CINXE.COM

What is Social Engineering? | IBM

<!DOCTYPE HTML> <html lang="en"> <head> <meta charset="UTF-8"/> <meta name="languageCode" content="en"/> <meta name="countryCode" content="us"/> <meta name="searchTitle" content="What is Social Engineering?"/> <meta name="focusArea" content="Consulting - Cybersecurity"/> <title>What is Social Engineering? | IBM</title> <script defer="defer" type="text/javascript" src="https://rum.hlx.page/.rum/@adobe/helix-rum-js@%5E2/dist/rum-standalone.js" data-routing="program=131558,environment=1281329,tier=publish"></script> <link rel="icon" href="/content/dam/adobe-cms/default-images/favicon.svg"/> <meta name="keywords" content="Social engineering"/> <meta name="description" content="Social engineering attacks rely on human nature to manipulate people into compromising their personal security or the security of an enterprise network."/> <meta name="template" content="learn"/> <meta name="viewport" content="width=device-width, initial-scale=1"/> <meta name="robots" content="index, follow, max-image-preview:large"/> <meta name="ibm.com.search.appid" content="thinkhub"/> <meta name="ibm.com.search.scopes" content="thinkhub"/> <meta name="dcterms.date" content="2022-06-14T00:00:00.000"/> <meta name="ibm.search.facet.field_hierarchy_01" content="taxonomy : Topics / Cybersecurity / Offensive security / Social engineering"/> <meta name="ibm.search.facet.field_hierarchy_02"/> <meta name="ibm.search.facet.field_hierarchy_03" content="taxonomy : Content Format / Article"/> <meta name="ibm.search.facet.field_hierarchy_04" content="taxonomy : Content Type / Explainer"/> <meta name="ibm.search.facet.field_hierarchy_05"/> <meta name="ibm.search.facet.field_keyword_01" content="Social engineering"/> <meta name="ibm.search.facet.field_keyword_09" content="https://prod-cloud-publish.aem.ibm.net/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/98/4d/content-hub-security-and-identity-page-leadspace-short.component.crop-thumbnail-16-by-9-retina.ts=0.png/content/adobe-cms/us/en/topics/social-engineering/jcr:content/root/leadspace"/> <meta name="ibm.search.facet.field_keyword_14"/> <meta name="ibm.search.facet.field_text_01" content="14 June 2022"/> <meta name="ibm.search.facet.field_text_03" content="Explainer"/> <link rel="canonical" href="https://www.ibm.com/topics/social-engineering"/> <style id="anti-flicker-style"> :not(:defined) { visibility: hidden; } </style> <!-- <sly data-sly-test="false"> <link href="//1.www.s81c.com/common/v18/css/www.css" rel="preload" as="style"/> <link rel="stylesheet" href="//1.www.s81c.com/common/v18/css/www.css" media="all"/> <link href="//1.www.s81c.com/common/v18/css/grid-fluid.css" rel="preload" as="style"/> <link rel="stylesheet" href="//1.www.s81c.com/common/v18/css/grid-fluid.css" media="all"/> <link href="//1.www.s81c.com/common/v19a/css/www.css" rel="stylesheet"/> </sly>--> <script src="https://assets.adobedtm.com/0f2de1d5b89a/565c2aeb0d39/launch-560e54b3e83c.min.js" type="text/javascript" async="async"></script> <script type="text/javascript" async="async"> var adobeDataLayer = window.adobeDataLayer || []; </script> <script type="text/javascript"> window.searchKey = { templateName: 'learn', taxonomylist: 'taxonomy : Topics \/ Cybersecurity \/ Offensive security \/ Social engineering', L0Tag: 'Topics,Brands,Industries,Geography,Compliance Entities,Products,Events,Computer Languages,Content Format,Series,Content Type,CMaaS Focus Areas,brands,Deployment Types,Product Types,Search Index', } </script> <link rel="alternate" hreflang="it-it" href="https://www.ibm.com/it-it/topics/social-engineering"/> <link rel="alternate" hreflang="de-de" href="https://www.ibm.com/de-de/topics/social-engineering"/> <link rel="alternate" hreflang="en-us" href="https://www.ibm.com/topics/social-engineering"/> <link rel="alternate" hreflang="ko-kr" href="https://www.ibm.com/kr-ko/topics/social-engineering"/> <link rel="alternate" hreflang="pt-br" href="https://www.ibm.com/br-pt/topics/social-engineering"/> <link rel="alternate" hreflang="id-id" href="https://www.ibm.com/id-id/topics/social-engineering"/> <link rel="alternate" hreflang="es-es" href="https://www.ibm.com/es-es/topics/social-engineering"/> <link rel="alternate" hreflang="fr-fr" href="https://www.ibm.com/fr-fr/topics/social-engineering"/> <link rel="alternate" hreflang="zh-cn" href="https://www.ibm.com/cn-zh/topics/social-engineering"/> <link rel="alternate" hreflang="es-mx" href="https://www.ibm.com/mx-es/topics/social-engineering"/> <link rel="alternate" hreflang="ja-jp" href="https://www.ibm.com/jp-ja/topics/social-engineering"/> <script type="text/javascript"> window.antiFlicker = { active: true, timeout: 3000 } </script> <script type="text/javascript"> var languageCode = document.getElementsByName('languageCode')[0].content; var countryCode = document.getElementsByName('countryCode')[0].content; var focusArea = document.getElementsByName('focusArea')[0].content; /* Define digital data object based on _appInfo object */ window._ibmAnalytics = { settings: { name: "AEM Sites", tealiumProfileName: "aem-sites" }, }; window.digitalData = { page: { category: { primaryCategory: '', }, pageInfo: { language: languageCode + '-' + countryCode, ibm: { siteID: 'MarketingAEM', country: countryCode, messaging: { routing: { focusArea: focusArea, languageCode: languageCode, regionCode: countryCode }, translation: { languageCode: languageCode, regionCode: countryCode } }, sections: 0, patterns: 0, }, carbon: { '@carbon/web-components': 'v1.47.1', '@carbon/ibmdotcom-web-components': 'v1.51.1', 'carbon-for-aem': 'v0.19.0', }, }, }, }; </script> <script type="application/ld+json"> { "@context": "https://schema.org", "@type": "BlogPosting", "mainEntityOfPage": { "@type": "WebPage", "@id": "https://www.ibm.com/topics/social-engineering" }, "headline": "Social Engineering", "image": [ "https://www.ibm.com/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/98/4d/content-hub-security-and-identity-page-leadspace-short.png" ], "datePublished": "", "dateModified": "2024-10-01T13:14:31.286Z", "author": {"@type": "Organization","name": "IBM","url": "https://www.ibm.com"} } </script> <!-- Instana script specific to Dev environment start --> <!-- <script> (function(s,t,a,n){s[t]||(s[t]=a,n=s[a]=function(){n.q.push(arguments)}, n.q=[],n.v=2,n.l=1*new Date)})(window,"InstanaEumObject","ineum"); ineum('reportingUrl', 'https://eum-orange-saas.instana.io'); ineum('key', 'mFJnYtpBSiCKl9zenWHXtg'); ineum('trackSessions'); </script> <script defer crossorigin="anonymous" src=https://eum.instana.io/1.7.2/eum.min.js integrity="sha384-cgeSlevgebehPauohUhsnAeBrpjXzaj94mSv3L2EXjCQH0RRb9xSQ2ErGOWkthIJ"></script>--> <!-- Instana script specific to Dev environment end --> <meta property="og:url" content="https://www.ibm.com/topics/social-engineering"/> <meta property="og:type" content="website"/> <meta property="og:title" content="What is Social Engineering? | IBM"/> <meta property="og:description" content="Social engineering attacks rely on human nature to manipulate people into compromising their personal security or the security of an enterprise network."/> <meta property="og:image" content="https://assets.ibm.com/is/image/ibm/ibm-8bar-logo-2560x2560?$original$"/> <script src="https://1.www.s81c.com/common/stats/ibm-common.js" type="text/javascript" async="async"></script> <script src="https://hybrid-cloud-widgets-production.s3.us.cloud-object-storage.appdomain.cloud/loader.js" type="application/javascript"></script> <link rel="stylesheet" href="/etc.clientlibs/adobe-cms/clientlibs/clientlib-idlStylesCarbon.lc-92a431776e26f162dd2424f414af0c9a-lc.min.css" type="text/css"> <link rel="stylesheet" href="/etc.clientlibs/adobe-cms/clientlibs/clientlib-idlStyles.lc-781111ab1b5d0bf5e1a3598eac05aba5-lc.min.css" type="text/css"> <link rel="stylesheet" href="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/tag/v1/latest/plex.css"/> <link rel="stylesheet" href="https://1.www.s81c.com/common/carbon/plex/sans.css"/> <link rel="stylesheet" href="/etc.clientlibs/adobe-cms/clientlibs/clientlib-pdfviewer.lc-c79c6cf22a5b660f493131a4be3ded5f-lc.min.css" type="text/css"> </head> <body class="learn-page content-page page basicpage publish" id="learn-page-7bcf7f9d4d" data-fullwidthtemplate="false"> <dds-video-cta-container> <div class="root container responsivegrid"> <div id="container-e9b80bd4f1" class="cmp-container"> <div class="masthead"> <c4d-masthead-container data-endpoint="#" auth-method="profile-api" has-contact="true" has-profile has-search has-cart></c4d-masthead-container> <script src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v2.15.0/masthead.min.js" type="module"></script> <script> let l0Json = "{\x22profileMenu\x22:{\x22signedout\x22:[{\x22title\x22:\x22My IBM\x22,\x22url\x22:\x22https:\/\/myibm.ibm.com\/?lnk=mmi\x22},{\x22title\x22:\x22Log in\x22,\x22url\x22:\x22https:\/\/login.ibm.com\/oidc\/endpoint\/default\/authorize?redirect_uri=https%3A%2F%2Fmyibm.ibm.com%2FOIDCHandler.html\x26response_type=token\x26client_id=v18LoginProdCI\x26scope=openid\x26state=https%3A%2F%2Fwww.ibm.com\x26nonce=8675309\x22}],\x22signedin\x22:[{\x22title\x22:\x22My IBM\x22,\x22url\x22:\x22https:\/\/myibm.ibm.com\/?lnk=mmi\x22},{\x22title\x22:\x22Log in\x22,\x22url\x22:\x22https:\/\/login.ibm.com\/oidc\/endpoint\/default\/authorize?redirect_uri=https%3A%2F%2Fmyibm.ibm.com%2FOIDCHandler.html\x26response_type=token\x26client_id=v18LoginProdCI\x26scope=openid\x26state=https%3A%2F%2Fwww.ibm.com\x26nonce=8675309\x22}]},\x22mastheadNav\x22:{\x22links\x22:[{\x22title\x22:\x22Products\x22,\x22url\x22:\x22\x22,\x22submenu\x22:{\x22sections\x22:[{\x22heading\x22:{\x22title\x22:\x22Featured\x22,\x22description\x22:\x22\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22API Connect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/api\u002Dconnect?lnk=flatitem\x22,\x22description\x22:\x22Software to rapidly create, protect, socialize and manage APIs\x22},{\x22title\x22:\x22Concert\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/concert?lnk=flatitem\x22,\x22description\x22:\x22AI to analyze and manage IT infrastructure using natural