Security shouldn’t be hard,. That’s why PureFlex has made secure
deployment faster than ever through automated provisioning and a
“secure-by-design” approach which includes default settings that ensure
PureFlex components and compute nodes are secure from day zero. No kidding ... right out of the box you
are Security-Ready for maximum protection of your data or cloud deployments!
So how can you achieve
increased security without increased administrative cost.. At IBM Pulse 2013 ,
Ajay Dholakia, Ph. D., IBM Master Inventor, and Jeb Linton, IBM STG Security
CTO, will discuss the wide array of unique and best of breed security
capabilities that are available on IBM Pure Systems. There is so much benefit
potential associated with leveraging the simplification, protection and trusted
computing associated with IBM's Pure Systems, that you'll be sure to learn
about some new aspect of security readiness for your big data and cloud
environments that you did not know about before.
Don't miss this opportunity to talk with these
security and systems experts. Delve into
the possibilities of taking control when
it comes to the security and integrity
of your data, clouds and infrastructure. We will explore everything from
Automated Security Provisioning, Centralized Security Policy Management,
Centralized User Account,Management, Centralized Certificate Authority, Trust
Management and so much more.
So join the discussion. Come visit us at IBM... [Continue Reading]
let's get real about security. We all
know that System z is a bell-weather system when it comes to having the most
needed, most innovative, and most secure built in security capabilities on the
planet. Dare we say... hack proof??? Well... during a one of a kind panel
discussion with three of IBM's leading experts on Enterprise Systems security,
we will have a chance to consider this and lots of other intriguing facets of
security in ours age of data exploitation, risks of devastating loss to our
hard fought brand names, and ever chaining threats to our data and IT
IBM Pulse 2013 , Barbara Sannerud, IBM STG
Business Transformation Consultant, System z, Glinda Cummings, zSecure Software
Product Manager and Greg Boyd, IBM
System z Security Technical Specialist will lead an interactive and in depth
dialogue about how IBM does incredible things with innovative and ground
breaking technologies that are integrated into systems like zEnterprise and
System z security software. .Security is designed into System z – it is not an
added on feature. System z’s rich set of built-in security capabilities can
help you simplify and improve a complex set of operational security processes.
System z is designed for the highest level of security for commercial grade
platforms. Businesses that embrace System z can take advantage of: Consistent
policy based user authentication, access control, audit and management,
Protecting critical... [Continue Reading]
The facts are startling …. The rise of mobile and
cloud computing and big data analytics is compounding the complexity of
security. Cyber attacks and those who perpetrate them—are becoming more
sophisticated every year
2010, an average company’s computer infrastructure was attacked nearly
60,000 times every day.
an average company infrastructure faces 2,641,350 security attacks each
At the same
time, IT resources are moving outside the firewall and enterprises are
distributing their applications and data across multiple devices and into
that 35% of all application spend will originate outside IT by 2015, and
that 50 percent of companies will have mission-critical data in the cloud
It is clear that clients need greater security capabilities
and protection to combat growing IT threats. Here at IBM, we have designed our systems with security in
mind. Take IBM Power Systems. IBM Power Systems architects, alongside IBM
researchers, have spent tireless hours building key security components within
the Power Systems architecture.
Today, to help enterprise Power Systems clients combat growing IT
security threats and vulnerabilities, IBM has extended the Emergency
Response Services (ERS) subscription package to Power Systems 780 and
795 clients as one of the service options within the IBM PowerCare program
included... [Continue Reading]
Not too long ago, companies were more concerned about disaster
recovery (DR) than business continuity—as if they were two different aspects of
how businesses operate; but essentially, they’re one in the same. If a disaster
occurs—whether it’s a system disk going down or a flooded data center—business
comes to a halt, interrupting continuity.
Larger enterprises were the first
to fully grasp this concept and took prudent steps to support it, using
replication software and dedicated backup boxes, for example. Of course, these
enterprises had the fiscal resources and IT departments to make sure this
worked as planned.
"When you look at things from
a number of perspectives, including cost, functionality and ease of use,
PowerHA can be very beneficial even for small companies,”
says Keith Livingood, senior
developer for Minnesota-based APi Group.
