• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • IBM Grabs Q1 Labs and Creates New Security Division

    October 10, 2011 Jenny Thomas

    If the security of your company’s data isn’t a top item on your priority list, it’s becoming clear that IBM thinks it should be. Big Blue’s recent announcement of its acquisition of Q1 Labs, a provider of security intelligence software, is another in a string of clues that IBM is going to be putting a lot of emphasis on security.

    Another clue is that with the Q1 acquisition, IBM also revealed a new Security Systems division that aims to blend security and analytics. According to IBM estimates, the Security Systems division will target a $94 billion opportunity in security software and services, which has a nearly 12 percent compound annual growth rate.

    Q1 Labs is one of 10 strategic security acquisitions and more than 25 analytics-related purchases that IBM has made in the last decade, including a recent buy of security analytics software firm, i2.

    Q1 Labs, was a privately held company based in Waltham, Massachusetts, that provides security software for analyzing events and delivering event monitoring via a dashboard. The company has more than 1,800 customers around the world that include clients in the healthcare, energy, retail, utility, financial, government, educational, and wireless service provider fields. Q1 Labs’ employees are located in Waltham, Massachusetts; Belfast, Northern Ireland; and Fredericton, New Brunswick, Canada. The acquisition is expected to be finalized in the fourth quarter of 2011, and once it is, Q1 will become part of IBM’s Software Group, where the Security Systems division is located.

    Financial terms of the deal were not disclosed.

    As you can see, IBM is not just focusing on securing IT assets, but on analyzing what is going on in networks and systems and outside the corporate firewall on the Internet to do proactive and preventive security. Q1 Labs software detects and flags security issues from hundreds of sources across an organization including the network, applications, mobile endpoints, and physical security devices such as badge readers, from both cloud-based and on-premise sources. Its security information and event management (SIEM) software also helps IT staff and auditors manage the tracking of security incidents and model risk to better protect customers, while giving executives insight into the security and risk posture of the organization.

    Brendan Hannigan, CEO of Q1 Labs, has been named as the new leader of IBM’s Security Systems division (once the deal has closed), and he says it’s about getting ahead of the threats.

    “Since perimeter defense alone is no longer capable of thwarting all threats, IBM is in a unique position to shift security thinking to an integrated, predictive approach,” said Hannigan.

    IBM says the design behind its new Security Systems division is to integrate Big Blue’s Tivoli, Rational, and information management security software, appliances, lab offerings, and services. With the addition of Q1’s advanced analytics and correlation capabilities, which can automatically detect and flag actions across an enterprise that deviate from prescribed policies and typical behavior, such as an employee accessing unauthorized information, IBM will offer greater security intelligence capabilities and help prevent breaches.

    Although the Security Systems division is a new focus for IBM, security has long been a hot button for the company. IBM currently operates nine security operations centers, nine IBM Research centers, 11 software security development labs, and three Institutes for Advanced Security. Big Blue also says it currently monitors 12 billion security events per day in more than 130 countries and holds 3,000 security patents.

    No one is immune from cyber attack, whether it be at the hands of external or internal forces. The bottom line is, if you haven’t done so already, take a hint from IBM and put the security of your company’s data at the top of your priority list.

    RELATED STORIES

    A Big Data Hungry IBM Buys i2 and Algorithmics

    IBM Buys PSS Systems for Getting Rid of Unnecessary, Risky Data



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    iTech Solutions

    Choose Your Own IBM i OS Upgrade Adventure

    Choice 1:

    • Plan for 3 months
    • Check hardware & software compatibility
    • Check Lan Console, MQ, Domino, SMB, Ciphers, WebSphere, Java
    • Test, test, and test again
    • Prepare for potential downtime
    • Hope the OS Upgrade goes smoothly
     

    Choice 2:

    • Strategically plan alongside a team of IBM i experts
    • Work with experienced system admins to ensure hardware & software compatibility
    • Receive full analysis of Lan Console, MQ, Domino, SMB, Ciphers, WebSphere, Java
    • Know which PTFs are required for the upgrade
    • Relax, and let iTech handle the rest

    Not every OS Upgrade has to be an adventure. We make the process easy for you.

    Having completed thousands of upgrades, we have the experience, know-how, and expertise to get the job done seamlessly. We know what can go wrong, what to plan for, and can act quickly if problems arise.

    No matter where you are in your journey, we’re here to help. Take a look at the video below to ensure you’re on the right path when it comes to your next IBM i OS Upgrade.

    [Video] What You Need to Know to Successfully Upgrade to IBM i 7.4 and 7.5

    An IBM i OS upgrade isn’t complete until all the boxes are checked. Is your list up to date?

    In this video, Pete Massiello covers what’s new on IBM i 7.5, planning tips, pre-requisites, and post-installation requirements for a successful OS Upgrade.

    [ Watch Now ]

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Admin Alert: How to Retrieve Password Parameters for Auditors GXS Shares Development Plans for IBM i Customers

    Leave a Reply Cancel reply

Volume 20, Number 34 -- October 10, 2011
THIS ISSUE SPONSORED BY:

BCD
Infor
Townsend Security
Vision Solutions
Shield Advanced Solutions

Table of Contents

  • IBM Readies October Power Systems Announcements
  • Speaking of IBM i Innovation . . .
  • Oracle Drives Java Technology Forward at Annual Conference
  • As I See It: The Other Final Frontier
  • Oracle Has Built A Modern, Cloudy AS/400
  • Infor Wants You, Channel Partner
  • IBM Grabs Q1 Labs and Creates New Security Division
  • IBM’s Wheels And Deals On 10 Gigabit BNT Switches
  • Future Tivoli Tools Extend SSO To Clouds, Analyze Services
  • IBM Offers Tech Support Try-and-Buy Services

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM i 7.3 TR12: The Non-TR Tech Refresh
  • IBM i Integration Elevates Operational Query and Analytics
  • Simplified IBM i Stack Bundling Ahead Of Subscription Pricing
  • More Price Hikes From IBM, Now For High End Storage
  • Big Blue Readies Power10 And IBM i 7.5 Training for Partners
  • IBM Delivers More Out-of-the-Box Security with IBM i 7.5
  • Groundhog Day For Malware
  • IBM i Community Reacts to IBM i 7.5
  • Four Hundred Monitor, May 11
  • IBM i PTF Guide, Volume 24, Number 19

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.