language\x22},{\x22title\x22:\x22Environmental Intelligence\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/environmental\u002Dintelligence?lnk=flatitem\x22,\x22description\x22:\x22SaaS for predicting and responding to weather and climate events\x22},{\x22title\x22:\x22Envizi\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/envizi?lnk=flatitem\x22,\x22description\x22:\x22ESG data management, reporting and analysis SaaS\x22},{\x22title\x22:\x22FlashSystem\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/flashsystem?lnk=flatitem\x22,\x22description\x22:\x22Primary storage for performance and latency sensitive workloads\x22},{\x22title\x22:\x22Hybrid Cloud Mesh\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/hybrid\u002Dcloud\u002Dmesh?lnk=flatitem\x22,\x22description\x22:\x22SaaS for deploying and managing hybrid and multicloud networks\x22},{\x22title\x22:\x22IBM Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/cloud?lnk=flatitem\x22,\x22description\x22:\x22On\u002Ddemand cloud computing platform and APIs\x22},{\x22title\x22:\x22IBM Z\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/z?lnk=flatitem\x22,\x22description\x22:\x22Flagship mainframe with on\u002Dchip AI and quantum\u002Dsafe cryptography\x22},{\x22title\x22:\x22Instana\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/instana?lnk=flatitem\x22,\x22description\x22:\x22Software for application performance monitoring and automation\x22},{\x22title\x22:\x22MaaS360\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/maas360?lnk=flatitem\x22,\x22description\x22:\x22Unified endpoint management software for many device types\x22},{\x22title\x22:\x22Maximo\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/maximo?lnk=flatitem\x22,\x22description\x22:\x22Software for asset management and related workflows\x22},{\x22title\x22:\x22Planning Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/planning\u002Danalytics?lnk=flatitem\x22,\x22description\x22:\x22Software to automate financial and operational planning\x22},{\x22title\x22:\x22Robotic Process Automation (RPA)\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/robotic\u002Dprocess\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22Software to automate workflows and business processes\x22},{\x22title\x22:\x22Storage Defender\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Ddefender?lnk=flatitem\x22,\x22description\x22:\x22Data resiliency software for threat detection and data recovery\x22},{\x22title\x22:\x22Turbonomic\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/turbonomic?lnk=flatitem\x22,\x22description\x22:\x22Software to manage and optimize IT resource usage\x22},{\x22title\x22:\x22watsonx\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/watsonx?lnk=flatitem\x22,\x22description\x22:\x22AI and data platform\x22},{\x22title\x22:\x22watsonx Assistant\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dassistant?lnk=flatitem\x22,\x22description\x22:\x22Virtual agents customizable to any domain\x22},{\x22title\x22:\x22watsonx Orchestrate\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dorchestrate?lnk=flatitem\x22,\x22description\x22:\x22Personal\u002Dassistant software that automates repetitive tasks\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22AI \x26 machine learning\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/artificial\u002Dintelligence?lnk=flathl\x22,\x22description\x22:\x22Use IBM Watson’s AI or build your own machine learning models\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloud Pak for AIOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Daiops?lnk=flatitem\x22,\x22description\x22:\x22DevOps management tool with AI analysis and recommendations\x22},{\x22title\x22:\x22Cloud Pak for Data\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Ddata?lnk=flatitem\x22,\x22description\x22:\x22Tools for data analysis, organization and management\x22},{\x22title\x22:\x22Knowledge Catalog\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/knowledge\u002Dcatalog?lnk=flatitem\x22,\x22description\x22:\x22SaaS to catalog data, AI models, metadata, policies and more\x22},{\x22title\x22:\x22Watson Discovery\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watson\u002Ddiscovery?lnk=flatitem\x22,\x22description\x22:\x22AI to search in and answer questions about business documents\x22},{\x22title\x22:\x22Watson Natural Language Understanding\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/natural\u002Dlanguage\u002Dunderstanding?lnk=flatitem\x22,\x22description\x22:\x22API for text analysis and metadata extraction\x22},{\x22title\x22:\x22Watson Speech to Text\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/speech\u002Dto\u002Dtext?lnk=flatitem\x22,\x22description\x22:\x22API for real\u002Dtime speech recognition and transcription\x22},{\x22title\x22:\x22Watson Studio\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watson\u002Dstudio?lnk=flatitem\x22,\x22description\x22:\x22IDE to build, run and manage AI models\x22},{\x22title\x22:\x22Watson Text to Speech\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/text\u002Dto\u002Dspeech?lnk=flatitem\x22,\x22description\x22:\x22API for real\u002Dtime text to speech conversion\x22},{\x22title\x22:\x22Z Anomaly Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/z\u002Danomaly\u002Danalytics?lnk=flatitem\x22,\x22description\x22:\x22Operational anomaly detection software for mainframes\x22},{\x22title\x22:\x22watsonx\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/watsonx?lnk=flatitem\x22,\x22description\x22:\x22AI and data platform\x22},{\x22title\x22:\x22watsonx Assistant\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dassistant?lnk=flatitem\x22,\x22description\x22:\x22Virtual agents customizable to any domain\x22},{\x22title\x22:\x22watsonx Code Assistant\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dcode\u002Dassistant?lnk=flatitem\x22,\x22description\x22:\x22AI tool to generate code\x22},{\x22title\x22:\x22watsonx Orders\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dorders?lnk=flatitem\x22,\x22description\x22:\x22AI voice agent for taking restaurant orders\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/analytics?lnk=flathl\x22,\x22description\x22:\x22Aggregate and analyze large datasets\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Business Analytics Enterprise\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/business\u002Danalytics\u002Denterprise?lnk=flatitem\x22,\x22description\x22:\x22Software for business planning and analysis\x22},{\x22title\x22:\x22CPLEX\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ilog\u002Dcplex\u002Doptimization\u002Dstudio?lnk=flatitem\x22,\x22description\x22:\x22Software to build and solve complex optimization models\x22},{\x22title\x22:\x22Cloud Pak for Data\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Ddata?lnk=flatitem\x22,\x22description\x22:\x22Tools for data analysis, organization and management\x22},{\x22title\x22:\x22Cognos Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cognos\u002Danalytics?lnk=flatitem\x22,\x22description\x22:\x22Software for business intelligence and performance management\x22},{\x22title\x22:\x22Databand\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databand?lnk=flatitem\x22,\x22description\x22:\x22Data observability software for data engineers and DataOps teams\x22},{\x22title\x22:\x22InfoSphere Information Server\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/information\u002Dserver?lnk=flatitem\x22,\x22description\x22:\x22Data integration suite for ETL, governance and analysis\x22},{\x22title\x22:\x22Manta Data Lineage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/manta\u002Ddata\u002Dlineage?lnk=flatitem\x22,\x22description\x22:\x22Software to visualize the flow of data from origin to consumption\x22},{\x22title\x22:\x22Netezza\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/netezza?lnk=flatitem\x22,\x22description\x22:\x22Data warehousing and analytics system on custom hardware\x22},{\x22title\x22:\x22Optim\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/infosphere\u002Doptim?lnk=flatitem\x22,\x22description\x22:\x22Software to manage test, production, and archived data\x22},{\x22title\x22:\x22Planning Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/planning\u002Danalytics?lnk=flatitem\x22,\x22description\x22:\x22Software to automate financial and operational planning\x22},{\x22title\x22:\x22SPSS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/spss?lnk=flatitem\x22,\x22description\x22:\x22Software for statistical analysis and business intelligence\x22},{\x22title\x22:\x22Spectrum Computing\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/high\u002Dperformance\u002Dcomputing?lnk=flatitem\x22,\x22description\x22:\x22Software to optimize resources in complex computing clusters\x22},{\x22title\x22:\x22StreamSets\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/streamsets?lnk=flatitem\x22,\x22description\x22:\x22Graphical interface to build and manage streaming data pipelines\x22},{\x22title\x22:\x22Watson Discovery\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watson\u002Ddiscovery?lnk=flatitem\x22,\x22description\x22:\x22AI to search in and answer questions about business documents\x22},{\x22title\x22:\x22Watson Studio\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watson\u002Dstudio?lnk=flatitem\x22,\x22description\x22:\x22IDE to build, run and manage AI models\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Asset lifecycle management\x22,\x22description\x22:\x22Manage and maintain physical assets\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Environmental Intelligence\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/environmental\u002Dintelligence?lnk=flatitem\x22,\x22description\x22:\x22SaaS for predicting and responding to weather and climate events\x22},{\x22title\x22:\x22Envizi\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/envizi?lnk=flatitem\x22,\x22description\x22:\x22ESG data management, reporting and analysis SaaS\x22},{\x22title\x22:\x22Maximo\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/maximo?lnk=flatitem\x22,\x22description\x22:\x22Software