Without similar resources, small and midsized business (SMBs),
on the other hand, would often cross their fingers and hope nothing horrible
happened. If it did, they would have to rely on daily, weekly and monthly
backup tapes—assuming they had them—and rush to an off-site location to restore
their entire systems—a long, tedious and tense experience.
That’s rapidly changing, however,
even for businesses that can’t afford or don’t want large IT departments to
continuously monitor critical systems.
It’s due in part to the continuing
evolution of the IBM PowerHA* solution, which doesn’t... [Continue Reading]
As virtualization has grown to become a reliable mainstream approach to reducing costs, maintaining or even expanding performance and delivering flexibility to support business needs, it has become strategic to IT organizations around the world. At the same time, Red Hat and IBM have become leaders in Kernel-based Virtual Machine (KVM) development and promotion, and Red Hat has distinguished itself by delivering the KVM hypervisor and corresponding management tools in Red Hat Enterprise Virtualization.
According to a recent whitepaper by analyst firm IDC entitled “KVM : Open Virtualization Becomes Enterprise Grade” , sponsored by IBM and Red Hat, KVM has made impressive progress since its inclusion in the Linux kernel in 2007, and adoption has grown especially in key use cases such as Linux server consolidation and cloud computing. The IDC whitepaper states that virtual servers outshipped physical servers by a ratio of more than 2:1 in 2012. The firm’s numbers also report that 55% of all installed workloads as of the end of 2011 were virtualized and new workloads are being virtualized at a rate of 67%. IDC also finds that hypervisors competitive to VMware, such as KVM, are offering enterprise customers more and more choice.
Red Hat and IBM’s long collaboration, originally formed around Red Hat Enterprise Linux, has expanded to focus on virtualization as well. The two industry leaders began collaborating around open virtualization many years... [Continue Reading]
One of the most sophisticated and effective cyber crime attacks in banking history occurred last week on a grand, global scale. Called a “cashout” or “PIN cashing” scheme, hackers used data stolen from prepaid debit card accounts to withdraw currency from A.T.M.’s located in 24 countries including the US.
“In two precision operations that involved people in more than two dozen countries acting in close coordination and with surgical precision, thieves stole $45 million from thousands of A.T.M.’s in a matter of hours."1 (Full story)
As data breaches make headlines, companies are struggling to detect them before they wreak havoc and cause irreparable damage. Today’s threats underscore the vulnerabilities of financial institutions and corporations large and small. But not every threat is a well-calculated international cyber scheme. In fact, almost half of today’s security breaches can be traced back to the careless act of an employee, contractor or other company insider.
The following profiles show the segmentation of security threats and motivations today.
“The Inadvertent Actor” -- 49% of today’s threats are caused by insiders, employees, contractors, or outsourcers who are inexperienced. They inadvertently cause harm by unwittingly carrying viruses, or posting, sending or losing sensitive data. You might... [Continue Reading]
Social Media, Explosion of data, Analytics. It’s enough to drive most enterprises straight to the Edge! Well, if it technology is driving you to the edge, or maybe even over the Edge, hopefully attending Edge 2013 will help you take a few steps away from the edge.
All kidding aside, Edge 2013 will help employees, at all levels, and their organizations understand how new approaches can help coordinate IT infrastructures in order to maximize business outcomes. For instance, A recent Study (1) indicates that CEOs identify technology as the most important factor impacting their organization and customer insights have become a critical investment area. Obviously, tightly integrating business processes and requirements with social media, mobile and analytics will help organizations respond faster to client demands, market shifts and competitive threats. During the Edge 2013 conference many of our sessions will explain how any organization can accomplish their business goals and objectives through this type of approach.
Many of our executives will chair sessions that will demonstrate the power of big data and introduce a comprehensive approach to manage IT infrastructure that enables a diverse set of services to run on common, heterogeneous infrastructure. The beauty of this approach is clients will be able to create and to deliver real business value and unlock critical insights that can lead to improvements in customer service,... [Continue Reading]
Simplified and IT infrastructures are not typically spoken together!
And, neither are responsive and adaptive!
Great words! But not easily accomplished when applied to IT infrastructure !
Imagine the possibilities if an entire IT infrastructure as easily programmable and manageable as individual resources. An infrastructure controlled not by hands and hardware, but by software. One in which workloads are orchestrated automatically to ensure the most appropriate resources, and data, would be available to anyone, at any time, from anywhere. Well......this brave new world is not as far out of reach as one might be led to believe .
