web analytics

IBM adds quantum-resistant controls within new security suite – Source: www.csoonline.com

Rate this post

Source: www.csoonline.com – Author:

New offerings are targeted at bolstering an organization’s cryptographic and AI security posture.

In an effort to arm organizations against emerging AI and quantum-computing driven threats, IBM has announced Guardian Data Security Center, an offering it claims can integrate and streamline targeted security workflows under unified controls.

“IBM Guardium Data Security Center is new data security software for protecting against hybrid cloud, AI, and quantum-related risks,” said Akiba Saeedi, vice president of IBM Security Product Management. “Its unified capabilities help with data compliance, detecting malicious activity related to data, and security posture in cloud AI and cryptography.”

The offering will feature two distinct capabilities: Gaurdium Quantum Safe and Guardium AI Security, to manage an enterprise’s cryptographic and AI security posture, respectively.

The offering will be available to customers in mid-November, through an undisclosed subscription model.

Applying IBM’s post-quantum cryptography

Through the new Guardium Quantum Safe capability, IBM is bringing its (now standardized) post-quantum cryptography (PQC) algorithms, which includes CRYSTALS-Kyber, CRYSTALS-Dilithium, and SPHINCS+, to its customers.

“IBM Guardium Quantum Safe is built atop deep expertise across IBM Research, IBM Software, and IBM Consulting,” Saeedi noted. “Several of IBM Research’s post-quantum cryptography algorithms were recently standardized by the US National Institute of Standards and Technology (NIST).”

PQC algorithms refer to the cryptographic techniques designed to be secure against attacks by quantum computers. With the advancement of quantum computers, traditional cryptography algorithms such as RSA, DSA, and ECC, are vulnerable to quantum attacks with computers that can easily solve the mathematical problems these systems are based on.

Other than enabling organizations to gain visibility into and manage their cryptographic security posture, IBM Quantum Safe will also provide for policy enforcement around these algorithms.

“IBM Guardium Quantum Safe allows organizations to enforce policies based on external, internal, and government regulations by pulling crypto algorithms used in code, vulnerabilities detected in code, and network usages into a single dashboard for security analysts to monitor policy violations and track progress,” Saeedi added.

Targeted specifically at the Gen-AI induced threats and governance challenges, the Guardium AI Security capability within IBM’s new offering will monitor an organization’s AI deployments for security vulnerabilities and data compliance policy violations, according to IBM.

“Generative AI adoption is surging across businesses. And while it provides significant benefits, engaging with the technology without proper security also brings significant risks,” Saeedi said. “One key example is shadow AI — the presence of unsanctioned models operating in a business’ digital environment. If these models aren’t caught and governed, they can expose critical, coveted data.”

Guardium AI Security integrates with IBM watsonx and other generative AI SaaS providers to help discover AI deployments, address compliance, and mitigate vulnerabilities through a “common view of data assets.”

Additionally, IBM announced adding decentralized identity features to its Verify portfolio. “IBM Verify Digital Credentials digitizes physical credentials like drivers’ licenses, insurance cards, loyalty cards, and employee badges, which can then be standardized, stored, and shared with comprehensive security, privacy protection, and control,” the company said.

SUBSCRIBE TO OUR NEWSLETTER

From our editors straight to your inbox

Get started by entering your email address below.

Original Post url: https://www.csoonline.com/article/3577874/ibm-adds-quantum-resistant-controls-within-new-security-suite.html

Category & Tags: IT Governance, Security – IT Governance, Security

Views: 1

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post