IBM introduces mobile security tech and services
IBM announces a range of initiatives based around mobile security.


IBM has launched a range of solutions targeting the mobile security segment, including endpoint management software.
Tivoli Endpoint Manager uses the technology acquired when IBM bought BigFix, bringing endpoint and security management onto one platform.
Administrators will be able to use this one solution to keep an eye on both physical and virtual endpoints.
The software is capable of identifying which devices are not in compliance with corporate IT policies and will recommend fixes and updates for up to 500,000 machines in minutes.
"From electrical grids to mobile devices, transportation systems and buildings, the proliferation of these intelligent systems is creating new security loopholes that businesses need to address," said Steve Robinson, general manager at IBM Security Solutions.
"On today's smarter planet, everything is an endpoint, and must be managed and secured like any other critical business asset."
IBM has also teamed up with partner Juniper Networks on producing a security solution for the top mobile platforms, including Apple iOS, Android, Blackberry OS, Windows Phone 7 and Symbian.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The service uses policy based enforcement to ensure only authorised personnel can access corporate data.
Elsewhere, Big Blue announced further investment into research and development projects based around security.
IBM developers are looking at creating a single management platform to manage any mobile device on a business network, allowing administrators to remotely set policies, monitor employee devices and wipe data.
The tech giant said it was also exploring technology to secure smart meters.
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
Want a return on your AI investment? Open source could be the key to success
News Organizations using open source AI tools are more likely to report a return on investment
By Nicole Kobie
-
IBM just open sourced these generative AI coding models
News IBM has open sourced models trained on code written in 116 programming languages - and it could make life a lot easier for enterprise developers
By Steve Ranger
-
Application performance management for microservice applications on Kubernetes
whitepaper How to improve business-critical app performance in a Kubernetes environment
By ITPro
-
Can Oracle really be Linux's knight in shining armor?
Opinion The self-proclaimed champion of open source freedom would like you to forget about its history
By Richard Speed
-
Achieving software health in the microservices age
Whitepaper Tips and tricks for the new and emerging remediation methods
By ITPro
-
The true story behind the IBM Personal Computer
In-depth The industry-creating IBM Personal Computer 5150 turned 40 this year. To mark the occasion, we reveal the story of its birth – and destroy one long-running myth in the process
By Tim Danton
-
Google adds new compliance and security certifications for Google Cloud
News New certifications prove Google meets data protection and security requirements in Europe, the US, and Asia-Pacific region.
By Praharsha Anand
-
Xinuos sues IBM for patent infringement
News Lawsuit revisits ancient legal war over Unix code
By Danny Bradbury