At Edge 2013 , IBM will highlight how some of our clients are solving their business problems with an approach. For example, an IBM client, created an IT environment for Averna S.p.A, (1) a wine and spirits distributor in Italy, that helped simplify their IT infrastructure leading to improvements data and application availability, connectivity, storage resource efficiency and most importantly, service.
While at Edge2013 , be sure to visit the following sessions to learn how your IT infrastructure and business processes can become:
Simplified. Responsive. Adaptive.
Session Name and Number
Day and Date
End... [Continue Reading]
A few years ago Oldsmobile coined the phrase - "this is not your father's Oldsmobile". The point was to convey that their new line of cars had adapted to the requirements of a new generation of buyers. Guess what? The same thing can be applied to today's data centers. Stephen Leonard, GM, Sales, IBM Systems & Technology Group, highlighted several key points this morning during the Edge2013 conference.
Clients across the world have similar concerns: Stay ahead of competition and respond to dynamic shifts of market and beat the challenges of massive scale, complexity and pace.
Our world is being transformed by data: Trails of data are being created by us as consumers and by the trillions of devices are creating an explosion in data that clients need to leverage for business advantage. Not an easy task when considering data management, storage and data center costs or IT personnel costs. Not to mention, the challenges created attempting to make sense of all of this data coming from a myriad of sources. This becomes even further compounded by consumers demanding data as always available, at any time, from any place, from any device to make right decision at right time and move beyond instinct .
Data Centers are becoming increasingly complex: Capturing data, integrating New Generation data from Social Media and Mobile, with classic back office applications as accounting, customer relationship management systems, ordering... [Continue Reading]
Ever wonder how a conductor can orchestrate every musician and instrument in perfect timing, to create such beautiful music?
Wouldn't it be nice if every IT resource and application could be orchestrated to deliver business value? What could your enterprise accomplish if servers, storage, networks, LoB applications, back office accounting, customer resource management systems all came together, as an orchestra does, to maximize business outcomes? Coordination of every IT resource to help you understand what your clients really want, respond to sudden market shifts and even competitive threats. Imagine the possibilities.
Yesterday, at Edge2013 , Jamie Thomas, General Manager, Software Defined Environments unveiled a new approach to orchestrating every resource in your IT data center to deliver business value to each line of business in your enterprise! Marketing is able to create and accelerate delivery of new customer focused campaigns based upon data captured from web, social and mobile traffic. Manufacturing and Product Development, although separated by multiple time zones, is able to ensure everyone has the most up to date, accurate data, accessible from any device, at any time. The result is the ability to get a product to market faster. Sales and Customer Service have the data, aggregated from multiple diverse sources, residing on heterogeneous systems, across multiple applications and are able to... [Continue Reading]
IBM Edge2013 unveiled an IBM’s approach for helping clients step away from the complex data center chasm. During the conference IBM presented an industry leading approach supported by analysts endorsements, client and business partner case studies that creates an achievable roadmap to business success! At the heart of this approach is the Software Defined Environment which helps enterprises effectively manage and harness the power of converging trends as big data, mobility and cloud computing.
Tom Rosamilia, senior vice-president, IBM Systems and Technology Group said that as per IBM’s latest CEO survey; a significant shift has taken place in the market. Reducing cost is no longer the top priority for CEOs now; it’s using technology to grow their businesses .
Here is what industry analysts, bloggers and journalists are publishing about IBM Edge and IBM’s leadership in Software Defined Environments:
eWeek in its article “ IBM Hardware Systems Bolstered for Cloud at Edge 2013 ” said “IBM announced a series of enhancements across its systems portfolio that are designed to help organizations adopt cloud computing as they build toward software-defined environments (SDE).”
Mark Fidelman in his article on “ 10 Things IBM Is Teaching The World About Winning In The Next Decade ” in Forbes wrote “ Most of the business leaders I speak with feel... [Continue Reading]
Gartner estimates: “Spending on banking and securities IT is expected to top $471 billion this year, up 14 percent from 2010, and rise by a fifth again to hit $563 billion in 2017”
The Reuter’s article, Insight: New Masters of the Universe? Banks see future in IT hires, describes the growing trend of banks hiring more, and more, IT personnel to drive the technology side of the business. The article states "With IT expertise now a must for the boardroom, banks' conservative workplaces are likely to undergo cultural change as they welcome ambitious, differently-minded people."
