- This open-source technology can search and translate security data from a variety of sources
- It comes with containerized software pre-integrated with the Red Hat OpenShift
IBM has launched Cloud Pak for Security that will allow to connect with any security tool, cloud or on-premise system, without moving data from its original source. The platform will include open-source technology for hunting threats, automation capabilities to help speed response to cyberattacks, and the ability to run in any environment as per IBM.
The company said that this open-source technology can search and translate security data from a variety of sources, bringing together critical security insights from across a company’s multicloud IT environment. It is extensible and additional tools and applications can be added over time.
Containerized software pre-integrated with the Red Hat OpenShift
Mary O’Brien, general manager, IBM Security said, “As businesses move mission-critical workloads to hybrid multicloud environments, security data is spread across different tools, clouds and IT infrastructure. This can create gaps that allow threats to be missed, leading security teams to build and maintain costly, complex integrations and manual response plans. With Cloud Pak for Security, we’re helping to lay the foundation for a more connected security ecosystem designed for the hybrid, multicloud world.”
Three initial capabilities of Cloud Pak for Security include run anywhere and connect security openly, gain security insights without moving data and respond faster to security incidents with automation. The first capability comprises of containerized software pre-integrated with the Red Hat OpenShift.
Streamline hunt for threats
The second feature lets the user to connect data sources to uncover hidden threats and help make better risk-based decisions, while leaving the data where it resides. Clients can access IBM and third-party tools to search for threat indicators across any cloud or on-premise location. IBM said with its Cloud Pak for Security’s Data Explorer application, security analysts can streamline their hunt for threats across security tools and clouds. Otherwise, security teams would have to manually search for the same threat indicators (such as a malware signature or malicious IP address) within each individual environment.
Thirdly, IBM will allow companies to formulate their response to common security scenarios, guiding users through the process and providing quick access to security data and tools. IBM and more than 20 other organizations are working together on open standards and open source technologies to help enable product interoperability and reduce vendor lock-in across the security community.