for asset management and related workflows\x22},{\x22title\x22:\x22TRIRIGA\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/tririga?lnk=flatitem\x22,\x22description\x22:\x22Software for real estate and workplace management\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Business automation\x22,\x22description\x22:\x22Automate workflows and business processes\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Blueworks Live\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/blueworkslive?lnk=flatitem\x22,\x22description\x22:\x22SaaS for collaboratively modeling business processes\x22},{\x22title\x22:\x22Business Automation Manager Open Editions\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/business\u002Dautomation\u002Dmanager\u002Dopen\u002Deditions?lnk=flatitem\x22,\x22description\x22:\x22Workflow automation and decision management software\x22},{\x22title\x22:\x22Business Automation Workflow\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/business\u002Dautomation\u002Dworkflow?lnk=flatitem\x22,\x22description\x22:\x22Cloud Pak for Business Automation add\u002Don to automate workflows\x22},{\x22title\x22:\x22Cloud Pak for Business Automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Dbusiness\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22Operations management software with AI insights\x22},{\x22title\x22:\x22Datacap\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/data\u002Dcapture\u002Dand\u002Dimaging?lnk=flatitem\x22,\x22description\x22:\x22Document management for IBM Cloud Pak for Business Automation\x22},{\x22title\x22:\x22Event Automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/event\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22No\u002Dcode tool for building automated event driven workflows\x22},{\x22title\x22:\x22FileNet Content Manager\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/filenet\u002Dcontent\u002Dmanager?lnk=flatitem\x22,\x22description\x22:\x22Content management solution for Cloud Pak for Business Automation\x22},{\x22title\x22:\x22Operational Decision Manager\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/operational\u002Ddecision\u002Dmanager?lnk=flatitem\x22,\x22description\x22:\x22Cloud Pak for Business Automation addon for rule\u002Dbased decisions\x22},{\x22title\x22:\x22Process Mining\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/process\u002Dmining?lnk=flatitem\x22,\x22description\x22:\x22Software to extract process data from business applications\x22},{\x22title\x22:\x22Robotic Process Automation (RPA)\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/robotic\u002Dprocess\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22Software to automate workflows and business processes\x22},{\x22title\x22:\x22watsonx Orchestrate\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dorchestrate?lnk=flatitem\x22,\x22description\x22:\x22Personal\u002Dassistant software that automates repetitive tasks\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Containers\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/containers?lnk=flathl\x22,\x22description\x22:\x22Allocate compute infrastructure on demand\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloud Satellite\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/satellite?lnk=flatitem\x22,\x22description\x22:\x22Platform for running managed cloud services on any infrastructure\x22},{\x22title\x22:\x22Code Engine\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/code\u002Dengine?lnk=flatitem\x22,\x22description\x22:\x22Managed serverless runtime for containers, batch jobs, or code\x22},{\x22title\x22:\x22Container Registry\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/container\u002Dregistry?lnk=flatitem\x22,\x22description\x22:\x22Private SaaS registry for container storage and management\x22},{\x22title\x22:\x22Kubernetes Service\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/kubernetes\u002Dservice?lnk=flatitem\x22,\x22description\x22:\x22Managed Kubernetes for high availability container deployments\x22},{\x22title\x22:\x22Red Hat OpenShift on IBM Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/openshift?lnk=flatitem\x22,\x22description\x22:\x22Managed service with tools for security, management and monitoring\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Databases\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/database?lnk=flathl\x22,\x22description\x22:\x22Store, query and analyze structured data\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloudant\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloudant?lnk=flatitem\x22,\x22description\x22:\x22Managed PCI\u002Dcompliant JSON document store on Apache CouchDB\x22},{\x22title\x22:\x22Db2\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/db2\u002Ddatabase?lnk=flatitem\x22,\x22description\x22:\x22Data management software including IBM Db2 Database\x22},{\x22title\x22:\x22Db2 for z\/OS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/db2\u002Dfor\u002Dzos?lnk=flatitem\x22,\x22description\x22:\x22IBM Db2 Database for IBM Z mainframes\x22},{\x22title\x22:\x22IBM Cloud Databases for Elastic Search\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Delasticsearch?lnk=flatitem\x22,\x22description\x22:\x22JSON document store for full\u002Dtext search\x22},{\x22title\x22:\x22IBM Cloud Databases for EnterpriseDB\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Denterprisedb?lnk=flatitem\x22,\x22description\x22:\x22PostgreSQL with added performance, security and management features\x22},{\x22title\x22:\x22IBM Cloud Databases for MongoDB\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Dmongodb?lnk=flatitem\x22,\x22description\x22:\x22Managed NoSQL JSON document store\x22},{\x22title\x22:\x22IBM Cloud Databases for MySQL\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Dmysql?lnk=flatitem\x22,\x22description\x22:\x22Managed SQL database\x22},{\x22title\x22:\x22IBM Cloud Databases for PostgreSQL\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Dpostgresql?lnk=flatitem\x22,\x22description\x22:\x22Managed SQL database with advanced features\x22},{\x22title\x22:\x22IBM Cloud Databases for etcd\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Detcd?lnk=flatitem\x22,\x22description\x22:\x22Distributed key\u002Dvalue store\x22},{\x22title\x22:\x22Information Management System (IMS)\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ims?lnk=flatitem\x22,\x22description\x22:\x22Database and management system for high\u002Dvolume transactions\x22},{\x22title\x22:\x22Informix\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/informix?lnk=flatitem\x22,\x22description\x22:\x22Embeddable database for SQL, NoSQL, time\u002Dseries and spatial data\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22DevOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/devops?lnk=flathl\x22,\x22description\x22:\x22Manage infrastructure, environments and deployments\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Application Delivery Foundation for z\/OS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Ddelivery\u002Dfoundation\u002Dfor\u002Dzos?lnk=flatitem\x22,\x22description\x22:\x22Application development and DevOps tools for z\/OS\x22},{\x22title\x22:\x22Application Discovery and Delivery Intelligence\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Ddiscovery\u002Dand\u002Ddelivery\u002Dintelligence?lnk=flatitem\x22,\x22description\x22:\x22Analysis tool for visualizing applications, data and jobs on z\/OS\x22},{\x22title\x22:\x22Cloud Continuous Delivery\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/continuous\u002Ddelivery?lnk=flatitem\x22,\x22description\x22:\x22Toolchains to automate building and deploying applications\x22},{\x22title\x22:\x22Cloud Pak for AIOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Daiops?lnk=flatitem\x22,\x22description\x22:\x22DevOps management tool with AI analysis and recommendations\x22},{\x22title\x22:\x22DevOps Build\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/devops\u002Dbuild?lnk=flatitem\x22,\x22description\x22:\x22Management tool for configuring and running software builds\x22},{\x22title\x22:\x22DevOps Code ClearCase\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/devops\u002Dcode\u002Dclearcase?lnk=flatitem\x22,\x22description\x22:\x22Configuration management system for software asset access control\x22},{\x22title\x22:\x22DevOps Deploy\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/devops\u002Ddeploy?lnk=flatitem\x22,\x22description\x22:\x22Automation software for continuous delivery and deployment\x22},{\x22title\x22:\x22DevOps Test\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/devops\u002Dtest?lnk=flatitem\x22,\x22description\x22:\x22Continuous testing and virtualization platform\x22},{\x22title\x22:\x22DevOps Velocity\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/devops\u002Dvelocity?lnk=flatitem\x22,\x22description\x22:\x22Release management software for pipeline orchestration and analytics\x22},{\x22title\x22:\x22Engineering Lifecycle Management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/engineering\u002Dlifecycle\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22Software for product and application lifecycle management\x22},{\x22title\x22:\x22IBM i Modernization Engine\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ibm\u002Di\u002Dmerlin?lnk=flatitem\x22,\x22description\x22:\x22Development and modernization tools for IBM i applications\x22},{\x22title\x22:\x22Rational ClearQuest\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/rational\u002Dclearquest?lnk=flatitem\x22,\x22description\x22:\x22Change management software\x22},{\x22title\x22:\x22Rational Software Architect Designer\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/rational\u002Dsoftware\u002Darchitect\u002Ddesigner?lnk=flatitem\x22,\x22description\x22:\x22Tools to create, evaluate, and communicate software architecture\x22},{\x22title\x22:\x22Test Accelerator for Z\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/test\u002Daccelerator\u002Dz?lnk=flatitem\x22,\x22description\x22:\x22Test