A multilayered approach to security with IBM Power
Essential infrastructure for a zero trust approach
Essential infrastructure for a zero trust approach
Today’s IT landscape
03 min read
Since the beginning of the COVID-19 pandemic, a staggering number of devastating data breaches have been recorded. The average cost of a data breach is now USD 4.24 million, up 10% from last year’s reported USD 3.86 million. This is the largest increase that the industry has witnessed in the last seven years¹, making security a top concern. Improving your security strategy and enabling your business to move quickly, safely and securely in this always-on world is the focus for many executives today, resulting in increased security budgets. However, increased spending and technological change introduces new complexities and risks that continue to threaten IT security. One of security professionals’ top concerns is the growing number of sophisticated attack vectors which continue to expose more aspects of today’s businesses than ever before.
That's the average cost of a data breach now, up 10% from last year's reported USD 3.86 million.
Vulnerabilities in the hardware and firmware levels may not have been points of great concern in the not-too-distant past; now, however, they’re prime targets in today’s threat landscape.
In many ways, the cybersecurity challenges your business must overcome today can be distilled down to two empirical truths:
- The IT stack is expanding and hackers are broadening their horizons.
- Organizations must stay ahead of future threats to protect their platforms with the highest level of security to safeguard their hybrid cloud infrastructure.
07 min read
Enterprises rely on their security systems to prevent current and future threats to intellectual property, sensitive corporate information, customer data and workload privacy.
How professionals strategically approach IT security is imperative to prevent data breaches and cyberattacks. Not only can security vulnerabilities lead to downtime, but they are costly to any organization. Ransomware attacks pose the largest threat, costing enterprises USD 4.62 million per attack on average¹. The IBM® Power® platform’s integrity can reduce the risk of ransomware by implementing endpoint detection and response (EDR), and zero trust concepts such as continuous multifactor authentication (MFA).
Adopting a business-driven, compliance-driven or monetary-driven approach alone cannot provide adequate protection for business processes against the increasing number of IT systems risks. Solitary approaches can overlook key cross-discipline aspects of an efficient and integrated security strategy. The ideal course of action involves planning and assessment to identify risks across key areas related to security. IBM Power technology and IBM® Power10 processor-based systems offer a holistic, zero trust, multilayered approach for your security strategy to ensure your organization is secure and compliant. This multilayered approach includes:
Adopting a holistic security approach can enable your organization to meet the demands of the threats affecting the security landscape.
Data within an organization can now be stored and accessed by employees from practically anywhere — across servers, hybrid cloud environments and numerous mobile and edge devices. This inextricable crisscrossing of server and device is the byproduct of ongoing digital transformation and modernization. As a result, this accessibly creates a plethora of attack vectors ready to be exploited.
The processes being put in place to help ensure regulatory compliance can also lead to unintended risk exposure. General Data Protection Regulation (GDPR) is merely one such recent development of a growing trend. Governing entities are paying much closer attention to how organizations use data. Yet they also add layers of complexity to the daily business operations.
Employees’ compromised credentials are at fault for 20% of all data breaches last year¹. Aside from login information, phishing scams and email compromise are other ways employees unknowingly put company information at risk. Your workforce will always pose some level of risk — no matter what security controls you put in place or how well you handle vulnerabilities. In the era of cybercrime, it is imperative to train employees on these common security threats and have a reporting system in place. The hard work you put into securing endpoints and adhering to compliance can be rendered moot by a mistake or a clever malicious attack.
Meanwhile, many organizations struggle to find and retain competent cybersecurity staff, and they find themselves stuck with a perpetual skills shortage. To combat such skill shortages, organizations can implement simplified security management that automates operations, compliance, patching and monitoring. Benefit from end-to-end security designed to protect with additional endpoint detection without the additional resources.
The volume, variety and velocity of today’s cyberthreat landscape are only going to multiply as IT architectures continue to evolve and adapt to the changing tides of technology, work culture and compliance. That means your security strategy must also evolve to reach beyond the network level.
05 min read
Implementing zero trust concepts can help organizations address security in an often-complex IT environment. IT professionals struggle with visibility and control across hybrid cloud and multicloud landscapes. Zero trust manages the risks by shifting to a more comprehensive strategy that restricts access controls while not impacting performance or user experience. Building security into every level of your stack can be achievable by implementing various third-party vendor security solutions. However, that approach worsens the complexity that already exists — and introduces even more vulnerabilities and points of exposure into your network. Your best recourse is to take a multilayered, zero trust approach. This secures all of your organization’s data and systems, while also minimizing complexity. With that in mind, the IBM® Information Security Framework helps ensure that every IT security aspect can be properly addressed when using a holistic approach to business-driven security.
The IBM Information Security Framework focuses on:
Learn more about IBM Security Framework (PDF, 25.2 MB) and how you can drill down even further.
06 min read
With IBM Power technology, you can increase cyber resiliency and manage risks with comprehensive end-to-end security that integrates across the entire stack — from processor and firmware to OS and hypervisors, to apps and network resources, all the way to security system management.
IBM Power systems offers leading security capabilities for a wide range of operating systems like IBM® AIX®, IBM i and Linux®. EDR for IBM Power technology can provide additional security for VM workloads, ensuring complete protection at every endpoint within the network. For systems that rely on passwords to be secure, the AIX and Linux operating systems utilize IBM PowerSC multifactor authentication (MFA) that require additional levels of authentication for all users, protecting against password cracking malware. The features vary depending on the OS, but examples of these capabilities include being able to:
Workloads are no longer restricted to on premises data centers; they’re continually moving to virtualized hybrid cloud and multicloud environments. As an example, many organizations are adopting containers to deploy new and existing applications across hybrid infrastructures.
