Security shouldn’t be hard,. That’s why PureFlex has made secure
deployment faster than ever through automated provisioning and a
“secure-by-design” approach which includes default settings that ensure
PureFlex components and compute nodes are secure from day zero. No kidding ... right out of the box you
are Security-Ready for maximum protection of your data or cloud deployments!
So how can you achieve
increased security without increased administrative cost.. At IBM Pulse 2013 ,
Ajay Dholakia, Ph. D., IBM Master Inventor, and Jeb Linton, IBM STG Security
CTO, will discuss the wide array of unique and best of breed security
capabilities that are available on IBM Pure Systems. There is so much benefit
potential associated with leveraging the simplification, protection and trusted
computing associated with IBM's Pure Systems, that you'll be sure to learn
about some new aspect of security readiness for your big data and cloud
environments that you did not know about before.
Don't miss this opportunity to talk with these
security and systems experts. Delve into
the possibilities of taking control when
it comes to the security and integrity
of your data, clouds and infrastructure. We will explore everything from
Automated Security Provisioning, Centralized Security Policy Management,
Centralized User Account,Management, Centralized Certificate Authority, Trust
Management and so much more.
So join the discussion. Come visit us at IBM... [Continue Reading]
let's get real about security. We all
know that System z is a bell-weather system when it comes to having the most
needed, most innovative, and most secure built in security capabilities on the
planet. Dare we say... hack proof??? Well... during a one of a kind panel
discussion with three of IBM's leading experts on Enterprise Systems security,
we will have a chance to consider this and lots of other intriguing facets of
security in ours age of data exploitation, risks of devastating loss to our
hard fought brand names, and ever chaining threats to our data and IT
IBM Pulse 2013 , Barbara Sannerud, IBM STG
Business Transformation Consultant, System z, Glinda Cummings, zSecure Software
Product Manager and Greg Boyd, IBM
System z Security Technical Specialist will lead an interactive and in depth
dialogue about how IBM does incredible things with innovative and ground
breaking technologies that are integrated into systems like zEnterprise and
System z security software. .Security is designed into System z – it is not an
added on feature. System z’s rich set of built-in security capabilities can
help you simplify and improve a complex set of operational security processes.
System z is designed for the highest level of security for commercial grade
platforms. Businesses that embrace System z can take advantage of: Consistent
policy based user authentication, access control, audit and management,
Protecting critical... [Continue Reading]
The facts are startling …. The rise of mobile and
cloud computing and big data analytics is compounding the complexity of
security. Cyber attacks and those who perpetrate them—are becoming more
sophisticated every year
2010, an average company’s computer infrastructure was attacked nearly
60,000 times every day.
an average company infrastructure faces 2,641,350 security attacks each
At the same
time, IT resources are moving outside the firewall and enterprises are
distributing their applications and data across multiple devices and into
that 35% of all application spend will originate outside IT by 2015, and
that 50 percent of companies will have mission-critical data in the cloud
It is clear that clients need greater security capabilities
and protection to combat growing IT threats. Here at IBM, we have designed our systems with security in
mind. Take IBM Power Systems. IBM Power Systems architects, alongside IBM
researchers, have spent tireless hours building key security components within
the Power Systems architecture.
Today, to help enterprise Power Systems clients combat growing IT
security threats and vulnerabilities, IBM has extended the Emergency
Response Services (ERS) subscription package to Power Systems 780 and
795 clients as one of the service options within the IBM PowerCare program
included... [Continue Reading]
Not too long ago, companies were more concerned about disaster
recovery (DR) than business continuity—as if they were two different aspects of
how businesses operate; but essentially, they’re one in the same. If a disaster
occurs—whether it’s a system disk going down or a flooded data center—business
comes to a halt, interrupting continuity.
Larger enterprises were the first
to fully grasp this concept and took prudent steps to support it, using
replication software and dedicated backup boxes, for example. Of course, these
enterprises had the fiscal resources and IT departments to make sure this
worked as planned.
"When you look at things from
a number of perspectives, including cost, functionality and ease of use,
PowerHA can be very beneficial even for small companies,”
says Keith Livingood, senior
developer for Minnesota-based APi Group.
Without similar resources, small and midsized business (SMBs),
on the other hand, would often cross their fingers and hope nothing horrible
happened. If it did, they would have to rely on daily, weekly and monthly
backup tapes—assuming they had them—and rush to an off-site location to restore
their entire systems—a long, tedious and tense experience.
