Preventing security risks in real time

As the world becomes more digitized and interconnected, the
door to emerging security leaks has opened wider. Today, there
are billions of RFID tags for items including products, passports,
buildings and animals. With more than two billion Internet
users and cellular phone subscriptions now exceeding five billion,
nearly one in three people worldwide surfs the Internet.1
The amount of information created and replicated—the digital
universe—is more than doubling every two years.2
Not only has the amount of data increased, but the dispersion
and corresponding value of digital assets has increased as well.
Sensitive customer information, intellectual property and even
the control systems of key machinery are increasingly found
in electronic formats. While information security continues
to evolve in sophistication, attacking networks and stealing
information has arguably become easier due to popular new
technologies that introduce loopholes in enterprise security.
Furthermore, damages can extend far beyond the targeted
victim, introducing cascading impacts to all those involved,
including customers, the specific industry and even world governments.
Take, for example, the December 2011 attack against
Stratfor Global Intelligence Service where the hacktivist organization
Anonymous stole credit card details, passwords and home
addresses of approximately 4,000 customers, many of whom
were major financial, military and humanitarian organizations.
While the circumstances were politically and socially motivated,
the attack introduced damages far beyond the single intended
With the emergence of cloud, mobility, social business, big data
and more, the boundaries of business continue to extend and
dissolve. As a result, risks posed to confidential or proprietary
information, business continuity, financial stability, brand reputation
and even governmental control are increasing steadily. This
new reality is forcing the evolution of organizations’ defenses to
become smarter and more intelligent—which in turn requires
IBM Global Technology Services 3
new infrastructures capable of using sophisticated analytics to
scale visibility across broad data sets, both diverse and complementary,
in real time.
As organizations face tighter requirements around privacy and
compliance, they also face a mounting challenge in countering
advanced threats. The accuracy of identifying threats becomes
essential as security teams migrate from legacy approaches to a
security intelligence model.
Developing security intelligence—the ability to predict, identify
and react to potential threats proactively—is a key priority in
this new digital age.