2 min Security

IBM Cloud Pak for Security gets zero trust capabilities

IBM Cloud Pak for Security gets zero trust capabilities

IBM’s Cloud Pak for Security is getting new zero trust capabilities. The platform wants to tackle cybersecurity threats across hybrid and multi-cloud environments. IBM said the features will help customers adopt the zero-trust approach to security by applying principles of assuming breach, never trust, always verify, and least privilege access.

The new IBM Security zero trust blueprints form part of the highlights of the release. They are designed for use around common zero trust use cases.

The four new blueprints will provide the framework that guides the preservation of customer privacy, remote workforces, secure hybrid workforces, the reduction of insider threats, and protection of hybrid cloud environments.

Modernization

A new partnership between IBM and Zscaler was announced as part of the effort to address network security and remote work modernization. The partnership will bring IBM Security Services to Zscaler’s network security technology to achieve an end-to-end SASE (secure access service edge) solution.

Dow Chemical is one of the early customers working with IBM Security and Zscaler to advance remote/hybrid workforce modernization.

Cloud Pak for Security was launched in 2019, as the foundation of IBM’s open security strategy.  It gleans threat information and insights from multiple sources without data movement.

IBM Cloud Pak’s expanding capabilities

The system uses IBM’s investment in Red Hat, including Open Shift, and is designed to unify security across hybrid cloud environments. Over the past year, IBM’s Cloud Pak capabilities have been expanded to address key threat management components like detection, investigations, and response.

IBM added a new integrated data security hub in October that promises to bring data security insights into threat management and security response platforms.

As adoption takes off, users will find more use cases for these capabilities and leverage them to mitigate the ever-present and ever-advancing cyber threats.