IBM Systems Magazine, Power Systems - March 2018 - 37
"At IBM, we don't roll out anything without
security built in. We make sure each layer talks
to the other layers."
-Tony Petta, IBM Cloud Managed Services Compliance and Audit focal
later," Petta says. "When you try
to use different solutions, they
may not talk to each other very
well and leave gaps."
In addition, if multiple vendors'
technologies are used, they may
not integrate, leaving it difficult
to secure the data. "They may not
coordinate in the way you want
them to. At IBM, we don't roll out
anything without security built in.
We make sure each layer talks to
the other layers," Petta explains.
For example, some security
firms are now leveraging big data
and analytics for data protection.
These companies collect
security-related data from about
100 of their customers, and then
analyze it. The insights inform
their customers about security
threats, such as what types of
attacks are likely, where in the
network they will strike and the
possible impact if successful.
Companies can use that
intelligence to thwart attacks and
safeguard the data environment.
"We now have so much
computing power, IBM Watson*
technology is one example, that
can crunch, analyze, and slice
and dice so much data to see
trends and behaviors, and prepare
for threats more effectively," Petta
said. "Machine learning will also
play a role by recognizing bad
actors. This is technology to get
ahead of the breach to prevent it
instead of react to it."
Public clouds are secure in
certain areas, but don't provide
security. By contrast, an MSP
Malware on Power Systems Servers:
Breaking Down the Myths
Tuesday, March 27 | 1 ET / Noon CT
No OS is immune-and
malware threats are growing
To keep your data secure and your
systems up and running, it's critical
to grasp the true impact malware can
have on Power Systems servers and
the network that connects to them.
Attend this webinar to learn where
the danger lies and how you can
protect your systems. Our panel
of Power Systems security experts
will discuss real-world examples of
malware attacks on Linux, AIX, and
IBM i, and provide effective tactics
for avoiding infections.
Director of Security Technology
Security Product Manager
Register Today: webcasts.com/ibmsystemsmag
sponsored advertising content
ibmsystemsmag.com MARCH 2018 // 37