automation and test generation framework for z\/OS\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22IT automation\x22,\x22description\x22:\x22Automate IT infrastructure management\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Apptio\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/apptio?lnk=flatitem\x22,\x22description\x22:\x22Hybrid cloud financial management and planning software\x22},{\x22title\x22:\x22Cloud App Configuration\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Dconfiguration?lnk=flatitem\x22,\x22description\x22:\x22Feature management and configuration service for web and mobile apps\x22},{\x22title\x22:\x22Cloud App ID\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Did?lnk=flatitem\x22,\x22description\x22:\x22Authentication and user management service for web and mobile apps\x22},{\x22title\x22:\x22Cloud Monitoring\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dmonitoring?lnk=flatitem\x22,\x22description\x22:\x22Hosted monitoring tool for organization\u002Dwide system performance\x22},{\x22title\x22:\x22Cloud Pak for AIOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Daiops?lnk=flatitem\x22,\x22description\x22:\x22DevOps management tool with AI analysis and recommendations\x22},{\x22title\x22:\x22Cloud Schematics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/schematics?lnk=flatitem\x22,\x22description\x22:\x22Management and provisionining of cloud infrastructure with code\x22},{\x22title\x22:\x22Concert\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/concert?lnk=flatitem\x22,\x22description\x22:\x22AI to analyze and manage IT infrastructure using natural language\x22},{\x22title\x22:\x22Event Notifications\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/event\u002Dnotifications?lnk=flatitem\x22,\x22description\x22:\x22Notification and workflow automation service for IBM Cloud events\x22},{\x22title\x22:\x22Flexera One\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/flexera\u002Done?lnk=flatitem\x22,\x22description\x22:\x22IT asset management software\x22},{\x22title\x22:\x22IBM Cloud Logs\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dlogs?lnk=flatitem\x22,\x22description\x22:\x22Logging and observability service for applications and infrastructure\x22},{\x22title\x22:\x22Instana\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/instana?lnk=flatitem\x22,\x22description\x22:\x22Software for application performance monitoring and automation\x22},{\x22title\x22:\x22Turbonomic\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/turbonomic?lnk=flatitem\x22,\x22description\x22:\x22Software to manage and optimize IT resource usage\x22},{\x22title\x22:\x22Z IntelliMagic Vision for z\/OS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/z\u002Dintellimagic\u002Dvision\u002Dfor\u002Dzos?lnk=flatitem\x22,\x22description\x22:\x22Infrastructure performance management and monitoring software\x22},{\x22title\x22:\x22Z Service Management Suite\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/z\u002Dservice\u002Dmanagement\u002Dsuite?lnk=flatitem\x22,\x22description\x22:\x22Monitoring, control, and automation suite for Z\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Middleware\x22,\x22description\x22:\x22Connect your applications, data and events\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22API Connect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/api\u002Dconnect?lnk=flatitem\x22,\x22description\x22:\x22Software to rapidly create, protect, socialize and manage APIs\x22},{\x22title\x22:\x22App Connect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Dconnect?lnk=flatitem\x22,\x22description\x22:\x22Codeless connectors for your data, apps and APIs\x22},{\x22title\x22:\x22Aspera\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/aspera?lnk=flatitem\x22,\x22description\x22:\x22System to transfer, sync or stream huge data globally\x22},{\x22title\x22:\x22CICS Transaction Server for z\/OS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cics\u002Dtransaction\u002Dserver?lnk=flatitem\x22,\x22description\x22:\x22Application server for online transaction processing\x22},{\x22title\x22:\x22Cloud Pak for Applications\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Dapplications?lnk=flatitem\x22,\x22description\x22:\x22Kubernetes\u002Dbased platform for hybrid cloud applications\x22},{\x22title\x22:\x22Cloud Pak for Integration\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Dintegration?lnk=flatitem\x22,\x22description\x22:\x22Tools to connect all of your apps, data and events\x22},{\x22title\x22:\x22DataPower\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/datapower\u002Dgateway?lnk=flatitem\x22,\x22description\x22:\x22Physical or virtual multi\u002Dprotocol network gateway\x22},{\x22title\x22:\x22Event Streams\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/event\u002Dstreams?lnk=flatitem\x22,\x22description\x22:\x22PaaS stream processing based on Apache Kafka\x22},{\x22title\x22:\x22IBM Cloud Messages for RabbitMQ\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/messages\u002Dfor\u002Drabbitmq?lnk=flatitem\x22,\x22description\x22:\x22Managed open\u002Dsource message broker\x22},{\x22title\x22:\x22IBM webMethods\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/webmethods?lnk=flatitem\x22,\x22description\x22:\x22iPaaS capabilities including app integration, API management, B2B integration and managed file transfer\x22},{\x22title\x22:\x22Information Management System\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ims?lnk=flatitem\x22,\x22description\x22:\x22Hierarchical database and transaction processor for Z\x22},{\x22title\x22:\x22MQ\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/mq?lnk=flatitem\x22,\x22description\x22:\x22Software and hardware for messaging between distributed systems\x22},{\x22title\x22:\x22z\/OS Connect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/zos\u002Dconnect?lnk=flatitem\x22,\x22description\x22:\x22Software to build and serve RESTful APIs to z\/OS applications\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Network\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/networking?lnk=flathl\x22,\x22description\x22:\x22Run and manage public, private and virtual networks\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloud Pak for Network Automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Dnetwork\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22Management software for telco network operations\x22},{\x22title\x22:\x22Hybrid Cloud Mesh\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/hybrid\u002Dcloud\u002Dmesh?lnk=flatitem\x22,\x22description\x22:\x22SaaS for deploying and managing hybrid and multicloud networks\x22},{\x22title\x22:\x22NS1 Connect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ns1\u002Dconnect?lnk=flatitem\x22,\x22description\x22:\x22Authoritative DNS and traffic steering as a service\x22},{\x22title\x22:\x22Rapid Network Automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/rapid\u002Dnetwork\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22No\u002Dcode tool to build automation workflows across apps and APIs\x22},{\x22title\x22:\x22SevOne Network Performance Management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/sevone\u002Dnetwork\u002Dperformance\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22Software to collect and analyze network performance data\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Operating systems\x22,\x22description\x22:\x22Run critical workloads on specialized operating systems\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22AIX\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/aix?lnk=flatitem\x22,\x22description\x22:\x22UNIX operating system for Power servers\x22},{\x22title\x22:\x22IBM i\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ibm\u002Di?lnk=flatitem\x22,\x22description\x22:\x22Integrated operating system for Power servers\x22},{\x22title\x22:\x22Linux\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/linux?lnk=flatitem\x22,\x22description\x22:\x22Run Linux workloads on IBM servers\x22},{\x22title\x22:\x22z\/OS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/zos?lnk=flatitem\x22,\x22description\x22:\x22Flagship OS for continuous, high\u002Dvolume mainframe operation\x22},{\x22title\x22:\x22z\/TPF\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/z\u002Dtransaction\u002Dprocessing\u002Dfacility?lnk=flatitem\x22,\x22description\x22:\x22Real\u002Dtime operating system for mainframes\x22},{\x22title\x22:\x22z\/VM\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/zvm?lnk=flatitem\x22,\x22description\x22:\x22Hypervisor and virtualization software for IBM Z and LinuxONE\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Quantum\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/quantum?lnk=flathl\x22,\x22description\x22:\x22Run code on real quantum systems using a full\u002Dstack SDK\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Qiskit Runtime\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/quantum\/qiskit?lnk=flatitem\x22,\x22description\x22:\x22Cloud service for executing quantum workloads at scale\x22},{\x22title\x22:\x22Quantum Safe\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/quantum\/quantum\u002Dsafe?lnk=flatitem\x22,\x22description\x22:\x22Technology and consulting services for quantum\u002Dsafe cryptography\x22},{\x22title\x22:\x22Quantum Systems\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/quantum\/technology?lnk=flatitem\x22,\x22description\x22:\x22Quantum computing systems accessible on the cloud\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Security \x26 identity\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/security?lnk=flathl\x22,\x22description\x22:\x22Cloud\u002Dnative software to secure resources and simplify compliance\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloud AppID\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Did?lnk=flatitem\x22,\x22description\x22:\x22Authentication and user profiles as a service for mobile