IBM Security Roadmap
Generative AI, secure agentic frameworks, crypto-agility, and semiconductor innovations secure decentralized, multi-cloud environments.
Security
Roadmap
Strategic milestones
All information being released represents IBM’s current intent, is subject to change or withdrawal, and represents only goals and objectives.
You can learn more about the progress of individual items by downloading the PDF in the top right corner.
2024
Drive multi-cloud security, compliance, and cyber resiliency with generative AI.
In 2024, we will leverage automation and generative AI to strengthen defenses and optimize risk posture with continuous compliance. This will lead to fewer failures and faster response and will make organizations more resilient.
2025
Secure the lifecycle of data for generative AI
We will protect the lifecycle of data with enterprise key and certificate lifecycle management, lineage tracking, classification, and leakage protection, transforming data security for the age of AI.
2026
Enable enterprise migration to quantum safety while delivering security foundations of human-agent collaborations.
We will implement quantum-safe cryptography and crypto agility, enhance human-agent collaboration through robust identity and entitlement management, and utilize secure agentic middleware for secure reasoning.
2027
Secure decentralized IT deployments and build the governance foundations of generative AI.
Establish security and trust management across decentralized computing and digital environments using digital assets to enhance protection and trust in IT deployments.
2029
Protect the full data lifecycle using cryptographic schemes with hardware acceleration and confidential computing.
Privacy-preserving technologies, such as fully homomorphic encryption (FHE) and confidential AI computing, will protect enterprise workloads against data breaches and adversarial attacks.
2030+
Provide ubiquitous workload protection with fully integrated hardware and software security controls.
By 2030, we will implement security controls throughout the entire computing stack, from the lowest level to multi-cloud applications and systems.
