptime as well as having more bandwidth than home PC’s to carry out the attacks. In the sampling of security incidents from 2012, the United States had the most breaches, at 46%. The United Kingdom was second at 8% of total incidents, with Australia and India tied for third at 3%.
- IBM Managed Security Services (MSS) security incident trends are markers that represent the state of security across the globe. The relative volume of the various alerts can help to describe how attacks are established and launched. They also frequently provide hints about how methods have evolved. Based on this, the main focus in 2012 may have been the subversion of systems, with larger coordinated attacks being executed across fairly broad swaths of the Internet.
- IBM MSS has noted a dramatic and sustained rise in SQL injection-based traffic due, in large part, to a consistent effort from the Asia Pacific region. The alerts came from all industry sectors, with a bias toward banking and finance targets.
- Web browser exploit kits (also known as exploit packs) are built for one particular purpose: to install malware on end-user systems. In 2012 X-Force observed an upsurge in web browser exploit kit development and activity—the primary target of which are Java vulnerabilities—and X-Force supplies some strategies and tips to help protect against future attacks (see end of post to download full report).
- Java continues to be a key target for attackers. It has the advantage of being both cross-browser and cross-platform—a rare combination that affords attackers a lot of value for their investment. Web content trends, spam, and phishing Web content trends Top used websites are readily deployed as IPv6- ready, although attackers do not yet seem to be targeting IPv6 on a large scale.
- One third of all web access is done on websites which allow users to submit content such as web applications and social media.
- Nearly 50% of the relevant websites now link to a social network platform, and this intense proliferation poses new challenges to companies that need to control the sharing of confidential information.
Spam and phishing
- Spam volume remained nearly flat in 2012.
- India remains the top country for distributing spam, sending out more than 20% of all spam in the autumn of 2012. Following India was the United States where more than 8% of all spam was generated in the second half of the year. Rounding out the top five spam sending countries of origin were Vietnam, Peru, and Spain.
- At the end of 2012, IBM reports that traditional spam is on the retreat, while scam and spam containing malicious attachments is on the rise. In addition, attackers are demonstrating more resiliency to botnet take downs which results in an uninterrupted flow of spam volume.
Operational Security Practices
Vulnerabilities and exploitation
- In 2012, there were over 8,168 publicly disclosed vulnerabilities. While not the record amount X-Force expected to see after reviewing its mid-year data, it still represents an increase of over 14% over 2011.
- Web application vulnerabilities surged 14% from 2,921 vulnerabilities in 2011 to 3,551 vulnerabilities in 2012.
- Cross-site scripting vulnerabilities accounted for over half of the total web application vulnerabilities disclosed in 2012. Cross-site scripting dominated the web vulnerability disclosures. Fifty-three percent of all publicly released web application vulnerabilities were cross-site scripting related. This is the highest rate X-Force has ever seen. This dramatic increase occurred while SQL injection vulnerabilities enjoyed a higher rate than 2011 but were still down significantly since 2010.
- There were 3,436 public exploits in 2012. This is 42% of the total number of vulnerabilities, up 4% from 2011 levels.
- Web browser vulnerabilities declined slightly for 2012, but not at as high a rate as document format issues. While the overall number of web browser vulnerabilities dropped by a nominal 6% from 2011, the number of high- and critical severity web browser vulnerabilities saw an increase of 59% for the year.
- Few innovations have impacted the way the world communicates quite as much as social media. However, with the mass interconnection and constant availability of individuals, new vulnerabilities and a fundamental shift in intelligence-gathering capabilities has provided attackers and security professionals alike with information useful for enhancing their activities.
- Rather than seeing a particular enterprise as an individual entity, attackers can view enterprises as a collection of personalities. This gives attackers the opportunity to target specific people rather than enterprise infrastructures or applications. Furthermore, targeted people may also be targeted as individuals and not just as employees. In other words, the personal activities and lives of employees can be leveraged to target an enterprise.