and web apps\x22},{\x22title\x22:\x22Cloud Security and Compliance Center\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/security\u002Dand\u002Dcompliance\u002Dcenter?lnk=flatitem\x22,\x22description\x22:\x22SaaS to define and audit the compliance posture of your cloud\x22},{\x22title\x22:\x22Data Security Broker\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/data\u002Dsecurity\u002Dbroker?lnk=flatitem\x22,\x22description\x22:\x22Administrative console to enable data encryption in the cloud\x22},{\x22title\x22:\x22Guardium\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/guardium?lnk=flatitem\x22,\x22description\x22:\x22Suite for data encryption, management and simplified compliance\x22},{\x22title\x22:\x22Key Protect for IBM Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/key\u002Dprotect?lnk=flatitem\x22,\x22description\x22:\x22Tool to provision and store keys for apps across IBM Cloud services\x22},{\x22title\x22:\x22MaaS360\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/maas360?lnk=flatitem\x22,\x22description\x22:\x22Unified endpoint management for mobile workforces\x22},{\x22title\x22:\x22QRadar EDR\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/qradar\u002Dedr?lnk=flatitem\x22,\x22description\x22:\x22Advanced AI threat detection and response for endpoints\x22},{\x22title\x22:\x22QRadar SIEM\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/qradar\u002Dsiem?lnk=flatitem\x22,\x22description\x22:\x22Threat detection and prioritization for real\u002Dtime visibility\x22},{\x22title\x22:\x22QRadar SOAR\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/qradar\u002Dsoar?lnk=flatitem\x22,\x22description\x22:\x22Automation and workflow management for security operations\x22},{\x22title\x22:\x22Trusteer\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/trusteer?lnk=flatitem\x22,\x22description\x22:\x22Software to authenticate customers, detect fraud and assess risk\x22},{\x22title\x22:\x22Verify\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/verify?lnk=flatitem\x22,\x22description\x22:\x22Identity, authentication, and access control software\x22},{\x22title\x22:\x22zSecure\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/zsecure?lnk=flatitem\x22,\x22description\x22:\x22Security, risk management and compliance tools for Z hardware\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Servers\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/servers?lnk=flathl\x22,\x22description\x22:\x22Run workloads on hybrid cloud infrastructure\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22IBM Cloud Bare Metal Servers\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/bare\u002Dmetal\u002Dservers?lnk=flatitem\x22,\x22description\x22:\x22Dedicated hardware for maximum performance\x22},{\x22title\x22:\x22IBM Cloud Virtual Servers for VPC\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/virtual\u002Dservers?lnk=flatitem\x22,\x22description\x22:\x22Virtual servers with Intel Xeon or IBM Z CPUs\x22},{\x22title\x22:\x22LinuxONE 4\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/linuxone\u002D4?lnk=flatitem\x22,\x22description\x22:\x22Physical and virtual servers for running Linux\x22},{\x22title\x22:\x22Power\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/power?lnk=flatitem\x22,\x22description\x22:\x22Physical and virtual servers with IBM Power CPUs\x22},{\x22title\x22:\x22z16\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/z16?lnk=flatitem\x22,\x22description\x22:\x22Flagship mainframe with on\u002Dchip AI and quantum\u002Dsafe cryptography\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/storage?lnk=flathl\x22,\x22description\x22:\x22Software, hardware and services for critical and operational workloads and data\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Ceph\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dceph?lnk=flatitem\x22,\x22description\x22:\x22Multi\u002Dprotocol software\u002Ddefined enterprise storage platform\x22},{\x22title\x22:\x22Cloud Block Storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/block\u002Dstorage?lnk=flatitem\x22,\x22description\x22:\x22Managed service optimized for low latency and high transfer rates\x22},{\x22title\x22:\x22Cloud File Storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/file\u002Dstorage?lnk=flatitem\x22,\x22description\x22:\x22Managed service for flash\u002Dbacked, durable, NFS\u002Dbased file storage\x22},{\x22title\x22:\x22Cloud Object Storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dobject\u002Dstorage?lnk=flatitem\x22,\x22description\x22:\x22Unstructured data storage accessible via cloud APIs\x22},{\x22title\x22:\x22DS8000\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ds8000?lnk=flatitem\x22,\x22description\x22:\x22High\u002Dcapacity, high\u002Davailability mainframe storage system\x22},{\x22title\x22:\x22Defender\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Ddefender?lnk=flatitem\x22,\x22description\x22:\x22Data resiliency software for threat detection and data recovery\x22},{\x22title\x22:\x22FlashSystem\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/flashsystem?lnk=flatitem\x22,\x22description\x22:\x22All\u002Dflash array with performance and capacity for any workload\x22},{\x22title\x22:\x22Fusion\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dfusion?lnk=flatitem\x22,\x22description\x22:\x22Container\u002Dnative storage and data orchestration for OpenShift\x22},{\x22title\x22:\x22Insights\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dinsights?lnk=flatitem\x22,\x22description\x22:\x22Storage AIOps for metrics\u002Dpowered analysis and decisions\x22},{\x22title\x22:\x22Protect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dprotect?lnk=flatitem\x22,\x22description\x22:\x22Data resiliency, backup and recovery delivered via SaaS\x22},{\x22title\x22:\x22Protect for Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dprotect\u002Dfor\u002Dcloud?lnk=flatitem\x22,\x22description\x22:\x22Backup and recovery SaaS for data in public cloud services\x22},{\x22title\x22:\x22SAN Switches\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/storage\u002Darea\u002Dnetwork?lnk=flatitem\x22,\x22description\x22:\x22Scalable and highly available storage area network solutions\x22},{\x22title\x22:\x22Scale\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dscale?lnk=flatitem\x22,\x22description\x22:\x22Software defined storage for AI and high performance workloads\x22},{\x22title\x22:\x22Scale System\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dscale\u002Dsystem?lnk=flatitem\x22,\x22description\x22:\x22All\u002Dflash or hybrid performant storage for cloud scale use\u002Dcases\x22},{\x22title\x22:\x22Tape Systems\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/tape\u002Dstorage?lnk=flatitem\x22,\x22description\x22:\x22Software and hardware for encrypted and air\u002Dgapped archives\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Supply chain\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/supply\u002Dchain?lnk=flathl\x22,\x22description\x22:\x22Manage the flow of goods and services\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Sterling Order and Fulfillment Suite\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/order\u002Dfulfillment\u002Dsuite?lnk=flatitem\x22,\x22description\x22:\x22Complete order management system with AI and machine learning\x22},{\x22title\x22:\x22Sterling Supply Chain Intelligence Suite\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/supply\u002Dchain\u002Dintelligence\u002Dsuite?lnk=flatitem\x22,\x22description\x22:\x22Software for supply chain optimization and automation\x22}]}]}],\x22viewAll\x22:{\x22title\x22:\x22View all products\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\x22}}},{\x22title\x22:\x22Solutions\x22,\x22url\x22:\x22\x22,\x22submenu\x22:{\x22sections\x22:[{\x22heading\x22:{\x22title\x22:\x22Automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/automation?lnk=flathl\x22,\x22description\x22:\x22Intelligent automation for business and IT operations\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22AIOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/aiops?lnk=flatitem\x22,\x22description\x22:\x22Enable proactive, continuous application performance management\x22},{\x22title\x22:\x22Application delivery\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/application\u002Ddelivery?lnk=flatitem\x22,\x22description\x22:\x22Modernize applications and deliver new cloud\u002Dnative applications\x22},{\x22title\x22:\x22Application performance management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/application\u002Dperformance\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22Bridge observability and automated resource management\x22},{\x22title\x22:\x22Business automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/business\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22Deliver intelligent automation solutions quickly with low\u002Dcode\x22},{\x22title\x22:\x22Cloud cost management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/cloud\u002Dcost\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22Optimize performance at the lowest cost and align business value\x22},{\x22title\x22:\x22Decision management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/decision\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22Model, manage and automate repeatable business processes\x22},{\x22title\x22:\x22DevOps automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/devops\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22Automate your software delivery process\x22},{\x22title\x22:\x22Enterprise content management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/enterprise\u002Dcontent\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22Accelerate information management and governance processes\x22},{\x22title\x22:\x22FinOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/finops?lnk=flatitem\x22,\x22description\x22:\x22Manage the variable economics of cloud infrastructure\x22},{\x22title\x22:\x22Integration\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/integration?lnk=flatitem\x22,\x22description\x22:\x22Connect