IBM Acquires CrossIdea for Better Security in Cloud Offerings

The CrossIdea security software will strengthen the security of the IBM cloud computing services including both applications and data. IBM disclosed the intent of the acquisition was inspired by pressure from their clients to assure the best security available is deployed to counter cyber security attacts against the IBM clould offering.

 

Many analysts believe enterprises view effective security is the only solution for better adoption of the cloud computing based services for the business community.

 

According to IBM, CrossIdea will help to manage the application and data access seamlessly with strong enforcement of identity management. This will bridge the gap between IT infrastructure, compliance,  and reduce the security risk factor for enterprise cloud customers operating in a global manner.

 

 

The General Manager of IBM Security Systems Division, Mr. Brendan Hannigan said, “The addition of CrossIdeas extends IBM’s market share leading portfolio of identity and access management capabilities. IBM can now provide enterprises with enhanced governance capabilities and transparency into risk from the factory floor to the board room, giving leaders the insight they need to protect their brand and customers.”


Accordng to Mr. Alberto Ocello, the CEO of CrossIdea, “CrossIdeas is very excited to become part of IBM through this acquisition. The innovative technology of CrossIdeas’ IDEAS solution strongly complements IBM’s Identity and Access Management portfolio and we are proud to contribute to IBM’s worldwide expansion in the IT security market.”

 

The security capabilities of CrossIdea software will be integrated within the 
IBM Security services known as IBM Security Identity Management (ISIM).

 

Now, IBM's  Identity management and the Application access components will be among the most secure of coud computing service offerings.

 

 

Enjoyed the article?

Sign-up for our free newsletter to kick off your day with the latest technology insights, or share the article with your friends and contacts on Facebook, Twitter or Google+ using the icons below.


E-mail address
Tagged in: CIO Cloud security

Comments