Skip navigation
Skip navigation




IBM today said that it will deliver new security services, software, technology and client solutions for wireless networks and applications, helping organisations safely extend corporate information beyond traditional wired networks to mobile devices.



IDC projects the worldwide market for information security services to more than triple to billion at a compound annual growth rate of approximately 25.5% over the 2000 to 2005 period.



"The growing corporate appetite for wireless access services is one of the factors driving the need for advanced information security services as technologies for circumventing network security systems continue to keep pace with the technologies designed to defend against them," said Allan Carey, senior analyst with IDC's Information Security Services research program.



IBM is leading an industry charge to develop technologies that allow highly mobile workers to wirelessly and securely connect to corporate networks from anyplace at anytime, through a wide range of mobile devices.



As part of this initiative, the company has quickly made wireless security technology recently developed in its research labs available to customers through IBM Global Services. The company is also tapping technology, products and services from multiple business units to address the enterprise security needs created by the growth in wireless access to corporate networks. Among the units involved are: IBM Global Services, IBM Research, IBM Software Group, and IBM's Personal Computing Division. The initiative's goal is to help companies identify mobile and wireless vulnerabilities, establish security policies, authenticate users, and securely encrypt information travelling across their wireless networks.



"Wireless access to information can have a profound effect on business and the ability to keep that information secure is a critical issue for many companies," said John Kirby, IBM general manager of wireless e-business services. "IBM is taking wireless security very seriously and is bringing all its intellectual and technological firepower to bear in this space."



Specifically, IBM today announced:



New wireless security services. IBM Security and Privacy Services has extended their comprehensive expertise in security to specific business issues, risks, and opportunities in the wireless environment. Through Wireless risk assessment and Wireless solution design, IBM Security and Privacy specialists work to assess, plan, design, implement and manage a security-rich environment for wireless applications and transactions protecting both organisations and their customers.



IBM's security capability is aligned to a number of industry solutions that can be used by businesses to extend current e-business applications to the wireless space and introduce new, innovative solutions made available by advances in wireless technology. Helping build trusted electronic relationships with employees, customers and business partners.



In addition, IBM security consultants will have access to the industry's first auditing tool for wireless network security, called Wireless Security Auditor, developed by IBM Research. The Wireless Security Auditor allows security consultants and system administrators to find access points and examine configurations so proper steps can be taken to secure wireless networks. This adds to IBM's existing broad portfolio of wireless services helping companies of all sizes, across all industries, implement wireless e-business to enhance productivity and improve customer relationship and supply-chain management.



New wireless security software. IBM is announcing new wireless functionality across its key security software products. Tivoli Risk Manager now features wireless network vulnerability management based on the Wireless Security Auditor created by IBM Research. Tivoli Risk Manager monitors output of the Wireless Security Auditor and sends events to the Tivoli Risk Manager event correlation engine and management console, combining these security events with all other security events across the e-business--from firewalls, intrusion detection systems, servers and other security checkpoints -giving administrators a broad view of e-business security exposures, attacks and vulnerabilities.



Additionally, IBM is delivering secure access management software for secure mobile transactions. The latest version of Tivoli Policy Director is the industry's first software that enables organisations to provide Web single sign-on and authorisation to mobile transactions and applications accessed through both Wireless Application Protocol (WAP) and i-mode devices. With this out-of-the-box support for wireless, organisations can a deliver a consistent security policy and secure end-user experience extending across both their wired and wireless enterprise applications and portals.



New embedded ThinkPad security technology. IBM is also extending its IBM Embedded Security Subsystem to encompass virtually its entire NetVista desktop and ThinkPad Notebook computer lines. The subsystem helps protect data, hardware, network access and communications -- both wired and wireless -- on select models of the ThinkPad X, T and A Series, as well as the NetVista M41 Series desktop PCs and the NetVista X41 integrated flat-panel PC.



The IBM Embedded Security Subsystem provides hardware-based protection of critical security information, including passwords, encryption keys, and electronic credentials. This helps protect information and PCs from "sniffers," Trojan horses, and other potential invaders. It also helps identify computer users involved in transactions, and helps establish that data transmissions are authentic, confidential, and intact. The subsystem helps protect electronic transmissions generated by applications such as Microsoft Outlook, Lotus Notes, Microsoft Internet Explorer and Netscape Navigator.



IBM ThinkPad notebooks and NetVista desktops feature the unique embedded Security Chip on the system board. The Security Chip is a cryptographic microprocessor that supports functions such as key encryption for privacy and digital signatures for authentication or user identification. The chip provides the most secure endpoint for Public Key Infrastructure (PKI) encryption, more so than software-based security, which is easier to hack.



In addition to the Wireless Security Auditor, IBM Research brings IBM's top intellectual firepower to bear on solving security issues, including the industry's largest portfolio of software and hardware patents. IBM researchers have helped ferret out security vulnerabilities, and work with industry standards bodies, such as IEEE-802.11i Task Group, to improve network security. IBM Research's contributions to mobile security also include JCOP, a highly portable JavaCard/OpenPlatform compliant virtual machine implementation. JCOP is available for various security tokens, such as USB keyfobs, smart cards, such as the Visa multiapplication card or GSM SIM cards unifying application development across the most relevant mobile security platforms.



- ends -




Notes to the Editor:



About IBM



IBM is the world's leading e-business company offering a wide range of services, solutions, software and technologies that allow businesses to take full advantage of the exploding wireless market. IBM's pervasive computing and wireless solutions extend new and existing e-business applications to the emerging class of connected devices and appliances. IBM has pioneered mobile e-business across many industries, geographic locations, and the three key business segments: business-to-employee; business-to-business; and business-to-consumer. Together with our partners, we have developed mobile solutions in the health care, financial services, retail, travel, utilities, government/public and telecommunications industries.

More information about IBM can be found on the web at http://www.ibm.com

For further information:

Nicky Morgan/ Jonathan Batty
Brodeur Worldwide (On Behalf of IBM)
Tel: 44 (0)1753 790700
E-mail: nmorgan@uk.brodeur.com/jbatty@uk.brodeur.com
______________________________________________________________________


Click on the link below to see this news release as it appears on the Brodeur
News Room website and obtain full contact details.
http://www.brodeurnewsroom.com/asp/release.asp?rid=1788&cid=...
______________________________________________________________________


Click the link below to login and update your company and subject preferences,
or personal details.
http://www.brodeurnewsroom.com/asp/login.asp
______________________________________________________________________


Click on the link below to have your login details re-sent to you.
http://www.brodeurnewsroom.com/asp/forgot.asp
______________________________________________________________________

This press release was distributed by ResponseSource Press Release Wire on behalf of Pleon in the following categories: Consumer Technology, Personal Finance, Business & Finance, Computing & Telecoms, for more information visit https://pressreleasewire.responsesource.com/about.