applications and systems to unlock critical data\x22},{\x22title\x22:\x22License compliance\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/license\u002Dcompliance?lnk=flatitem\x22,\x22description\x22:\x22Reduce compliance risks with application resource management\x22},{\x22title\x22:\x22Networking\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/networking?lnk=flatitem\x22,\x22description\x22:\x22Automate network configuration, provisioning and troubleshooting\x22},{\x22title\x22:\x22Workflow\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/workflow?lnk=flatitem\x22,\x22description\x22:\x22Increase productivity by streamlining processes and tasks\x22},{\x22title\x22:\x22iPaaS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/ipaas?lnk=flatitem\x22,\x22description\x22:\x22Deliver connectivity across all your apps and data\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Data \x26 AI\x22,\x22description\x22:\x22Optimize your data strategy to support data\u002Ddriven decisions\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22AI\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/artificial\u002Dintelligence?lnk=flatitem\x22,\x22description\x22:\x22Artificial intelligence solutions built with industry expertise\x22},{\x22title\x22:\x22AI ethics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/impact\/ai\u002Dethics?lnk=flatitem\x22,\x22description\x22:\x22Trustworthy, transparent AI with a multidimensional approach\x22},{\x22title\x22:\x22Customer experience\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/ai\u002Dcustomer\u002Dservice?lnk=flatitem\x22,\x22description\x22:\x22Build a full\u002Dservice AI chatbot that integrates with your CRM\x22},{\x22title\x22:\x22Data fabric\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/data\u002Dfabric?lnk=flatitem\x22,\x22description\x22:\x22Automate data discovery, governance and consumption\x22},{\x22title\x22:\x22Data lake\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/data\u002Dlake?lnk=flatitem\x22,\x22description\x22:\x22Analyze structured, semi\u002Dstructured and unstructured data\x22},{\x22title\x22:\x22Data management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/data\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22Consistent data access and delivery across apps and domains\x22},{\x22title\x22:\x22Data quality\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/data\u002Dquality?lnk=flatitem\x22,\x22description\x22:\x22Robust tools help identify, understand and correct data flaws\x22},{\x22title\x22:\x22Data science\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/data\u002Dscience?lnk=flatitem\x22,\x22description\x22:\x22Operationalize data science models on any cloud\x22},{\x22title\x22:\x22Data warehouse\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/data\u002Dwarehouse?lnk=flatitem\x22,\x22description\x22:\x22A flexible foundation optimized for data from disparate sources\x22},{\x22title\x22:\x22DataOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/dataops?lnk=flatitem\x22,\x22description\x22:\x22Develop a coordinated overview of the data acquisition journey\x22},{\x22title\x22:\x22Master data management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/master\u002Ddata\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22A trusted, 360\u002Ddegree view of master data across the enterprise\x22},{\x22title\x22:\x22Prescriptive analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/prescriptive\u002Danalytics?lnk=flatitem\x22,\x22description\x22:\x22Use optimization technology to solve complex decisions\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Industry\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries?lnk=flathl\x22,\x22description\x22:\x22Customized, end\u002Dto\u002Dend, AI\u002Dpowered solutions for your industry\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Automotive\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/automotive?lnk=flatitem\x22,\x22description\x22:\x22Shift focus to connected vehicles and digital services\x22},{\x22title\x22:\x22Banking\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/banking\u002Dfinancial\u002Dmarkets?lnk=flatitem\x22,\x22description\x22:\x22Create compliant, customer\u002Dcentric banking experiences\x22},{\x22title\x22:\x22Consumer goods\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/consumer\u002Dgoods?lnk=flatitem\x22,\x22description\x22:\x22Infuse agility and automation into operations and supply chains\x22},{\x22title\x22:\x22Energy \x26 utilities\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/energy?lnk=flatitem\x22,\x22description\x22:\x22Get your utility ready for the new, sustainable energy ecosystem\x22},{\x22title\x22:\x22Government\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/government?lnk=flatitem\x22,\x22description\x22:\x22Support citizens with greater speed and confidence\x22},{\x22title\x22:\x22Healthcare\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/healthcare?lnk=flatitem\x22,\x22description\x22:\x22Navigate a more interconnected, data\u002Drich healthcare ecosystem\x22},{\x22title\x22:\x22Insurance\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/insurance?lnk=flatitem\x22,\x22description\x22:\x22Improve operations and customer experiences at speed and scale\x22},{\x22title\x22:\x22Life Sciences\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/life\u002Dsciences?lnk=flatitem\x22,\x22description\x22:\x22Accelerate product innovation and drive patient centricity\x22},{\x22title\x22:\x22Manufacturing\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/manufacturing?lnk=flatitem\x22,\x22description\x22:\x22Digitally transform traditional manufacturing processes\x22},{\x22title\x22:\x22Retail\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/retail?lnk=flatitem\x22,\x22description\x22:\x22Meet changing consumer needs with new retail business models\x22},{\x22title\x22:\x22Telecommunications\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/telecommunications?lnk=flatitem\x22,\x22description\x22:\x22Achieve a more flexible, seamless network architecture\x22},{\x22title\x22:\x22Travel\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/travel\u002Dtransportation?lnk=flatitem\x22,\x22description\x22:\x22Restore traveler trust and increase operational efficiency\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Infrastructure\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/it\u002Dinfrastructure?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Backup \x26 recovery\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/backup\u002Drecovery?lnk=flatitem\x22,\x22description\x22:\x22Comprehensive data resilience for physical and virtual servers\x22},{\x22title\x22:\x22Edge computing\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/edge\u002Dcomputing?lnk=flatitem\x22,\x22description\x22:\x22Manage workloads from edge to core across any hybrid multicloud\x22},{\x22title\x22:\x22High performance computing (HPC)\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/high\u002Dperformance\u002Dcomputing?lnk=flatitem\x22,\x22description\x22:\x22HPC infrastructure for advanced and data\u002Dintensive workloads\x22},{\x22title\x22:\x22Hybrid cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/hybrid\u002Dcloud?lnk=flatitem\x22,\x22description\x22:\x22Use a common platform across cloud, on\u002Dprem and edge environments\x22},{\x22title\x22:\x22IT modernization\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/infrastructure\u002Dmodernization?lnk=flatitem\x22,\x22description\x22:\x22Modernize legacy IT in place with containerized microservices\x22},{\x22title\x22:\x22Mainframe application modernization\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/mainframe\u002Dapplication\u002Dmodernization?lnk=flatitem\x22,\x22description\x22:\x22Apply modern development and DevOps tools to mainframe applications\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Security\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/security?lnk=flathl\x22,\x22description\x22:\x22Enterprise cybersecurity for today’s hybrid cloud environments\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloud security\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/cloud\u002Dsecurity?lnk=flatitem\x22,\x22description\x22:\x22Trust IBM Cloud security for data protection and compliance\x22},{\x22title\x22:\x22Data security\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/data\u002Dsecurity?lnk=flatitem\x22,\x22description\x22:\x22Meet data privacy regulations and simplify operational complexity\x22},{\x22title\x22:\x22Insider threat\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/insider\u002Dthreat?lnk=flatitem\x22,\x22description\x22:\x22Protection from malicious or unintentional threats from insiders\x22},{\x22title\x22:\x22Ransomware\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/ransomware?lnk=flatitem\x22,\x22description\x22:\x22Proactively manage cyber risks to reduce the impact of attacks\x22},{\x22title\x22:\x22Threat detection and response\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/threat\u002Ddetection\u002Dresponse?lnk=flatitem\x22,\x22description\x22:\x22Accelerate and streamline responses across the attack lifecycle\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Sustainability\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/sustainability?lnk=flathl\x22,\x22description\x22:\x22Embed sustainability into your business transformation\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Asset lifecycle management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/maximo\/sustainability?lnk=flatitem\x22,\x22description\x22:\x22Optimize performance, extend asset lifecycles and reduce downtime\x22},{\x22title\x22:\x22ESG reporting\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/envizi?lnk=flatitem\x22,\x22description\x22:\x22Data foundation to streamline meeting ESG reporting requirements\x22},{\x22title\x22:\x22Facilities management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/tririga\/sustainability?lnk=flatitem\x22,\x22description\x22:\x22A single source of truth to manage your corporate real estate\x22},{\x22title\x22:\x22IT sustainability\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/turbonomic\/sustainability?lnk=flatitem\x22,\x22description\x22:\x22Software to estimate infrastructure resource consumption\x22},{\x22title\x22:\x22Supply chain\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/supply\u002Dchain?lnk=flatitem\x22,\x22description\x22:\x22Build supply chain resiliency with intelligent automation\x22},{\x22title\x22:\x22Weather Risk Management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/environmental\u002Dintelligence\u002Dsuite\/sustainability?lnk=flatitem\x22,\x22description\x22:\x22Manage the economic impact of weather and climate on your business\x22}]}]}],\x22viewAll\x22:{\x22title\x22:\x22\x22,\x22url\x22:\x22\x22}}},{\x22title\x22:\x22Consulting\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/consulting?lnk=L0G\x22},{\x22title\x22:\x22Support\x22,\x22url\x22:\x22\x22,\x22submenu\x22:{\x22sections\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22What\x27s New\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/new?