Feeds

IBM snaps up identity access gatekeeper tech

Beefs up security portfolio with CrossIdeas

Internet Security Threat Report 2014

IBM has snapped up privately held security software firm CrossIdeas. Financial terms of the deal, announced Thursday, were undisclosed.

Rome, Italy based CrossIdeas has been developing identity access technology since 2011. Its technology allows CISOs and security teams in big companies to automatically detect conflicts in authorisation, blocking access until conflicts are resolved through a management dashboard.

For example, a stock trader working in a bank may be promoted and given access to approve trades in a new system while retaining access to enter trades in the previous system. This dual access may constitute a segregation of duties violation, pushing a financial institution out of adherence with compliance regulations such as Sarbannes-Oxley.

CrossIdeas' software would allow auditors and managers to detect and remediate the segregation of duties violation before it becomes a security risk.

CrossIdeas will slot into IBM’s Identity and Access Management portfolio. The technology is capable of being deployed in customers' premises as well as in the cloud.

IBM has been busily developing security technology in house as well as making a dozen acquisitions in information security over the past decade. Key acquisitions include the purchase of security dashboard firm Q1 Labs in October 2011, whose tech served as the foundation for QRadar, as well as the earlier acquisition of Internet Security Systems back in 2006.

These various investments and research efforts are making headway in the infosec market, according to Big blue. IBM said that its security business has experienced growth of 20 per cent over the first half of 2014.

“The addition of CrossIdeas extends IBM’s market share leading portfolio of identity and access management capabilities,” said Brendan Hannigan, general manager, IBM Security Systems. “IBM can now provide enterprises with enhanced governance capabilities and transparency into risk from the factory floor to the board room, giving leaders the insight they need to protect their brand and customers.” ®

Beginner's guide to SSL certificates

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
EU to accuse Ireland of giving Apple an overly peachy tax deal – report
Probe expected to say single-digit rate was unlawful
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.