That’s rapidly changing, however,
even for businesses that can’t afford or don’t want large IT departments to
continuously monitor critical systems.
It’s due in part to the continuing
evolution of the IBM PowerHA* solution, which doesn’t... [Continue Reading]
As virtualization has grown to become a reliable mainstream approach to reducing costs, maintaining or even expanding performance and delivering flexibility to support business needs, it has become strategic to IT organizations around the world. At the same time, Red Hat and IBM have become leaders in Kernel-based Virtual Machine (KVM) development and promotion, and Red Hat has distinguished itself by delivering the KVM hypervisor and corresponding management tools in Red Hat Enterprise Virtualization.
According to a recent whitepaper by analyst firm IDC entitled “KVM : Open Virtualization Becomes Enterprise Grade” , sponsored by IBM and Red Hat, KVM has made impressive progress since its inclusion in the Linux kernel in 2007, and adoption has grown especially in key use cases such as Linux server consolidation and cloud computing. The IDC whitepaper states that virtual servers outshipped physical servers by a ratio of more than 2:1 in 2012. The firm’s numbers also report that 55% of all installed workloads as of the end of 2011 were virtualized and new workloads are being virtualized at a rate of 67%. IDC also finds that hypervisors competitive to VMware, such as KVM, are offering enterprise customers more and more choice.
Red Hat and IBM’s long collaboration, originally formed around Red Hat Enterprise Linux, has expanded to focus on virtualization as well. The two industry leaders began collaborating around open virtualization many years... [Continue Reading]
One of the most sophisticated and effective cyber crime attacks in banking history occurred last week on a grand, global scale. Called a “cashout” or “PIN cashing” scheme, hackers used data stolen from prepaid debit card accounts to withdraw currency from A.T.M.’s located in 24 countries including the US.
“In two precision operations that involved people in more than two dozen countries acting in close coordination and with surgical precision, thieves stole $45 million from thousands of A.T.M.’s in a matter of hours."1 (Full story)
As data breaches make headlines, companies are struggling to detect them before they wreak havoc and cause irreparable damage. Today’s threats underscore the vulnerabilities of financial institutions and corporations large and small. But not every threat is a well-calculated international cyber scheme. In fact, almost half of today’s security breaches can be traced back to the careless act of an employee, contractor or other company insider.
The following profiles show the segmentation of security threats and motivations today.
“The Inadvertent Actor” -- 49% of today’s threats are caused by insiders, employees, contractors, or outsourcers who are inexperienced. They inadvertently cause harm by unwittingly carrying viruses, or posting, sending or losing sensitive data. You might... [Continue Reading]
Social Media, Explosion of data, Analytics. It’s enough to drive most enterprises straight to the Edge! Well, if it technology is driving you to the edge, or maybe even over the Edge, hopefully attending Edge 2013 will help you take a few steps away from the edge.
All kidding aside, Edge 2013 will help employees, at all levels, and their organizations understand how new approaches can help coordinate IT infrastructures in order to maximize business outcomes. For instance, A recent Study (1) indicates that CEOs identify technology as the most important factor impacting their organization and customer insights have become a critical investment area. Obviously, tightly integrating business processes and requirements with social media, mobile and analytics will help organizations respond faster to client demands, market shifts and competitive threats. During the Edge 2013 conference many of our sessions will explain how any organization can accomplish their business goals and objectives through this type of approach.
Many of our executives will chair sessions that will demonstrate the power of big data and introduce a comprehensive approach to manage IT infrastructure that enables a diverse set of services to run on common, heterogeneous infrastructure. The beauty of this approach is clients will be able to create and to deliver real business value and unlock critical insights that can lead to improvements in customer service,... [Continue Reading]
Simplified and IT infrastructures are not typically spoken together!
And, neither are responsive and adaptive!
Great words! But not easily accomplished when applied to IT infrastructure !
Imagine the possibilities if an entire IT infrastructure as easily programmable and manageable as individual resources. An infrastructure controlled not by hands and hardware, but by software. One in which workloads are orchestrated automatically to ensure the most appropriate resources, and data, would be available to anyone, at any time, from anywhere. Well......this brave new world is not as far out of reach as one might be led to believe .
At Edge 2013 , IBM will highlight how some of our clients are solving their business problems with an approach. For example, an IBM client, created an IT environment for Averna S.p.A, (1) a wine and spirits distributor in Italy, that helped simplify their IT infrastructure leading to improvements data and application availability, connectivity, storage resource efficiency and most importantly, service.
