IBM Expands Zero Trust Strategy Capabilities with New SASE Services to Modernize Network Security

CAMBRIDGE, Mass., Aug. 25, 2021 — IBM Security today announced new Secure Access Service Edge (SASE) services designed to help accelerate organizations’ adoption of cloud-delivered security at the edge, closer to the users and devices that access corporate resources. The new services combine expertise and methods from IBM Security with technology from Zscaler, to help deliver a fully managed transformation to a cloud-based SASE architecture, a key element of a zero trust security posture.

According to a new commissioned study from IBM, conducted by Forrester Consulting, 78% of organizations surveyed are either interested in, or plan to, implement SASE in the next 12 months.1 SASE helps bring together software defined networking and network security technologies into a single, cloud-based service. SASE is a new architecture model designed to address the requirements of organizations who are digitally transforming, adopting cloud and SaaS applications, and providing services to a hybrid workforce and customer base.

“Traditional approaches to network security are not as viable in a digital world where users and applications are distributed. We’re seeing this transformation happen right before our eyes as many organizations plan to operate in a hybrid model for the foreseeable future,” said Mary O’Brien, General Manager, IBM Security. “This new approach requires a shift in culture, processes and collaboration across teams alongside a new technology architecture. By focusing on business needs, our zero trust approach can help accelerate this transformation for clients thanks to the skills, methods and capabilities brought together via our alliance partnership with Zscaler.”

Announcing IBM Security Services for SASE
For many organizations, the transformation to SASE is a shift in how security is structured today. Security and IT teams are challenged with effectively implementing a SASE solution in a non-disruptive way, changing the processes and culture to accommodate the transformation and realize a quick time-to-value. IBM Security Services for SASE is designed to help organizations transform their network security, applying an approach tailored to their unique needs. This approach can help clients to support key business drivers, including hybrid workforce, seamless third-party access, merger & acquisition execution, and network transformation for the hybrid cloud, 5G, and IoT.

IBM offers a programmatic approach to SASE led by security and cloud specialists who work with clients to create SASE adoption plans while also managing the related services for clients to optimize the environment.  This is based on IBM Security’s five-step maturity model, helping clients identify a target maturity that focuses on business outcomes. IBM uses a zero trust strategy, best practices and methods to implement Zscaler’s market-leading SASE capabilities including the creation of governing processes and policies that facilitate a SASE transformation. The transformation is supported by certified deployment and integration expertise by Zscaler at a pace that suits digital business. Finally, customers can benefit from best-in class IBM Managed Security Services, the market-leading managed security services provider globally. Services can include around-the-clock security monitoring, management, and continuous improvement of the SASE solution to evolving threats.

The resulting SASE program is designed to help organizations protect their priority business drivers with a zero trust approach:

  • Hybrid Workforce Access: IBM can provide a network access solution based on zero trust methods which can replace traditional VPN connectivity, help increase protection and support faster, seamless user experiences. This can provide organizations with a flexible and scalable cloud-delivered access solution that can adapt to employees alternating between working in and out of the office.
  • Third-Party Access: IBM can develop a solution that allows organizations to define and extend internal workforce policies to contractor and third-party users. This includes requiring an equivalent level of authentication and offers visibility and control over who can see sensitive data and resources. Organizations can also gain the ability to set up individual policies by type of user, group, and application.
  • Mergers and Acquisitions: IBM can design integrated access management using an organization’s existing identity provider solutions with the other companies involved in a merger or acquisition, which can help speed up access and transition for employees from both sides.
  • Network Transformation: IBM can help organizations transform their network from a traditional model to a cloud-based framework as part of their overall SASE implementation strategy. This approach could  help provide lower latency, cost savings and is supported by a cloud-delivered network security structure.
  • 5G, Edge and IoT Protection and Support: IBM can help enable edge computing to receive branch-to-cloud protection and organizations can use integrated edge computing security from the complete SASE solution, enabling additional IoT business drivers. All these items can also strategically help in cloud transformation.

“Implementing a zero trust architecture is an important step for organizations adopting SASE to effectively secure new distributed working models and safeguard mission-critical services that have now moved to the cloud,” said Jay Chaudhry, Chairman, CEO and Founder of Zscaler. “Through our expanded alliance partnership with IBM, as part of the Zscaler Zero Trust Ecosystem, customers can confidently expedite their secure digital transformation journey to support essential initiatives from ensuring secure employee productivity from anywhere to accelerating M&A transactions.”

IBM Security Services for SASE is now available, for more information please visit: https://www.ibm.com/security/services/sase

IBM Unveils On-Chip Accelerated Artificial Intelligence Processor

ARMONK, N.Y., Aug. 23, 2021 — At the annual Hot Chips conference, IBM today unveiled details of the upcoming new IBM Telum Processor, designed to bring deep learning inference to enterprise workloads to help address fraud in real-time. Telum is IBM’s first processor that contains on-chip acceleration for AI inferencing while a transaction is taking place. Three years in development, the breakthrough of this new on-chip hardware acceleration is designed to help customers achieve business insights at scale across banking, finance, trading, insurance applications and customer interactions. A Telum-based system is planned for the first half of 2022.

Innovations across banking, finance, trading, insurance

Today, businesses typically apply detection techniques to catch fraud after it occurs, a process that can be time consuming and compute-intensive due to the limitations of today’s technology, particularly when fraud analysis and detection is conducted far away from mission critical transactions and data. Due to latency requirements, complex fraud detection often cannot be completed in real-time – meaning a bad actor could have already successfully purchased goods with a stolen credit card before the retailer is aware fraud has taken place.