Leading banks like Barclays, JP Morgan and Goldman Sachs are hiring technical personnel in greater numbers to lead their IT operations while cutting costs in other areas of the business. Goldman Sachs is an example of the increasing emphasis being placed on IT: "Goldman Sachs has added 6 percent more IT staff since 2009, while cutting elsewhere. That has left it with 8,000 technology employees, making its department bigger than many technology firms, and it works hard to lure professionals away from Silicon Valley with the message that its technology business is key."
This trend is not confined to banking industry only. The growing impact of IT on enterprises was also documented in the IBM 2012 CEO Study, Leading Through Connections , with industry leading CEO’s ranking technology as the most important factor... [Continue Reading]
All software-defined strategies are not created equal and neither are the benefits!
The recent eWeek article , IBM Details Strategy for Software Defined Environments, describes the evolution of software-defined environments from their origin in software-defined networks to include the emergence of software-defined storage.
Chris Preimesberger , the eWeek author, discusses with Matt Hogstrom, CTO, IBM Software Defined Environment why all software-defined strategies and offerings are not equal and won’t deliver the same value. A software-defined environment should:
Optimize the entire computing infrastructure; not just compute, storage and network resources.
Adapt dynamically to address infrastructure issues by delivering “continuous, dynamic optimization and reconfiguration.”
Identify and capture patterns for resource deployment and associated SLAs as the target for the services the IT infrastructure will provide.
Provide an open architecture, and include open standards as OpenStack, to deliver deployment choice and flexibility, scalability and investment protection.
Support emerging, specialized workloads as Hadoop, that scale in a particular manner; or Heroku that use virtual machines which manage deployment and service placements.
The IBM Software Defined Environment strategy and approach can... [Continue Reading]
5 reasons your IT Infrastructure may leave you asking yourself, well, how did I get here? Or, a few other annoying questions.
In a past life, long before becoming a Marketing professional, I was a DJ, spinning and mixing records to pay my way through college (yeah, records!). During this period I became a huge Talking Heads fan! The lyrics from their critically acclaimed song, “Once in a Lifetime,” often interpreted as dealing with mid-life with crisis, sacrifice and questionable choices could honestly be questions posed by many IT professionals about the state of many current IT infrastructures. Let’s queue this up.
“You may ask yourself, well, how did I get here?”
Let’s face it; traditional infrastructures have grown increasingly complex and inflexible, making it difficult, in most cases, to be responsive to the fast changing business needs of many enterprises. Datacenter sprawl, multitudes of heterogeneous hardware platforms, hypervisors, operating systems and applications; all with their own management systems, make it difficult to address changing business requirements, get accurate insight from data, or deliver new offerings or services. It simply takes too long to manually build, set up, deliver and tear down servers, storage, network devices the old fashion way. Factor in unpredictable occurrences, like a sudden spike in traffic or transactions and, “You may ask yourself, well, how... [Continue Reading]
Today, everything I need to know is available on my smartphone enabling me to make purchasing decisions on the fly. Smart retailers are taking advantage of data transmitted from my smart phone while in their establishment, enabling them to gain insight into how clients move through their store, where they are spending their time and what they are purchasing.
The article “ New App Can Help Turn 'Showroomers' Into Paying Customers ” in Entrepreneur magazine discusses how an application called Swarm mobile, that connects to a customers mobile device, (if they agree), through Wi-Fi. Applications like Swarm connect and tracks a clients movement through the store, along with their web use enabling the retailer to see what sites they're visiting for price comparisons. This information can be used to send offers after careful analysis of the data gathered.
Another opinion about Wi-Fi tracking applications is highlighted in the Forbes article by Peter Cohan “ How Nordstrom Uses WiFi To Spy On Shoppers ” Cohan contends that retailers are spying on their customers through Wi-Fi and their smartphones, with many clients apparently feeling quite uncomfortable with a "big brother" application following them. A similar opinion is shared by The New York Times article “... [Continue Reading]