Emerging Trends In Security
Mobile
- Prediction: Mobile computing devices should be more secure than traditional user computing devices by 2014. This is a bold prediction that IBM recently made as part of its look ahead in technology trends. While this prediction may seem far-fetched on the surface, it is based on security control trends and requirements that are being driven into the market by knowledgeable security executives.
- Separation of personas or roles: While a small percentage of enterprises have dealt with BYOD by using virtualized desktop solutions to separate and control enterprise applications and data from the rest of the personally owned device, a greater number of enterprises have wanted or required some form of separation or dual persona on mobile devices. This difference in use or adoption could be the result of greater numbers of devices driving greater risk in the percentage of personally owned mobile devices versus personally owned PCs in a BYOD program.
- In many cases, enterprises have made significant investments into implementing Secure Software Development Life Cycle (SSDLC) processes. Today’s mobile application development benefits from this. Tools exist to support secure development as part of the process instead of being conducted in qualification or production. As a result, it should be more common for enterprises to have more securely developed mobile applications than their existing legacy applications. Closure of vulnerabilities in some traditional computing applications may only conclude as existing versions are sunset and replaced with newer, more securely developed replacements.
- Over 2012, it is safe to conclude that more enterprises are supporting BYOD or the use of personally owned devices than previously. In the last two years, IBM Security has spoken to hundreds of global 2000 customers and out of those interviewed, only three said they had no plans to implement any kind of BYOD program.
To learn more on how your organization can work to address these types of vulnerabilities, download the full IBM X-Force 2012 Trend And Risk Report here.
Live @ IBM Pulse 2013: A Cloud Computing Security Roundtable

At the IBM Cloud Security press roundtable, several IBM Security experts expounded on the issues and challenges organizations are facing as they work to better secure their cloud computing environments.
If you’ve followed the headlines recently, you can’t help but notice the constant barrage of news concerning security break-ins at some of the most public cloud sites on the planet: Facebook, Google, Evernote…the list goes on and on.
Yet in spite of the looming cloud security concerns, enterprises and organizations continue to ramp up their investments in both public and private cloud infrastructure as a cost-effective, dynamic way to scale up their IT capacity.
At the IBM Cloud Security roundtable here at IBM Pulse 2013 yesterday in Las Vegas, several IBM security experts came together to discuss some of the challenges, best practices, and solutions to protect against threats and provide security-rich cloud computing environments.
Jack Danahy, director of security for IBM North America, hosted the panel before the gathered industry press, and offered up some prefacing comments to set the stage for the security discussion.
Jack began by stating that 9 out of 10 global CEOs say that cloud computing is critical to their business plans and “a way to increase their organizational productivity, but all also admit security is a lingering concern.”
Brendan Hannigan, the general manager for the IBM Security Division, explained that there are some key basic security concerns around cloud, including the safety of enterprise data, and whether or not it can be compromised or lost.
Hannigan explained: “Cloud is simply another computer upon which we can deploy capabilities for our customers, and we should be able to look at cloud security the same way we do across other domains.” That includes giving organizations a single view of identity across their cloud environments.
Kris Lovejoy, general manager for IBM Security Systems, discussed some of the key inhibitors to organizations providing more effective cloud security measures, and explained that the cloud is actually inherently more securable than traditional IT infrastructure because of they way it’s designed and the manner by which you can replicate security controls.
So if the cloud is inherently more securable, why the seeming contradiction that nobody seems to be able to effectively secure it?
Because, Lovejoy explained, when you buy public cloud capability you typically have to buy the security features as an added extra, and may customers don’t do so.
“Think about the provider as being a hotel,” Lovejoy explained, “and in each hotel room they have a series of diseases. The provider must provide you good housekeeping to protect you from diseases in the other rooms, and yet so many cloud computing tenants don’t make that obvious investment to protect their cloud applications and data.”
When Danahy asked the panel about what can be done to make executives more comfortable with the idea of security investments in the cloud space, Hannigan chimed in, and explained the rationale comes down to a distinction in the type of data you’re working with, and delineating between the information that is critical and that which is less sensitive.