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Community\x22,\x22url\x22:\x22https:\/\/community.ibm.com\/community\/user\/community?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Developer\x22,\x22url\x22:\x22https:\/\/developer.ibm.com\/?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Call for Code\x22,\x22url\x22:\x22https:\/\/developer.ibm.com\/callforcode\/?lnk=flatitem\x22},{\x22title\x22:\x22Generative AI\x22,\x22url\x22:\x22https:\/\/developer.ibm.com\/generative\u002Dai\u002Dfor\u002Ddevelopers\/?lnk=flatitem\x22},{\x22title\x22:\x22Open Source @ IBM\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/opensource\/?lnk=flatitem\x22},{\x22title\x22:\x22Products\x22,\x22url\x22:\x22https:\/\/developer.ibm.com\/components\/?lnk=flatitem\x22},{\x22title\x22:\x22Technologies\x22,\x22url\x22:\x22https:\/\/developer.ibm.com\/technologies\/?lnk=flatitem\x22}]},{\x22heading\x22:{\x22title\x22:\x22Documentation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/docs\/en?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22All product documentation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/docs\/en?lnk=flatitem\x22},{\x22title\x22:\x22IBM Cloud documentation\x22,\x22url\x22:\x22https:\/\/cloud.ibm.com\/docs?lnk=flatitem\x22},{\x22title\x22:\x22IBM Redbooks\x22,\x22url\x22:\x22https:\/\/www.redbooks.ibm.com\/?lnk=flatitem\x22}]},{\x22heading\x22:{\x22title\x22:\x22IBM Cloud platform support\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/cloud\/support?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Implementation\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Expert Labs\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/expertlabs?lnk=flatitem\x22}]},{\x22heading\x22:{\x22title\x22:\x22Support\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/mysupport\/s\/?language=en_US\x26lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Download fixes, updates \x26 drivers\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/support\/fixcentral?lnk=flatitem\x22},{\x22title\x22:\x22Download licensed software \u002D Passport Advantage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/software\/passportadvantage\/pao_customer.html?lnk=flatitem\x22},{\x22title\x22:\x22IBM Software Licensing\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/about\/software\u002Dlicensing\/?lnk=flatitem\x22},{\x22title\x22:\x22Open a case\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/mysupport\/s\/redirecttoopencasepage?lnk=flatitem\x22},{\x22title\x22:\x22View more\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/mysupport\/s\/?language=en_US\x26lnk=flatitem\x22},{\x22title\x22:\x22View support plans\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/support\/pages\/ibm\u002Dsupport\u002Dofferings?lnk=flatitem\x22},{\x22title\x22:\x22View your cases\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/mysupport\/s\/my\u002Dcases?lnk=flatitem\x22}]},{\x22heading\x22:{\x22title\x22:\x22Technology Lifecycle Services\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/services\/technology\u002Dlifecycle\u002Dservices?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Enterprise networking and security\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/services\/networking\u002Dsupport?lnk=flatitem\x22},{\x22title\x22:\x22Servers and storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/services\/systems\u002Dsupport?lnk=flatitem\x22},{\x22title\x22:\x22Software\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/services\/software\u002Dsupport?lnk=flatitem\x22}]},{\x22heading\x22:{\x22title\x22:\x22Training\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/training\/?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Courses\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/training\/search?q=course\x26lnk=flatitem\x22},{\x22title\x22:\x22Digital learning subscriptions\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/training\/subscriptions?lnk=flatitem\x22},{\x22title\x22:\x22Learning paths \x26 collections\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/training\/learning\u002Dpaths\u002Dand\u002Dcollections?lnk=flatitem\x22},{\x22title\x22:\x22Professional certifications\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/training\/credentials?lnk=flatitem\x22}]}]}],\x22viewAll\x22:{\x22title\x22:\x22\x22,\x22url\x22:\x22\x22}}},{\x22title\x22:\x22Think\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think?lnk=L0G\x22}]}}"; const searchPlaceholderText = "Search all of IBM"; const links = JSON.parse(l0Json).mastheadNav.links; const unAuthenticated = JSON.parse(l0Json).profileMenu.signedout; const authenticated = JSON.parse(l0Json).profileMenu.signedin; const mastheadContainerEl = document.querySelector('c4d-masthead-container'); mastheadContainerEl.navLinks = links; mastheadContainerEl.unauthenticatedProfileItems = unAuthenticated; mastheadContainerEl.authenticatedProfileItems = authenticated; const appendSearchPlaceholderText = () => { const typeheadEl = mastheadContainerEl.querySelector('c4d-search-with-typeahead'); if (typeheadEl) { typeheadEl.searchPlaceholder = searchPlaceholderText; observer.disconnect(); } } let observer = new MutationObserver(appendSearchPlaceholderText); observer.observe(mastheadContainerEl, {subtree: true, childList: true}); </script> <script> var json = "{\x22title\x22:\x22Think\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\x22,\x22menuItems\x22:[{\x22title\x22:\x22Artificial intelligence\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/artificial\u002Dintelligence\x22},{\x22title\x22:\x22Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/cloud\x22},{\x22title\x22:\x22Security\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/security\x22},{\x22title\x22:\x22Sustainability\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/sustainability\x22},{\x22title\x22:\x22Blog\x22,\x22submenu\x22:{\x22columns\x22:2,\x22footer\x22:{\x22title\x22:\x22View all blog posts\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/\x22},\x22menuSections\x22:[{\x22span\x22:1,\x22heading\x22:{\x22headingLevel\x22:2,\x22title\x22:\x22Categories\x22},\x22items\x22:[{\x22title\x22:\x22Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/analytics\/\x22},{\x22title\x22:\x22Artificial intelligence\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/artificial\u002Dintelligence\/\x22},{\x22title\x22:\x22Automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/automation\/\x22},{\x22title\x22:\x22Business transformation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/business\u002Dtransformation\/\x22},{\x22title\x22:\x22Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/cloud\/\x22},{\x22title\x22:\x22Security\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/security\/\x22},{\x22title\x22:\x22Social impact\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/social\u002Dimpact\/\x22},{\x22title\x22:\x22Supply chain\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/supply\u002Dchain\/\x22},{\x22title\x22:\x22Sustainability\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/sustainability\/\x22}]},{\x22span\x22:1,\x22heading\x22:{\x22headingLevel\x22:2,\x22title\x22:\x22Industries\x22},\x22items\x22:[{\x22title\x22:\x22Energy and utilities\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/energy\u002Dand\u002Dutilities\/\x22},{\x22title\x22:\x22Financial services\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/financial\u002Dservices\/\x22},{\x22title\x22:\x22Government\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/government\/\x22},{\x22title\x22:\x22Healthcare\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/healthcare\/\x22},{\x22title\x22:\x22Manufacturing\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/manufacturing\/\x22},{\x22title\x22:\x22Media and entertainment\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/media\u002Dand\u002Dentertainment\/\x22},{\x22title\x22:\x22Mining and extraction\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/mining\u002Dand\u002Dextraction\/\x22},{\x22title\x22:\x22Technology\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/technology\/\x22},{\x22title\x22:\x22Telecommunications\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/telecommunications\/\x22},{\x22title\x22:\x22Transportation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/transportation\/\x22}]}]}},{\x22title\x22:\x22Videos\x22,\x22submenu\x22:{\x22columns\x22:1,\x22menuSections\x22:[{\x22span\x22:1,\x22items\x22:[{\x22title\x22:\x22Overview\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/videos\x22},{\x22title\x22:\x22AI Academy\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/videos\/ai\u002Dacademy\x22},{\x22title\x22:\x22Rethink use cases\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/videos\/series\/rethink\x22},{\x22title\x22:\x22Think 2024 on