Learn all about IBM's Secure Gateway in this Q&A with Secure Gateway Software Engineer Tom Bryant
I want to take a broader view and point you to some good introductory material on security for cloud-based workloads ("cloud security"). It consists of an overview of different cloud deployment models and their components, including using IBM Bluemix. Thereafter, it digs into each of those categories and takes a look at how to secure those components and the data.
As an app developer you might say to yourself, "I see third party services in the Bluemix catalog. But I can call into those services directly from my app. Why should I bother connecting to them through Bluemix?" In this post, I'll explain three key reasons: manageability, security, and portability.
I often get asked about the security features of IBM dashDB and Cloudant. Both are database services ("DBaaS") offered on IBM Bluemix. Once the security topic is addressed, compliance-related questions are next. A good chunk of questions can be answered by reviewing the provided product documentation.
On March 14, IBM Mobile Client Access for Bluemix (MCA) gets a new name: IBM Bluemix App ID. Along with the name change, we're also introducing an improved experience with a new pricing plan.
We'll take a look at how Vulnerability Advisor (VA) helps discover critical security holes in your containerized applications.
Vulnerability Advisor (VA) discovers security, compliance, and configuration issues with your containerized apps throughout their DevOps life cycle. To further extend VA coverage, we are introducing file-based malware detection.
Application Security on Cloud comes with a set of predefined formulas, which security analysts can use right away. The Risk Rating formula is probably the most important attribute that you can use to describe your applications.