Part 2: The IBM Onion of Security – it will make Hackers Cry!

Added Wednesday 25 September 2019 by Arrow

In the first part of this two part blog, John Watkins, Technical Account Manager at Arrow shared his insight with The It Insider into the IBM Onion of Security – a particular way of looking at the concentric rings of security needed to protect your business critical information assets. In this second part, John looks in detail at the tangible benefits IBM security solutions can deliver.

So, what benefits does the IBM Security solution bring?

  1. IBM security solutions deliver security in depth; no single point of failure will enable someone looking to steal business critical data and IP to succeed. In fact, it is possible (although unlikely) for several layers of security to be compromised, and the attackers still not achieve their goals!
  2. The very highly respected IBM X-Force team of elite ethical hackers are constantly working to identify security vulnerabilities and remediate against cyber-threats - before they are found by the cyber-criminals! This research is used to constantly update the highly integrated IBM tools – enabling them to be ready to detect and block new cyber-attacks before they are even launched, for example!
  3. QRadar enables the onion to be smart; it can scan in real time who is accessing the systems within the enterprise and what they are doing, identify attacks by recognising tell-tale signatures, and block and remediate the attack. QRadar can also learn from historic logs and recognise and highlight previous attempts to attack the enterprise, and prevent future attempts.
  4. Today, it’s not just important that you are protecting your business critical data and IP, you also need to be able to prove that you have protected your business critical data and IP; the IBM security solutions provide full traceability and reporting facilities to enable an enterprise to explicitly demonstrate they have complied with industry standards and regulations, with Resilient being capable of collating and publishing a GDPR compliant report following a cyber breach, for example.
  5. The concentric protective layers of the IBM Onion of Security work just as well to protect the enterprise from internal threats, such as staff with a grudge or criminal intent; sadly a significant threat today and one that many other security product vendors struggle with.
  6. The onion agrees well with the COBIT (Control Objectives for Information and Related Technologies) industry best practices in terms of the security areas that the layers of the Onion protects. IBM adds intelligence and integration to strengthen the COBIT base model.
  7. IBM Deploys Cognitive Technologies to fight cyber-crime! Following on from the success of the Watson Cognitive Computing initiative, IBM are now applying cognitive solutions (that is, computer solutions based upon the way “human experts think”) to its security arsenal – resulting in the promise of enhancing its security portfolio with systems that understand and reason about security threats, and which gain security knowledge by being able to learn by experience! This is a major leap forward in computer security, and promises to make life for the cyber-criminal fraternity even more difficult.
  8. As a final thought, the complete and integrated IBM Security Solution takes the pressure off an enterprise by avoiding the need to stitch together diverse security products and open source code (itself a major security risk) to create their own haphazard quilt-work security solution. The maintenance overhead alone is a nightmare, with component tools undergoing separate release-cycles with updates and new features, all of which WILL need to be re-integrated and re-tested to ensure that effective security cover remains in place! Leave just a single small hole in the quilt-work – and the cyber-criminals are in!

So, let the hackers bite into the IBM Onion of Security – it will make them cry! Now, just where is my Security Top Gun cap; I hope nobody has stolen it!

More Information

If you’d like hear more about this, please complete the form below:

What is planning analytics?

Meet the insiders: Maple Computing