While at Edge2013 , be sure to visit the following sessions to learn how your IT infrastructure and business processes can become:
Simplified. Responsive. Adaptive.
Session Name and Number
Day and Date
End... [Continue Reading]
A few years ago Oldsmobile coined the phrase - "this is not your father's Oldsmobile". The point was to convey that their new line of cars had adapted to the requirements of a new generation of buyers. Guess what? The same thing can be applied to today's data centers. Stephen Leonard, GM, Sales, IBM Systems & Technology Group, highlighted several key points this morning during the Edge2013 conference.
Clients across the world have similar concerns: Stay ahead of competition and respond to dynamic shifts of market and beat the challenges of massive scale, complexity and pace.
Our world is being transformed by data: Trails of data are being created by us as consumers and by the trillions of devices are creating an explosion in data that clients need to leverage for business advantage. Not an easy task when considering data management, storage and data center costs or IT personnel costs. Not to mention, the challenges created attempting to make sense of all of this data coming from a myriad of sources. This becomes even further compounded by consumers demanding data as always available, at any time, from any place, from any device to make right decision at right time and move beyond instinct .
Data Centers are becoming increasingly complex: Capturing data, integrating New Generation data from Social Media and Mobile, with classic back office applications as accounting, customer relationship management systems, ordering... [Continue Reading]
Ever wonder how a conductor can orchestrate every musician and instrument in perfect timing, to create such beautiful music?
Wouldn't it be nice if every IT resource and application could be orchestrated to deliver business value? What could your enterprise accomplish if servers, storage, networks, LoB applications, back office accounting, customer resource management systems all came together, as an orchestra does, to maximize business outcomes? Coordination of every IT resource to help you understand what your clients really want, respond to sudden market shifts and even competitive threats. Imagine the possibilities.
Yesterday, at Edge2013 , Jamie Thomas, General Manager, Software Defined Environments unveiled a new approach to orchestrating every resource in your IT data center to deliver business value to each line of business in your enterprise! Marketing is able to create and accelerate delivery of new customer focused campaigns based upon data captured from web, social and mobile traffic. Manufacturing and Product Development, although separated by multiple time zones, is able to ensure everyone has the most up to date, accurate data, accessible from any device, at any time. The result is the ability to get a product to market faster. Sales and Customer Service have the data, aggregated from multiple diverse sources, residing on heterogeneous systems, across multiple applications and are able to... [Continue Reading]
IBM Edge2013 unveiled an IBM’s approach for helping clients step away from the complex data center chasm. During the conference IBM presented an industry leading approach supported by analysts endorsements, client and business partner case studies that creates an achievable roadmap to business success! At the heart of this approach is the Software Defined Environment which helps enterprises effectively manage and harness the power of converging trends as big data, mobility and cloud computing.
Tom Rosamilia, senior vice-president, IBM Systems and Technology Group said that as per IBM’s latest CEO survey; a significant shift has taken place in the market. Reducing cost is no longer the top priority for CEOs now; it’s using technology to grow their businesses .
Here is what industry analysts, bloggers and journalists are publishing about IBM Edge and IBM’s leadership in Software Defined Environments:
eWeek in its article “ IBM Hardware Systems Bolstered for Cloud at Edge 2013 ” said “IBM announced a series of enhancements across its systems portfolio that are designed to help organizations adopt cloud computing as they build toward software-defined environments (SDE).”
Mark Fidelman in his article on “ 10 Things IBM Is Teaching The World About Winning In The Next Decade ” in Forbes wrote “ Most of the business leaders I speak with feel... [Continue Reading]
Gartner estimates: “Spending on banking and securities IT is expected to top $471 billion this year, up 14 percent from 2010, and rise by a fifth again to hit $563 billion in 2017”
The Reuter’s article, Insight: New Masters of the Universe? Banks see future in IT hires, describes the growing trend of banks hiring more, and more, IT personnel to drive the technology side of the business. The article states "With IT expertise now a must for the boardroom, banks' conservative workplaces are likely to undergo cultural change as they welcome ambitious, differently-minded people."
Leading banks like Barclays, JP Morgan and Goldman Sachs are hiring technical personnel in greater numbers to lead their IT operations while cutting costs in other areas of the business. Goldman Sachs is an example of the increasing emphasis being placed on IT: "Goldman Sachs has added 6 percent more IT staff since 2009, while cutting elsewhere. That has left it with 8,000 technology employees, making its department bigger than many technology firms, and it works hard to lure professionals away from Silicon Valley with the message that its technology business is key."
