We’re taking another step forward in our mission to help you achieve continuous security and compliance as you build on IBM Cloud by announcing the general availability of Security Insights.

As a security focal, you’re always looking for ways to ensure that your business is continuously compliant and secure. With the Security and Compliance Center, you can now enable Security Insights so that you can analyze activity and identify suspicious behavior in your IBM Cloud resources and applications.

Note: As part of this release, the beta version of Network Insights is deprecated and will no longer be supported as of 12 February 2021.

What is Security Insights?

Formerly known as Security Advisor, Security Insights helps you to gain a better understanding of the potential risks that can impact your environments. For example, you can identify image vulnerabilities, expiring certificates, and threats through network or access behavior.

With Security Insights, you get access to the following:

  • Centralized security risk and posture management
  • Threat detection and security risk prevention
  • Customized alert notifications
  • Suggested remediation steps to mitigate issued findings
  • Analysis of your network and activity data
  • A better understanding of your current security status

In addition to those capabilities, we offer the ability to integrate your own custom security tools and provide integrated experiences with our business partners Caveonix , Twistlock, and NeuVector. These partnerships help to further assess the risk and compliance posture for VMWare workloads that you deploy on IBM Cloud or, more specifically, IBM Cloud for Financial Services. Check out our partner success story to learn more.

How does it work?

Security Insights analyzes collected data to determine when behavior is out of the ordinary or suspicious. With Activity Insights, user or application activity that is logged by IBM Cloud Activity Tracker with LogDNA is compared against predefined rule packages to flag behavior that can affect the security of your applications. For example, you can identify if there is an action with security implications that takes place outside of normal working hours. Network Insights continuously monitors and analyzes the network communication captured by your VPC flow logs against the known threat intelligence that is gathered by IBM X-Force to help mitigate risk. For example, you can identify attempts to compromise VSIs if your applications receive communication from a peer that is known to be a potential threat. 

To learn more about Security Insights and review the predefined rule packages, see the documentation.

How can I get started?

To start gaining insight into potential security issues, you can enable Security Insights in the IBM Cloud console. With Insights enabled, be sure that you’ve configured your data settings and then complete the few set up steps that are required for Activity and Network Insights.

How do I remove the beta version of Network Insights?

The analysis of your IBM Cloud Kubernetes Service clusters will automatically stop on 12 February 2021. But, that does not stop the collection of your IBM Cloud Kubernetes Service network logs to your IBM Cloud Object Storage bucket. If Network Insights is the only reason that you have for storing your IBM Cloud Kubernetes Service network logs, you should to delete your data and remove the insights components from your cluster. 

To fully remove the beta version of Network Insights, complete the following steps:

  1. Delete the Network Insights components from your cluster.
  2. Delete your stored data from Cloud Object Storage.

Feedback

In order to ensure that we are helping you to deliver on your own mission, we’d like to hear from you with any feedback that you might have. To share your questions, comments, raves, or concerns with us, use the Feedback button that can be found on any page of cloud.ibm.com.

Categories

More from Announcements

IBM TechXchange underscores the importance of AI skilling and partner innovation

3 min read - Generative AI and large language models are poised to impact how we all access and use information. But as organizations race to adopt these new technologies for business, it requires a global ecosystem of partners with industry expertise to identify the right enterprise use-cases for AI and the technical skills to implement the technology. During TechXchange, IBM's premier technical learning event in Las Vegas last week, IBM Partner Plus members including our Strategic Partners, resellers, software vendors, distributors and service…

Introducing Inspiring Voices, a podcast exploring the impactful journeys of great leaders

< 1 min read - Learning about other people's careers, life challenges, and successes is a true source of inspiration that can impact our own ambitions as well as life and business choices in great ways. Brought to you by the Executive Search and Integration team at IBM, the Inspiring Voices podcast will showcase great leaders, taking you inside their personal stories about life, career choices and how to make an impact. In this first episode, host David Jones, Executive Search Lead at IBM, brings…

IBM watsonx Assistant and NICE CXone combine capabilities for a new chapter in CCaaS

5 min read - In an age of instant everything, ensuring a positive customer experience has become a top priority for enterprises. When one third of customers (32%) say they will walk away from a brand they love after just one bad experience (source: PWC), organizations are now applying massive investments to this experience, particularly with their live agents and contact centers.  For many enterprises, that investment includes modernizing their call centers by moving to cloud-based Contact Center as a Service (CCaaS) platforms. CCaaS solutions…

See what’s new in SingleStoreDB with IBM 8.0

3 min read - Despite decades of progress in database systems, builders have compromised on at least one of the following: speed, reliability, or ease. They have two options: one, they could get a document database that is fast and easy, but can’t be relied on for mission-critical transactional applications. Or two, they could rely on a cloud data warehouse that is easy to set up, but only allows lagging analytics. Even then, each solution lacks something, forcing builders to deploy other databases for…