IBM Security has introduced a new Software as a Service (SaaS) version of IBM Cloud Pak for Security, designed to simplify how organizations deploy a zero trust architecture across the enterprise. The company also announced an alliance partnership with leading cloud and network security provider, Zscaler, and new blueprints for common zero trust use cases.
For security professionals, zero trust is a framework for modernizing their overall security programs and helps them adapt to the risks emerging from their changing business environment. In fact, a recent ESG study found that 45 percent of organizations who were more mature in their zero trust strategies had a very smooth transition to employees working from home, as compared to only 8 percent of those that were the least mature1.
“With a mobile workforce and data residing everywhere, the Internet has become our primary network,” said Mauricio Guerra, CISO for The Dow Chemical Company who will participate in IBM Think on May 11. “Embracing a zero trust architecture enables us to add new capabilities and strengthen security. Working with partners like IBM Security and Zscaler can help us provide users with secure remote access to all of our locations, as well as access to applications wherever and however they are hosted.”
The new IBM Security zero trust blueprints offer a framework for building a security program designed by applying the core principles of zero trust: least privilege access; never trust, always verify; and assume breach. These blueprints can offer companies a prescriptive roadmap of security capabilities along with guidance on how to integrate them as part of a zero trust architecture. The capability and guidance for these blueprints were developed from real customer engagements to help organizations plan their zero trust journey and investments with a pragmatic approach that better aligns security and business objectives.
The IBM Security zero trust blueprints help address the following business initiatives:
- Preserve customer privacy: The capabilities and integrations in this privacy blueprint tie together the security and compliance capabilities that help organizations protect the integrity of customer data and manage privacy regulations. Using this blueprint, organizations can enforce limited and conditional access to all data and help reduce exposure in the event of compromise. This connection will help generate insights into data usage and privacy risk, and enforce policies to keep data usage aligned with its purpose. This approach helps organizations detect and respond efficiently to risk and compliance issues with automated remediation processes that use multiple tools including the latest version of IBM Cloud Pak for Security, which now includes a more extensive set of data security capabilities from IBM Security Guardium.
- Secure the hybrid and remote workforce: With the hybrid workforce blueprint, organizations can build a workforce that can securely connect to any application on any network, from any location using any device. As part of this solution, IBM is announcing an alliance partnership with Zscaler to help organizations connect users to applications seamlessly and securely. IBM Security Services combines the technology of Zscaler and the expertise of IBM to help clients adopt an end-to-end secure access service edge (SASE) approach. Additionally, the integration of Zscaler Private Access TM and Zscaler Internet Access TM with core technologies from IBM Security, such as IBM Security Verify, can help provide the foundation of a zero trust architecture.
- Reduce the risk of insider threat: With the insider threat blueprint, organizations can proactively manage insider threats from every vector, helping to strengthen resiliency and limit business disruption. The integrated capabilities outlined in this blueprint are designed to detect user behavior anomalies, adaptively enforce security policies with automation, and insulate your most valuable data. New mobile threat detections from IBM Security MaaS360 with Watson power enhanced user behavior analytics delivered as a part of IBM Cloud Pak for Security.
- Protect the hybrid cloud: The hybrid cloud blueprint can help organizations modernize their security program with visibility and control over the most sensitive data and activities as they migrate to the cloud. The capabilities included in this blueprint are designed to enable continuous compliance, reporting and response, while monitoring for cloud misconfigurations and building consistent enforcement of security policy across all cloud workloads. As part of this blueprint, customers can choose to purchase IBM Security Services for Cloud which offers an open, automated approach to help simplify hybrid cloud security. This solution brings together cloud-agnostic security expertise together with an integrated set of cloud, proprietary and third-party technology solutions.
IBM Security believes that an open approach is required to address the fragmentation and complexity challenges facing security teams today as they adopt a zero trust strategy. To help simplify and connect security across companies’ broader ecosystem of vendors, IBM is collaborating with leading technology partners. The Zscaler alliance partnership is a critical component of the zero trust approach to assist organizations with simplifying remote work and network security modernization.
“Working from anywhere, combined with enterprises’ move to SaaS and the cloud, has effectively rendered the perimeter security model obsolete and traditional security defenses ineffective,” said Jay Chaudhry, Chairman, CEO and Founder of Zscaler. “The only way to truly secure today’s digital businesses is to adopt a zero trust security model where validated user identity is combined with business policies for direct access to authorized applications and resources. Our alliance partnership with IBM Security, as part of the Zscaler Zero Trust Ecosystem, is helping organizations and their employees fully embrace working from anywhere while protecting enterprise data.”
IBM is also collaborating with its ecosystem partners to help them implement zero trust strategies with their customers around the world. For example, Tech Data will offer access to IBM Security zero trust blueprints as part of its Cyber Range, allowing channel partners and customers to test and experience how these solutions come together to enable a zero trust approach for key use-cases.
Cloud Pak for Security Expands Delivery Models
An open approach to zero trust requires a security platform founded on the same principles of openness and collaboration. IBM Cloud Pak for Security now combines leading capabilities in threat management and data security into a single, modular, easier to consume solution. And with the new IBM Cloud Pak for Security as a Service, customers gain the option to choose between an owned or hosted deployment model–whichever is best suited for their environment and needs. It also provides access to a unified dashboard across threat management tools, with the option to easily scale with a usage-based pricing approach.
“Our customers need to secure their rapidly changing business environments without causing delays or friction in their daily operations,” said Mary O’Brien, General Manager, IBM Security. “It’s not uncommon to have users, data and applications operating in different environments. They all need to connect to one another quickly, seamlessly, and securely. A zero trust approach offers a better way to address the security complexity that is challenging businesses today.”