This trend is not confined to banking industry only. The growing impact of IT on enterprises was also documented in the IBM 2012 CEO Study, Leading Through Connections , with industry leading CEO’s ranking technology as the most important factor... [Continue Reading]
All software-defined strategies are not created equal and neither are the benefits!
The recent eWeek article , IBM Details Strategy for Software Defined Environments, describes the evolution of software-defined environments from their origin in software-defined networks to include the emergence of software-defined storage.
Chris Preimesberger , the eWeek author, discusses with Matt Hogstrom, CTO, IBM Software Defined Environment why all software-defined strategies and offerings are not equal and won’t deliver the same value. A software-defined environment should:
Optimize the entire computing infrastructure; not just compute, storage and network resources.
Adapt dynamically to address infrastructure issues by delivering “continuous, dynamic optimization and reconfiguration.”
Identify and capture patterns for resource deployment and associated SLAs as the target for the services the IT infrastructure will provide.
Provide an open architecture, and include open standards as OpenStack, to deliver deployment choice and flexibility, scalability and investment protection.
Support emerging, specialized workloads as Hadoop, that scale in a particular manner; or Heroku that use virtual machines which manage deployment and service placements.
The IBM Software Defined Environment strategy and approach can... [Continue Reading]
5 reasons your IT Infrastructure may leave you asking yourself, well, how did I get here? Or, a few other annoying questions.
In a past life, long before becoming a Marketing professional, I was a DJ, spinning and mixing records to pay my way through college (yeah, records!). During this period I became a huge Talking Heads fan! The lyrics from their critically acclaimed song, “Once in a Lifetime,” often interpreted as dealing with mid-life with crisis, sacrifice and questionable choices could honestly be questions posed by many IT professionals about the state of many current IT infrastructures. Let’s queue this up.
“You may ask yourself, well, how did I get here?”
Let’s face it; traditional infrastructures have grown increasingly complex and inflexible, making it difficult, in most cases, to be responsive to the fast changing business needs of many enterprises. Datacenter sprawl, multitudes of heterogeneous hardware platforms, hypervisors, operating systems and applications; all with their own management systems, make it difficult to address changing business requirements, get accurate insight from data, or deliver new offerings or services. It simply takes too long to manually build, set up, deliver and tear down servers, storage, network devices the old fashion way. Factor in unpredictable occurrences, like a sudden spike in traffic or transactions and, “You may ask yourself, well, how... [Continue Reading]
Today, everything I need to know is available on my smartphone enabling me to make purchasing decisions on the fly. Smart retailers are taking advantage of data transmitted from my smart phone while in their establishment, enabling them to gain insight into how clients move through their store, where they are spending their time and what they are purchasing.
The article “ New App Can Help Turn 'Showroomers' Into Paying Customers ” in Entrepreneur magazine discusses how an application called Swarm mobile, that connects to a customers mobile device, (if they agree), through Wi-Fi. Applications like Swarm connect and tracks a clients movement through the store, along with their web use enabling the retailer to see what sites they're visiting for price comparisons. This information can be used to send offers after careful analysis of the data gathered.
Another opinion about Wi-Fi tracking applications is highlighted in the Forbes article by Peter Cohan “ How Nordstrom Uses WiFi To Spy On Shoppers ” Cohan contends that retailers are spying on their customers through Wi-Fi and their smartphones, with many clients apparently feeling quite uncomfortable with a "big brother" application following them. A similar opinion is shared by The New York Times article “... [Continue Reading]
According to the 2012 IBM Data Center Operational Efficiency study , only 1 in 5 clients have highly efficient IT infrastructures and are able to allocate more than 50% of their IT budget to new projects.
"Wonder what defines highly efficient IT infrastructure?"
These are infrastructures where clients have broken down silos and moved to a new era of interconnected, intelligent and instrumented computing. The unlimited data generated daily is used as a source of information to make informed decisions. IT is cutting manual work of operations and moving IT managers out of data centers to provide them an infrastructure that is programmable , yet cost-effective; scalable,flexible and accessible from anywhere. Highly efficient infrastructures help clients anticipate customer preferences, respond to the dynamic market changes and outpace competition.
So "What are non-efficient IT infrastructures missing?"
"Non-efficient IT infrastructures typically have silos of separate servers, storage, network devices, operating systems and management systems. Siloed infrastructures can often be extremely complex and often require highly skilled resources to operate and manage. Operations to assign workloads to resources, map resources to applications are manually done, consume time and reduce productivity. Organizations with these... [Continue Reading]
During the latter half of my career I’ve spent a lot of time working with disruptive application technologies, so I know firsthand just how dynamic and unpredictable new business workloads can be from the perspective of infrastructure utilization. Yet, IT staffs are mainly trying to support this new breed of applications with data center technologies, processes and procedures that were originally developed to manage highly repetitive and predictable sequential transactions. The tension between twenty-first-century workloads and twentieth-century IT is almost palpable, and the answer, according to some, will be something called the software-defined environment (SDE).
Being an inquisitive IBMer (is there any other kind?); I wanted to better understand our SDE strategy. After my searches turned up very little formal information—mainly this brief article on the IBM PartnerWorld website and a short YouTube video —I decided to pay a visit to my good friend and colleague Jeff Frey.
Jeff is an IBM Fellow and Chief Technology Officer of the System z platform. His fingerprints are all over every major advance in mainframe technology for the past 30 years, so I had a feeling that he’d be able to fill my knowledge gap. I was not disappointed!
Read the rest of the post on the Smarter Computing blog .
In our previous blog , we discussed about what a hardware-driven or a traditional IT infrastructure is missing to build a highly efficient IT infrastructure? Organizations are embracing software-driven IT environment because it virtualizes every element of data center infrastructure from computer hardware to middleware to end-user software. Forrester, a leading research firm, believes that a Software Defined Data Center (SDDC) is a powerful concept because it is “cloud-friendly” and will become the defining architectural abstraction for infrastructure architects over the next five years. The prospective impact of SDDC is enormous, offering an integrated architecture that allows the merger of legacy architectures, cloud computing, and workload-centric architectures into a single manageable domain.
Scott Firth, Director, IBM’s Systems and Technology Group in his article: Rebuilding the Data Center One Block At A Time , clarifies that SDDC is inevitable and to develop a software defined environment, organizations will have to break down traditional data centers in four critical ways:
Breaking down the Silos
Organizations data center will have to be optimized in a non-siloed fashion. The compute, networking and storage siloes will be managed under a single silo where workloads will be delivered automatically to the best accessible resource.
... [Continue Reading]
Recognized by the industry, analysts and experts, a Software Defined Data Center (SDDC) is considered to be the next step in the evolution of virtualization and cloud computing. Forrester , an expert research firm in its report addresses some key points about SDDC that served many purposes for organizations to adopt Software Defined Environment . For its report, Forrester explicitly interviewed thirteen vendor and user companies to understand and define the challenges, evolution, opportunities and architecture of a well-established Software Defined Data Center. Let’s take a look;
Data center managers have longed for the ultimate abstraction
Forrester believes that the computer technology domain has been a quest for successively improving abstractions of the underlying resources which has never been particularly human-friendly and easy to use. The introduction of cheap x86-based hardware, Ethernet, and the Internet by the 80s and into the 21st century fostered the eruption of distributed system complexity that in many cases surpassed the productivity improvements prompted by improved abstraction layers, cheap virtual machines (VMs), and prevalent networking. Consequently, the industry was locked into an escalating complexity and investment model that mostly remains in today’s place.
The ‘Data Center In A Box’ Wasn’t Enough .
As early as 2001, the advent... [Continue Reading]
The latest EETimes article: IBM Hawks Open Software-Defined Environments precisely talks about IBM’s ground breaking SDE leadership built on OpenStack to virtualize end-to-end data center infrastructure (from computer hardware to middleware to end-user software).
Matt Hogstrom , CTO, IBM Software Defined Environment in his interview with EETimes author- R. Colin Johnson focused on IBM’s approach towards supporting the complete stack of the data center set-up along with backing the SDE efforts for OpenStack Foundation . With IBM Open Software Defined Environments (SDEs) based on OpenStack, data center infrastructures can:
Achieve integrated and interoperable cloud infrastructure management between service providers and their consumers and developers
Enable organizations to rapidly and cost-effectively deliver new services with maximum application uptime and uninterrupted business operations
Enable data center administrators to use a single graphical user interface to do everything from deploying virtual machines to assigning storage to configuring networks
Allow a solution definition to be cast into a reusable software pattern that can be instantiated as an infrastructure pattern by virtue of application programmer interfaces (APIs)
Concentrate on open-standards environment... [Continue Reading]