{"id":840,"date":"2007-07-24T00:00:00","date_gmt":"2007-07-24T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/07\/24\/piecing-together-ibms-security-puzzle\/"},"modified":"2021-12-30T11:38:15","modified_gmt":"2021-12-30T11:38:15","slug":"piecing-together-ibms-security-puzzle","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/07\/24\/piecing-together-ibms-security-puzzle\/","title":{"rendered":"Piecing together IBM&#8217;s security puzzle"},"content":{"rendered":"<p>IBM owns some of the world&#8217;s leading IT security talent, products, and services, but executives with the massive company say it will likely never aim to become what people might label as a true &#8220;security vendor.&#8221;  The technology giant has added high-profile security assets in the last year alone, acquiring such companies as applications testing specialist Watchfire in June 2007 and managed services and hardware giant ISS in Aug. 2006.  However, unlike rivals like Microsoft &#8212; which has moved to stake a claim in the anti-virus, messaging, and collaboration security segments with its own products &#8212; executives say that Big Blue is more interested in blending security further into its existing products and services than it is hopeful of becoming a more mainstream security provider.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Yet the common theme throughout the company&#8217;s overarching strategy is not one that emphasizes competition in hot markets or via standalone products, executives say, but rather an approach that attempts to mix security skills into almost all of its existing business lines as a component of its larger vision.<\/p>\n<p>All of those efforts tie back into the notion of lowering customers&#8217; security concerns either by bolstering the onboard protection of its products or fostering business controls that benefit areas like regulatory compliance, the executive said.<\/p>\n<p>The effort is being undertaken in the name of helping businesses drive security further into their own software development efforts, a trend that is currently sweeping across that sector.<\/p>\n<p>http:\/\/www.infoworld.com\/article\/07\/07\/23\/Piecing-together-IBM&#8217;s-security-puzzle_1.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-840","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/840","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=840"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/840\/revisions"}],"predecessor-version":[{"id":3327,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/840\/revisions\/3327"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=840"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=840"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=840"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}