These increasingly dynamic environments and workloads require equally versatile security capabilities. IBM Power solutions can meet security needs by preserving workload privacy with cryptographic algorithm acceleration, secure key storage and CPU support for post quantum cryptography and fully homomorphic encryption (FHE) cryptographic algorithms.
To address the unique security requirements of containerized deployments, IBM has also partnered with independent software vendors (ISVs) like Aqua Security, who builds with IBM Power technology and Red Hat® OpenShift® Container Platform to further secure containers throughout their lifecycle.
IBM Power servers are designed to protect data from on premises to cloud with end-to-end memory encryption and accelerated cryptographic performance. The policies that are embedded for cloud native workloads including VMs, containers and serverless functions are built to support Red Hat OpenShift and IBM Power customers when integrating their security and compliance requirements for application modernization.
Live Partition Mobility (LPM)
IBM Power technology lets you secure data in motion. LPM protects VMs through encryption when you need to migrate from one system to another. If you have virtualized on premises data centers, hybrid cloud environments or both, this capability is critical.
09 min read
IBM® PowerSC 2.0 technology is an integrated portfolio offering for enterprise security and compliance in cloud and virtual environments. It lives on top of your stack while providing a web-based UI for managing the security features of IBM Power technology that reside from the lowest level up solutions.
With its simplification and automation capabilities, IBM PowerSC 2.0 technology can reduce time, cost and risk by streamlining compliance monitoring and enforcement. This solution can support audit processes and allows customers to achieve compliance certifications more efficiently. It can also reduce security risks by increasing visibility across the stack.
IBM PowerSC 2.0 solutions introduces EDR for Linux on IBM Power workloads, offering the latest, industry standard capabilities for managing endpoint security, including, intrusion detection and prevention, log inspection and analysis, anomaly detection and incident response.
The IBM Power family comes with prebuilt profiles that support a myriad of industry standards. You can customize these profiles and merge them with enterprise rules without having to touch Extensible Markup Language (XML).
Detects and alerts you when someone opens or interacts with security-critical files.
Alerts you when a VM is not at the prescribed patch level. It also notifies you when fixes become available.
Allows for the inspection and remote verification of the integrity of all the software components running on AIX logical partitions.
Protects and routes internal network traffic between the AIX, IBM i and Linux operating systems.
Creates centralized audit logs, which are easy to backup, archive and manage.
The IBM PowerSC Standard Edition supports auditing with five preconfigured reports. You also have an interactive timeline to see the life and events of a VM.
Learn how to simplify management of IT security and compliance with IBM PowerSC in Cloud and Virtualized environments
02 min read
As cybercriminals continue to advance their methods and technological evolution introduces new vulnerabilities into today’s businesses, integrating a multilayered, zero trust, security solution that doesn’t add to your organizational complexity is key. IBM Power solutions can protect every level of your stack from edge to cloud to core with the tightly integrated, in-depth solutions of a single vendor. Working with multiple vendors introduces complexities that can ultimately prove to be costly — in more ways than one. IBM Power technology supports end-to-end encryption at the processor level without impacting performance. Integrating your infrastructure brings every layer of the stack into focus.
Security from a single vendor can provide natural advantages that simplify and strengthen your security strategy. Building on three decades of security leadership, IBM Power technology brings with it extensive partnerships with other organizations in and outside of IBM that further deepen and broaden its security expertise. These partnerships can enable IBM Power technology to tap into an even bigger community of security professionals and ensure that issues can be identified quickly and addressed with confidence. And with the backing of the IBM Security® and IBM Research® business units, along with the PowerSC 2.0 portfolio, Power10 servers can thwart multiple threats, including insider attacks, from top to bottom.
¹ Cost of a Data Breach Report 2021, IBM Security, July 2021 (PDF, 3.6 MB)
² 3X performance is based upon pre-silicon engineering analysis of Integer, Enterprise and Floating Point environments on a POWER10 dual socket server offering with 2×30-core modules vs POWER9 dual socket server offering with 2×12-core modules; both modules have the same energy level. 2 10-20X AI inferencing improvement is based upon pre-silicon engineering analysis of various workloads (Linpack. Resnet-50 FP32, Resnet-50 BFloat16, and Resnet-50 INT8) on a POWER10 dual socket server offering with 2×30-core modules vs POWER9 dual socket server offering with 2×12-core modules.
³ AES-256 in both GCM and XTS modes runs about 2.5 times faster per core when comparing IBM Power10 E1080 (15-core modules ) vs. IBM POWER9 E980 (12-core modules) according to preliminary measurements obtained on RHEL Linux 8.4 and the OpenSSL 1.1.1g library
© Copyright IBM Corporation 2022
IBM Cloud
IBM Corporation
New Orchard Road
Armonk, NY 10504
Produced in the United States of America
June 2022
IBM, the IBM logo, IBM Cloud, IBM Research, and IBM Security, Power, and Power10 are trademarks or registered trademarks of International Business Machines Corporation, in the United States and/or other countries. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on ibm.com/thought-leadership/trademark.
Red Hat and OpenShift are trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries in the United States and other countries.This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates.THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANT-ABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided.
The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds, owner of the mark on a worldwide basis.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.The client is responsible for ensuring compliance with laws and regulations applicable to it. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the client is in compliance with any law or regulation.