“When you have a specific application or data set,” Hannigan explained, “there are wonderful opportunities afforded by the cloud because in security, one of the biggest challenges is striking a balance between locking the infrastructure down and providing free and unfettered access to the that information customers and employees need.”
Lovejoy explained it was not dissimilar from the crazy notion of automakers selling cars without seatbelts or brakes. “You don’t want to suddenly discover you don’t have these features going 60 miles per hour down the interstate.”
Kevin Skapintez, program director of product strategy for IBM Security, said that the need for more cloud security standards reminded him of the late 1800s, when fire hydrants had different nozel sizes that required varying widths of connectors for the hoses.
“You have to have standards related to identity,” Kevin explained, “so you don’t have to build different registries per cloud!”
“More organizations needed to also heighten their log management regimes,” he explained, “so that they have improved visibility to see if they have the right controls in place and where incidents are occuring.”
Lovejoy explained that “most organizations have a pretty defined pathway to cloud success.” Many are using develop and test environments and are moving to non-core workloads, allowing a lot of applications to emerge and consolidate on the cloud.
At the same time, she explained, most companies are planning a security operations optimization and that the cloud is a remarkable opportunity. “As we consolidate,” she explained, “things get simpler. Companies need to think about this in the context of business transformation. You need to adopt the cloud in a safe and reliable manner while managing the risk.”
During the Q&A, I asked the panel whether or not all these very public public cloud security incidences we’ve seen in the headlines were driving any real productive conversation in terms of making cloud security more of a priority.
Lovejoy explained the scenario typically went something like this: A CEO would call up their provider, ask for an assessment, give them a threat briefing, then go to a third party standard to see if they matched the security checklist.
But that not enough of them were what she termed “security aware.”
Hannigan concluded, “It’s a classic dilemma with security spending. Security concerns are not specific just to the cloud, and clients are working about losing data, period. The question is, can they invest all the money necessary to adequately secure those environments?”
To date, the answer seems to largely be “no.”
Live From IBM Pulse 2013: Day 2 General Session — IBM Tivoli Customers Share Their Best Practices

Several prominent IBM Tivoli clients joined IBM senior vice president Robert Leblanc at the IBM Pulse 2013 day two general session to discuss their asset and infrastructure management best practices on the MGM Grand Arena stage.
If you missed Carrie Underwood last evening in the MGM Grand Arena, well…I’m sorry.
Actually, I’d find it difficult to believe anyone from IBM Pulse missed Carrie Underwood, as the place was packed to the rafters, and Carrie did not disappoint.
In fact, quite the opposite…and judging from the line waiting to get in that stretched all the way back to the MGM hotel elevators, well, let’s just say expectations were high.
And as we move into Pulse 2013 Day Two, we should maintain those high expectations, because it was clear from this morning’s keynote customer interview led by IBM senior vice president Robert Leblanc that today’s focus would be on highlighting best practices in building and maintaining smart infrastructures.
IBM vice president Scott Hebner first kicked the session off, explaining IBM’s continued commitment to open standards (see yesterday’s announcement about IBM’s commitment to using OpenStack), explaining that “Just as standards helped us realize the promise of e-business over the last decade, I think the same is going to occur with respect to cloud computing.”
Scott also encountered an amusing “blue screen of cloud death” moment, where all systems failed, spinning umbrellas appeared on screen (and in the audience), and colorful chaos people appeared from offstage.
An amusing moment, but one with an underlined headline of warning: Thou who doth go too far forward building on proprietary platforms may findeth one’s business in cloud computing chaos!
Scott next handed the baton to Robert Leblanc, and it was time now for Robert to introduce a range of IBM Tivoli clients operating in a garden variety of industries: Steve Caniano, Vice President, Hosting, Applications, and Cloud Computing with AT&T; Robert Pierce, Assistant Vice President, Information Services, Carolina Healthcare; Eduardo Bustamante, Director of Systems and Telecommunications, Port of Cartagena; and Tony Spinelli, Chief Security Officer, Equifax.
First, he cleared the decks and set up the big picture: Technology is now the number one issue for CEOs, as they recognize it could make or break their success. Big data, mobile, and cloud loom over the horizon as competitive differentiating technologies, and, increasingly, are table stakes.
