• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Mobile Security a Top Priority for CISOs, IBM Finds

    October 29, 2013 Alex Woodie

    An IBM survey of chief information security officers found that mobile security is the top initiative at the moment, with 25 percent of CISOs having deployed some mobile security solutions in the last year. IBM also rolled out a new security service, based in part on partner Akamai‘s technology, that’s aimed at dealing with distributed denial of service (DDOS) attacks.

    While mobile security may be on the minds of CISOs, there’s still a lot to be done. According to IBM’s survey, less than 40 percent of organizations have security policies in place to deal with the bring your own device (BYOD) phenomenon. That is a real concern, especially as cyber criminals get more sophisticated in their use of technology to steal data and otherwise exploit the computer systems of victims.

    In the recent mid-year X-Force threat report, IBM’s security experts identified Android devices as particularly vulnerable. While the latest Android OS version 4.2 upgrade offers some protection against malware, only 6 percent of the Android community is using this latest release, IBM says in its September report. That leaves most Android users vulnerable to increasingly sophisticated malware, such as Chui, one of the more successful malware packages in circulation today.

    CISOs have their work cut out for them, as they attempt to strike the right balance between dealing with technology-oriented threats, like Chui, while satisfying the other demands of their jobs. These other demands including things like shaping an overall security and risk management strategy, dealing with budgetary issues, and communicating with fellow C-level executives, the board, and law enforcement.

    “It’s evident in this study that security leaders need to focus on finding the delicate balance between developing a strong, holistic security and risk management strategy, while implementing more advanced and strategic capabilities such as robust mobile security that includes policies for BYOD,” said David Jarvis, co-author of the report and manager at the IBM Center for Applied Insights.

    The cloud figures to play heavily in CISO’s strategies. According to IBM’s study, more than three-quarters of security leaders have deployed some type of cloud security services. The most popular cloud security service is data monitoring and audit, followed by federated identity and access management.

    IBM unveiled a new cloud-based offering last week aimed at dealing with DDoS attacks. DDoS attacks are on the rise, according to IBM, but many firms are unable to effectively deal with them due to the lack of on-site expertise and skills sets. The average large company deals with 1,400 cyber attacks every week, according to IBM, with DDoS attacks among them.

    Who better to deal with DDoS attacks than Akamai, the website services firm that basically operates a secondary, private network that ensures many of the largest Web properties can scale to meet demand. As part of the DDoS offering solution, IBM will integrate Akamai’s Web security solution “Kona Site Defender” with IBM’s Cloud Security Services portfolio.

    “DDoS mitigation and prevention can be incredibly complex and resource intensive,” says Ronni Zehavi, senior vice president and general manager of the Security Division at Akamai. “Together, IBM and Akamai can offer the right mix of technology and expertise to give our customers the peace of mind that their DDoS mitigation efforts are in the right hands.”

    RELATED STORIES

    It’s Time For Security Administrator Roles At IBM i Shops, Skyview Says

    IBM Highlights Critical Security Vulnerabilities with New Tool



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    ARCAD Software

    [Live Webinar] Rewrite your Synon in Java? It could be… a mistake!

    Converting from Synon CA 2E to a modern language? There are many good reasons to take this step. Beyond the critical shortage of Synon skills, applications developed in this 4GL environment can no longer take advantage of key technology advances in the IBM i operating system. And though a leader in its day, the Synon CASE tool is incompatible with modern DevOps practices and concurrent development.

    Do you think the best way to move away from Synon CA 2E is by rewriting everything in Java?

    Think again. A full rewrite is risky, expensive, and slow — often leading to years of redevelopment and countless functional regressions.

    Join Philippe Magne, CEO of ARCAD Software and Ray Bernardi, senior solution architect to learn why a conversion to Free Form RPG is a risk-free and high-performance option that leverages the architecture of the original Synon application – retaining all the reliability and security advantages of the host platform.

    In our Webinar, we will share a secure, automated migration path for business applications developed in Synon CA 2E:

    • 100% automated conversion to modern Free Form RPG and DDL (SQL)
    • Guaranteed conversion accuracy with test automation process
    • Possible modernization of the user interface during the project
    • Risk free, fixed price Modernization as a Service (MaaS)
    • Modern full DevOps framework for delivery

    Leverage the competitive advantage within your Synon application.

    Register Today!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    TECA Data:  Download a FREE Disaster Recovery Planning whitepaper. First 30 days free!
    Abacus Solutions:  Our Maintenance Services are 24/7/365 for Your IBM i Environment
    Essextec:  Quick Security Check to analyze the 500 most vulnerable data points on your IBM i

    More IT Jungle Resources:

    System i PTF Guide: Weekly PTF Updates
    IBM i Events Calendar: National Conferences, Local Events, and Webinars
    Breaking News: News Hot Off The Press
    TPM @ EnterpriseTech: High Performance Computing Industry News From ITJ EIC Timothy Prickett Morgan

    Cloud and HANA Grow, Software Slows At SAP In Q3 The Sales Pitch For The PureFlex For IBM i Bundle

    Leave a Reply Cancel reply

Volume 13, Number 31 -- October 29, 2013
THIS ISSUE SPONSORED BY:

Databorough
Maxava
Essextec
Secure Infrastructure & Services
TECA Data

Table of Contents

  • Actifio Supports IBM i with Copy Data Solution
  • Bytware Fights Advanced Security Threats with McAfee Update
  • Free Format RPG: It’s All About the Jobs
  • NSi Secures Printer Output
  • LinkIt Hooks IBM i to Windows
  • MicroStrategy Giving Away Analytic Tool
  • LANSA Touts Long Relationship with German Material Supplier
  • Rocket Revs iCluster HA Tool
  • Mobile Security a Top Priority for CISOs, IBM Finds
  • ManH Reports 17 Percent Revenue Increase

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Stacking Up Power10 And Power11 Systems Price/Performance
  • Where Infor Is Headed With Its ERPs For IBM i
  • Rocket Delivers More DevOps Capabilities For IBM i
  • A Few More Power Systems Announcements Before Year End
  • IBM i PTF Guide, Volume 27, Number 46
  • Bang For The Buck On Entry Power10 And Power11 Machines
  • A Hardware Refresh Is The Perfect Time To Re-Evaluate Your HA/DR Strategy
  • Fresche Taps AI For New RPG-To-Java Conversion Tool
  • Gartner Raises 2025 IT Spending Forecast, Puts Out 2026 Prediction
  • IBM i PTF Guide, Volume 27, Number 45

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle