IBM launches cloud computing security initiative
IBM introduces cloud security initiative with a range of solutions to help businesses protect their infrastructure.


IBM has introduced new cloud computing offerings, including a security assessment to help businesses understand what needs protection.
Big Blue's assessment service will compare a company's cloud solutions' security programs against industry best practices and the client's set cloud security objectives.
IBM professionals can then draw up a list of measures to help improve the overall security environment.
A hosted vulnerability management scanning solution has also been launched by IBM, helping to identify security flaws in network devices, servers, web applications and databases.
"The new hosted vulnerability management scanning solution carries advanced scanning capabilities for complicated security challenges and provides strong reporting capabilities through a web-based portal that helps us easily satisfy our audit requirements," said IBM customer Henrique Matiole, IT supervisor for Brazilian-based firm ArcelorMittal Sistemas.
Amongst the other new services is the IBM Cloud Security Strategy Roadmap, which places Big Blue employees on site to help define the client's cloud aims and security plans.
The aim is to develop a "high-level" security strategy roadmap for attaining cloud security goals, IBM said.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"The one size fits all' cloud security strategy will not work for most businesses," said Steve Robinson, general manager for IBM Security Solutions.
"Our enterprise clients are looking for a trusted adviser to provide the right mix of security consulting services and offerings to match," Robinson added.
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
Protect your attack vectors
Webinar An effective way to reduce your attack surface
By ITPro
-
Protect your attack vectors from emerging threats
Webinar Discover an effective way to reduce your attack surface
By ITPro
-
IBM and SAP expand partnership to drive generative AI capabilities
News The new Value Generation initiative aims to deliver greater client productivity gains through generative AI solutions
By Daniel Todd
-
Driving business innovation through application modernization and hybrid cloud
webinar Transform with IBM Z
By ITPro
-
How Ted Baker leverages Cloudflare to create a first-class customer experience
Webinar Defend against DDoS attacks and mitigate security challenges in the ecommerce space
By ITPro
-
Building an intelligent, modern, sustainable enterprise
Whitepaper Accelerate your SAP transformation with IBM and AWS
By ITPro
-
Tangible business value from cloud transformation remains elusive
Whitepaper Discover the top five secrets to mastering cloud for business
By ITPro
-
Cloud-enabled manufacturing
Whitepaper Operations and IT leaders turn ambition into advantage
By ITPro