Security is more of a risk, but going on the offensive beats succumbing to the nastiness of the defensive (read the cyber security headlines lately?).
And yet…and here was the key point of the best practices session…only one in five CEOs feel they have a highly efficient IT infrastructure, one that’s versatile and dynamic and can adapt to the ever-changing whims of an admittedly volatile marketplace.
And Robert delivered more bad news (admittedly, he did so with a smile): 70 percent of CIOs lack proper visibility into their cloud systems, 78 percent are NOT using mobile device management, and 53 percent lack the proper automation of securing their assets.
Oh, and only one in ten feel they have the skills and capabilities they require.
Robert asked each of the IT executives about their respective environments and challenges.
Steve from AT&T observed that “cloud computing is a team game” but that “hybrid types of solutions needed to be deployed,” and he explained AT&T’s partnership with IBM had been key in this regard.
Robert with Carolina Healthcare explained in the field of medicine that “mobility has become a key differentiator” and that the new doctors coming up “expect robust information technology services” or else they’ll find someone else’s hospital to work at.
He went on to explain that Carolina had begun to use IBM’s Endpoint Manager to manage some 38,000 desktops, laptops, iPads and iPhones.
Eduardo had a different set of challenges, operating in a much more “physical” realm in using IT services to better orchestrate the cacophony of trains, cranes, and other moveable assets. He indicated the Port of Cartagena is implementing RFID in concert with IBM Maximo technologies to better manage and move those assets efficiently around the port, and in the process, adding a layer of analytics to allow for continuous improvement of that physical instrumentation.
And Tony with Equifax got a laugh from the audience when he started by stating that “Everyone in this audience wants me to do a great job,” acknowledging the company has and must protect the information of individuals and businesses around the globe.
He suggested companies need to move beyond simply “naming the bad actors” in the security intrusion front, and instead move to “better understand those bad actor’s strategies and tactics” so they can better prioritize, respond to, and yes, even prevent those incidences from occurring in the first place, something Equifax is doing through the implementation of improved security intelligence using IBM QRadar technology.
“By having better security intelligence on the battlefield,” Tony explained, “you’re better prepared.”
“Not all assets are created equally,” he explained, speaking, of course, for Equifax, but acknowledging a much broader theme and challenge to the gathered IBM Pulse crowd.
Me, Frank, Dean, Sammy and Tiger

Turbo was caught unawares at the TechTarget Online ROI Summit in downtown Austin yesterday as colleagues took a photo of him in “mobile warrior” mode. Among his electronic devices identified on the table: A Verizon Mi-Fi hotspot, Turbo’s Verizon LG feature phone, a 5th gen Apple iPod Touch, a “Blu” phone (quadband, works on GSM networks around the world, serves as the Turbo “bat” phone and FM radio), a Plantronics Pro HD bluetooth headset, an HTC Wildfire Android tablet, and Turbo’s newfangled Samsung Chromebook, which is looking like a bargain at the price ($216) compared to the new Google Chromebook Pixel ($1,300!)
All these people in Barcelona attending Mobile World Congress, and seemingly so little news coming out of there.
For me, the key headline was the Nokia 105 which, while yawned at by most westerners, has the potential to be the downmarket phone king as Nokia moves more aggressively into emerging markets.
It’s a $20 phone that offers the basics, including phone calls, SMS, an FM-radio and a flashlight. And, 35 days of standby with 12.5 hours of talk time.
If it were a quad band GSM phone, I’d have it on my short list for second phones.
The other big news was IBM’s MobileFirst strategy, which, while not nearly as sexy as yet another yawnifying tablet device, does provide some grown-up guidance and direction for companies actually trying to pull together something resembling a unified mobile strategy.