According to the Federal Trade Commission’s 2020 Consumer Sentinel Network Databook, consumers reported losing more than $3.3 billion to fraud in 2020, up from $1.8 billion in 20192. Telum can help clients to move their thinking from a fraud detection posture to a fraud prevention posture, evolving from catching many cases of fraud today, to a potentially new era of prevention of fraud at scale, without impacting service level agreements (SLAs), before the transaction is completed.

The new chip features an innovative centralized design, which allows clients to leverage the full power of the AI processor for AI-specific workloads, making it ideal for financial services workloads like fraud detection, loan processing, clearing and settlement of trades, anti-money laundering and risk analysis. With these new innovations, clients will be positioned to enhance existing rules-based fraud detection or use machine learning, accelerate credit approval processes, improve customer service and profitability, identify which trades or transactions may fail, and propose solutions to create a more efficient settlement process.

Telum and IBM’s Full Stack Approach to Chip Design

Telum follows IBM’s long heritage of innovative design and engineering that includes hardware and software co-creation and integration that spans silicon, system, firmware, operating systems and leading software frameworks.

The chip contains 8 processor cores with a deep super-scalar out-of-order instruction pipeline, running with more than 5GHz clock frequency, optimized for the demands of heterogenous enterprise class workloads. The completely redesigned cache and chip-interconnection infrastructure provides 32MB cache per core, and can scale to 32 Telum chips. The dual-chip module design contains 22 billion transistors and 19 miles of wire on 17 metal layers.

Leadership in semiconductors

Telum is the first IBM chip with technology created by the IBM Research AI Hardware Center. In addition, Samsung is IBM’s technology development partner for the Telum processor, developed in 7nm EUV technology node.

Telum is another example of IBM’s leadership in hardware technology. IBM Research, among the world’s largest industrial research organizations, recently announced scaling to the 2 nm node, the latest benchmark in IBM’s legacy of contributions to silicon and semiconductor innovation. In Albany, NY, home to the IBM AI Hardware Center and Albany Nanotech Complex, IBM Research has created a leading collaborative ecosystem with public-private industry players to fuel advances in semiconductor research, helping to address global manufacturing demands and accelerate the growth of the chip industry.

Statements regarding IBM’s future direction and intent are subject to change or withdrawal without notice and represent goals and objectives only.

CAST and IBM Help Enterprises Accelerate Hybrid Cloud Adoption

New York and Paris, August 5, 2021 – Today, IBM and CAST, provider of software intelligence for digital leaders, announced new capabilities in CAST Highlight – the software intelligence product for rapid application analysis – to help enterprises transform and accelerate IBM Cloud adoption. Continuing its longstanding work with IBM to help organizations modernize applications and adopt a hybrid cloud approach, the new CAST Highlight capabilities include automated recommendations for IBM Cloud offerings.

Application modernization is one of the biggest challenges faced by enterprise IT departments, especially as organizations turn to hybrid cloud strategies and need to seamlessly run applications across several different platforms. When migrating critical workloads to the cloud, it becomes essential to rapidly pinpoint areas where application code needs to be changed, estimate precisely the effort required and identify services that are best suited for the applications to leverage. CAST Highlight now automatically recommends the IBM Cloud native services best suited for each application, based on its technical characteristics. For example, when CAST Highlight detects that an application is performing manipulation of persistent files, the IBM Cloud Object Storage service is recommended, along with the relevant documentation for deploying the service.

“CAST Highlight can analyze the source code of hundreds of applications in a week and automatically detect patterns that may impact the migration, whether one intends to use containers or embark on refactoring. It also specifies exactly where and how delays can be addressed,” said Marc Zablit, EVP CAST Business Development. “By optimizing the migration process, organizations can more quickly experience the unique benefits of IBM Cloud, including its leading security capabilities.”

IBM Cloud is designed with features to address security, compliance and resiliency demands of today’s enterprises. By hosting workloads on IBM Cloud, enterprises can use IBM Cloud’s confidential computing capabilities delivered with IBM Hyper Protect Crypto Services and backed by the highest level of security certification commercially available to protect mission-critical workloads. This can allow businesses to retain control of their own encryption keys, meaning clients are the only ones who can control access to their data, not even IBM can access.

IBM Global Business Services multi-disciplinary experts use CAST Highlight as part of the IBM Garage Methodology designed to help clients fast track and derisk the modernization of applications and co-create solutions.

“CAST technology has been an integral part of the IBM Garage for over a year, helping enterprises on their hybrid cloud journeys,” said Hillery Hunter, VP and CTO, IBM Cloud. “With the new CAST Highlight capabilities, organizations can accelerate their migrations to cloud and experience the benefits of IBM Cloud earlier, including its industry-leading confidential computing capabilities.”

CAST is part of IBM’s partner ecosystem, an initiative to support partners of all types — whether they build on, service or resell IBM technologies and platforms — to help clients manage and modernize workloads with Red Hat OpenShift for cloud environments, including IBM Cloud. Red Hat OpenShift is the industry’s leading enterprise Kubernetes platform. IBM Cloud is the industry’s most secure and open public cloud for business. With its security leadership, enterprise-grade capabilities and support for open source technologies, IBM Cloud is designed to differentiate and extend on hybrid cloud capabilities for enterprise workloads.

The new capabilities to help organizations migrate mission-critical applications to IBM Cloud faster are now generally available at castsoftware.com/highlight.