Here’s what IBM’s Robert Leblanc, IBM vice president, middleware, had to say about the IBM MobileFirst initiative:
“To date, mobile computing has been dominated by discussions of new smartphones, operating systems, games and apps. But enterprises have yet to tap into the potential of mobile business. Just as the Internet transformed the way we bank, book vacations and manage our healthcare, mobile computing is also transforming industries. As these devices become ingrained in everything that we do, businesses are now in the palms of their customers’ hands. IBM MobileFirst is designed to make the transformation to becoming a mobile enterprise a reality.”
Visit here to learn more about IBM’s MobileFirst initiative, and go here to watch the IBM Mobile webcast that took place in Barcelona yesterday.
As for me, I’m packing up my mobile devices and taking them on the road.
In fact, I packed them up and took them to the TechTarget Online ROI Summit here in downtown Austin yesterday, and my colleagues thought it was worthy of a Facebook photo.
To which I explained, “I was traveling light!” (See the photo caption for an explanation of what’s what.)
Where am I off to, you ask? To Vegas, of course. My second home! IBM Pulse 2013 kicks off on Sunday, and I’m heading out early manana to take in a little golf history lesson.
That is to say, I have a 2:30 tee time at Las Vegas National, the very same course where Tiger Woods won his first PGA Tour event back in 1996, and where Dean and Frank and Sammy and the rest of the Rat Pack used to hang out and swill martinis after a long hard-fought 18 holes.
I’d like to tell you I’m playing there because of all this history and Tiger lore, but the fact is the old Scotsman from GolfNow gave me a very aggressively priced tee time, which no other courses were offering!
After that, however, it’s all work, and I’m looking forward to interviewing a number of IBM Tivoli luminaries for the IBM Pulse Livestream channel, including some of our business partners, analysts, and the man himself, Deepak Advani, the general manager of IBM Tivoli.
I want to also remind you of Pulse on Vivastream, where you can go do some preliminary social networking. Also check out the killer feature there in the right hand column of the main page, the “DIY Videos” where you can get some early previews of Pulse session speakers. Kil-ler.
In fact, let me do this: Below is my list of “Everything You Ever Needed To Know About IBM Pulse 2013 But Were Afraid to Ask Turbo”:
- Hashtag: #ibmpulse — all roads lead back to Twitter. Twitter is all-seeing and all-knowing at Pulse 2013.
- Vivastream at Pulse — How you can maintain your crazy Pulse schedule, find your long, lost systems admin buddy…orrr, that really cute girl whose lip you accidentally bused in that crazy, countrified Carrie Underwood mosh pit.
- IBM Pulse 2013 Conference Site — If you’re lost at IBM Pulse…or even if you’re not…this is always a good place to start. You can also use this page to find the video interviews I’ll start conducting on Monday.
- IBM Pulse Smart Site (Registered attendees only) — The official keeper of your IBM Pulse calendar.
- IBM Pulse On Facebook — Because we recognize there are people like me who spend way too much time on Facebook, and if you want to get their attention…
And now I want to pass you on to my good friend Rebecca’s Top Things You Shouldn’t Miss at Pulse 2013 — it does not include a round with Turbo at Las Vegas National, but other than that, it’s a great list.
Meanwhile, keep an eye for me on Saturday. I’ll be the one driving down the Las Vegas Strip looking for errant drives.
Big Data, Big Security, Big Boxes
There’s been some substantial “Big Data” announcements over the past week from Big Blue.
Late last week, on the heels of the public disclosure of security breaches at a number of major media organizations, including The New York Times, The Wall Street Journal, and the Washington Post, IBM announced its new “IBM Security Intelligence With Big Data” offering, which combines leading security intellignece with big data analytics capabilities for both external cyber security threats and internal risk detection and protection.
You can learn more about that offering here.
IBM is also working to make it easier for organizations to quickly adopt and deploy big data and cloud computing solutions.
Today, the company announced major advances to its PureSystems family of expert integrated systems.
Now, organizations challenged by limited IT skills and resources can quickly comb through massive volumes of data and uncover critical trends that can dramatically impact their business.
The new PureSystems models also help to remove the complexity of developing cloud-based services by making it easier to provision, deploy and manage a secure cloud environment.
Together, these moves by IBM further extend its leadership in big data and next generation computing environments such as cloud computing, while opening up new opportunities within growth markets and with organizations such as managed service providers (MSPs).
Big Data Only Getting Bigger
Across all industries and geographies, organizations of various sizes are being challenged to find simpler and faster ways to analyze massive amounts of data and better meet client needs.
According to IDC, the market for big data technology and services will reach $16.9 billion by 2015, up from $3.2 billion in 2010.1
At the same time, an IBM study found that almost three-fourths of leaders surveyed indicated their companies had piloted, adopted or substantially implemented cloud in their organizations — and 90 percent expect to have done so in three years. While the demand is high, many organizations do not have the resources or skills to embrace it.
Today’s news includes PureData System for Analytics to capitalize on big data opportunities; a smaller PureApplication System to accelerate cloud deployments for a broader range of organizations; PureApplication System on POWER7+ to ease management of transaction and analytics applications in the cloud; additional options for MSPs across the PureSystems family including flexible financing options and specific MSP Editions to support new services models; and SmartCloud Desktop Infrastructure to ease management of virtual desktop solutions.
New Systems Tuned for Big Data
The new IBM PureData System for Analytics, powered by Netezza technology, features 50 percent greater data capacity per rack3 and is able to crunch data 3x faster4, making this system a top performer, while also addressing the challenges of big data.
The IBM PureData System for Analytics is designed to assist organizations with managing more data while maintaining efficiency in the data center – a major concern for clients of all sizes.
With IBM PureData System for Analytics, physicians can analyze patient information faster and retailers can better gain insight into customer behavior. The New York Stock Exchange (NYSE) relies on PureData System for Analytics to handle an enormous volume of data in its trading systems and identify and investigate trading anomalies faster and easier.
You can learn more about these and other new PureSystems capabilities here.
To aid in the detection of stealthy threats that can hide in the increasing mounds of data, IBM recently announced IBM Security Intelligence with Big Data, combining leading security intelligence with big data analytics capabilities for both external cyber security threats and internal risk detection and prevention. IBM Security Intelligence with Big Data provides a comprehensive approach that allows security analysts to extend their analysis well beyond typical security data and to hunt for malicious cyber activity.
Live @ IBM InterConnect 2012: A Q&A With Brendan Hannigan On Security Intelligence

Brendan Hannigan is General Manager of the IBM Security Systems Division in the IBM Software Group; he brings more than 25 years of industry experience to his role. Previously, Mr. Hannigan was the president and chief executive officer of Q1 Labs, the acquisition of which catalyzed the creation of the Security Systems Division. This division brings together many capabilities across IBM to respond to the market need for sophisticated, comprehensive and integrated approaches to enterprise security.
As IBM’s general manager for its Security Systems Division will tell you, we’re entering into a perfect IT security storm.
These days, hackers are more sophisticated, your data is increasingly accessed anytime and anywhere and often resides in the cloud.
Fewer access points are corporately-controlled, and there is a growing digital data explosion while the compliance demands on staff and systems escalate.
These trends mean corporate IT security can no longer be an afterthought where a secure perimeter is good enough. Instead, security intelligence preventing, detecting and addressing system breaches anywhere must start in the boardroom and become part of your organization’s IT fabric. It is now imperative to be woven into your everyday business operations.
Brendan Hannigan brings more than 25 years of industry experience to his role as general manager of the new IBM Security Systems Division.
Previously, he was the president and chief executive officer of Q1 Labs, the acquisition of which catalyzed the creation of the Security Systems Division.
This new division brings together many capabilities across IBM to respond to the market need for sophisticated, comprehensive and integrated approaches to enterprise security.
Prior to Q1 Labs, Brendan was vice president of marketing and technology at Sockeye Networks; director of network research at Forrester Research; and served in a variety of senior-level product development roles at Digital Equipment Corporation, Wellfleet Communications, and Motorola.
We discussed a number of security-related topics during our Q&A at IBM InterConnect, including browser exploits, the need for increased security intelligence, and IBM’s bi-annual X-Force Trends and Risk Report, which I’ve covered extensively in this blog.
You can see our interview here.