demand\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/videos\/series\/think\u002Dkeynotes\x22}]}]}},{\x22title\x22:\x22Reports\x22,\x22submenu\x22:{\x22columns\x22:1,\x22menuSections\x22:[{\x22span\x22:1,\x22items\x22:[{\x22title\x22:\x22AI in Action 2024\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22http:\/\/www.ibm.com\/think\/reports\/ai\u002Din\u002Daction\x22},{\x22title\x22:\x22State of Sustainability Readiness Report 2024\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/reports\/sustainability\u002Dreadiness\x22},{\x22title\x22:\x22Cost of a Data Breach 2024\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/reports\/data\u002Dbreach\x22},{\x22title\x22:\x22IBM X\u002DForce Threat Intelligence Index 2024\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/reports\/threat\u002Dintelligence\x22},{\x22title\x22:\x22CEO’s Guide to Generative AI\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/thought\u002Dleadership\/institute\u002Dbusiness\u002Dvalue\/en\u002Dus\/report\/ceo\u002Dgenerative\u002Dai\x22},{\x22title\x22:\x22Hybrid by Design: The great tech reset\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/thought\u002Dleadership\/institute\u002Dbusiness\u002Dvalue\/en\u002Dus\/report\/hybrid\u002Dby\u002Ddesign\x22},{\x22title\x22:\x222024 CEO Study\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/thought\u002Dleadership\/institute\u002Dbusiness\u002Dvalue\/en\u002Dus\/c\u002Dsuite\u002Dstudy\/ceo\x22},{\x22title\x22:\x22View all IBV reports\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/thought\u002Dleadership\/institute\u002Dbusiness\u002Dvalue\x22}]}]}},{\x22title\x22:\x22Podcasts\x22,\x22submenu\x22:{\x22columns\x22:1,\x22menuSections\x22:[{\x22span\x22:1,\x22items\x22:[{\x22title\x22:\x22Overview\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/podcasts\x22},{\x22title\x22:\x22Mixture of Experts\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/podcasts\/mixture\u002Dof\u002Dexperts\x22},{\x22title\x22:\x22AI in Action\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/podcasts\/ai\u002Din\u002Daction\x22},{\x22title\x22:\x22Smart Talks with IBM\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/podcasts\/smart\u002Dtalks\x22}]}]}},{\x22title\x22:\x22Events\x22,\x22submenu\x22:{\x22columns\x22:1,\x22menuSections\x22:[{\x22span\x22:1,\x22items\x22:[{\x22title\x22:\x22Think 2024\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/events\/think\x22},{\x22title\x22:\x22Think on Tour\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/events\/think\/on\u002Dtour\x22},{\x22title\x22:\x22TechXchange\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/community\/ibm\u002Dtechxchange\u002Dconference\/\x22}]}]}},{\x22title\x22:\x22More\x22,\x22submenu\x22:{\x22columns\x22:2,\x22footer\x22:{\x22title\x22:\x22View all\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/search\x22},\x22menuSections\x22:[{\x22span\x22:1,\x22heading\x22:{\x22headingLevel\x22:2,\x22title\x22:\x22Topics\x22},\x22items\x22:[{\x22title\x22:\x22Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/analytics\x22},{\x22title\x22:\x22Asset management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/asset\u002Dmanagement\x22},{\x22title\x22:\x22Business automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/business\u002Dautomation\x22},{\x22title\x22:\x22Business operations\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/business\u002Doperations\x22},{\x22title\x22:\x22Compute and servers\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/compute\x22},{\x22title\x22:\x22DevOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/devops\x22},{\x22title\x22:\x22IT automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/it\u002Dautomation\x22},{\x22title\x22:\x22IT infrastructure\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/it\u002Dinfrastructure\x22},{\x22title\x22:\x22Middleware\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/middleware\x22},{\x22title\x22:\x22Network\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/network\x22},{\x22title\x22:\x22Quantum\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/quantum\x22},{\x22title\x22:\x22Storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/storage\x22}]},{\x22span\x22:1,\x22heading\x22:{\x22headingLevel\x22:2,\x22title\x22:\x22Content types\x22},\x22items\x22:[{\x22title\x22:\x22Explainers\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/topics\x22},{\x22title\x22:\x22News\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/news\x22},{\x22title\x22:\x22Newsletters\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/subscribe\x22},{\x22title\x22:\x22Reference architectures\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/architectures\x22}]}]}}],\x22actions\x22:{\x22login\x22:null,\x22cta\x22:{\x22title\x22:\x22Subscribe\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/account\/reg\/signup?formid=news\u002Durx\u002D52954\x22}},\x22linkOrContactModule\x22:false,\x22optinalCta\x22:true}"; document.querySelector('c4d-masthead-container').l1Data = JSON.parse(json); document.querySelector('.masthead').classList.add("hasNavigation"); document.documentElement.style.setProperty('--anker-navigation-spacing', '-6rem'); document.addEventListener('DOMContentLoaded', () => { document.querySelector('c4d-masthead-l1').overviewText = 'Overview'; }); </script> <script type="text/javascript"> if(window.location.href.includes("/careers")){ document.querySelector('c4d-masthead-container').setAttribute("has-search","false"); document.querySelector('c4d-masthead-container').setAttribute("has-profile","false"); } </script> </div> <div class="leadspace"> <div class="bx--grid bx--no-gutter "> <dds-leadspace type="left" size="medium" loadinganimation gradient-style-scheme> <bx-breadcrumb slot="navigation"> <bx-breadcrumb-item> <bx-breadcrumb-link href="/"> <caem-paragraph size="normal" type-style="body-short-01">Home</caem-paragraph> </bx-breadcrumb-link> </bx-breadcrumb-item> <bx-breadcrumb-item> <bx-breadcrumb-link href="/topics"> <caem-paragraph size="normal" type-style="body-short-01">Topics</caem-paragraph> </bx-breadcrumb-link> </bx-breadcrumb-item> <bx-breadcrumb-item class="no-trailing-slash"> <caem-paragraph size="normal" type-style="body-short-01">Social Engineering</caem-paragraph> </bx-breadcrumb-item> </bx-breadcrumb> <dds-leadspace-heading id="leadspaceSimpleTitle"> What is social engineering? </dds-leadspace-heading> <div class="leadspace__copy "> </div> <dds-button-group slot="action"> <dds-button-cta href="https://www.ibm.com/services/social-engineering" target="_self" kind="primary" aria-label="Optional Primary Option" cta-type="local" data-aem-autoid="aem--leadspace_cta-0"> <span>Explore IBM&#39;s social engineering solution</span> </dds-button-cta> <dds-button-cta href="https://www.ibm.com/account/reg/signup?formid=news-urx-52954" target="_blank" kind="tertiary" aria-label="Optional Secondary Option" cta-type="local" data-aem-autoid="aem--leadspace_cta-1"> <span>Sign up for security topic updates</span> </dds-button-cta> </dds-button-group> <dds-background-media mobile-position="bottom" opacity="100" gradient-hidden> <div class="bx--image "> <picture> <source media="(min-width: 1312px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/98/4d/content-hub-security-and-identity-page-leadspace-short.component.xl-retina.ts=1727788467648.png/content/adobe-cms/us/en/topics/social-engineering/jcr:content/root/leadspace"/> <source media="(min-width: 1312px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/98/4d/content-hub-security-and-identity-page-leadspace-short.component.xl.ts=1727788467648.png/content/adobe-cms/us/en/topics/social-engineering/jcr:content/root/leadspace"/> <source media="(min-width: 1056px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/98/4d/content-hub-security-and-identity-page-leadspace-short.component.l-retina.ts=1727788467648.png/content/adobe-cms/us/en/topics/social-engineering/jcr:content/root/leadspace"/> <source media="(min-width: 1056px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/98/4d/content-hub-security-and-identity-page-leadspace-short.component.l.ts=1727788467648.png/content/adobe-cms/us/en/topics/social-engineering/jcr:content/root/leadspace"/> <source media="(min-width: 672px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/98/4d/content-hub-security-and-identity-page-leadspace-short.component.m-retina.ts=1727788467648.png/content/adobe-cms/us/en/topics/social-engineering/jcr:content/root/leadspace"/> <source media="(min-width: 672px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/98/4d/content-hub-security-and-identity-page-leadspace-short.component.m.ts=1727788467648.png/content/adobe-cms/us/en/topics/social-engineering/jcr:content/root/leadspace"/> <source media="(min-width: 481px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/98/4d/content-hub-security-and-identity-page-leadspace-short.component.s-retina.ts=1727788467648.png/content/adobe-cms/us/en/topics/social-engineering/jcr:content/root/leadspace"/> <source media="(min-width: 481px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/98/4d/content-hub-security-and-identity-page-leadspace-short.component.s.ts=1727788467648.png/content/adobe-cms/us/en/topics/social-engineering/jcr:content/root/leadspace"/> <source media="(max-width: 480px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/98/4d/content-hub-security-and-identity-page-leadspace-short.component.xs-retina.ts=1727788467648.png/content/adobe-cms/us/en/topics/social-engineering/jcr:content/root/leadspace"/> <source media="(max-width: 480px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/98/4d/content-hub-security-and-identity-page-leadspace-short.component.xs.ts=1727788467648.png/content/adobe-cms/us/en/topics/social-engineering/jcr:content/root/leadspace"/> <img id="image-1700180260" class="bx--image__img" src="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/98/4d/content-hub-security-and-identity-page-leadspace-short.component.xl.ts=1727788467648.png/content/adobe-cms/us/en/topics/social-engineering/_jcr_content/root/leadspace" alt="Illustration with collage of pictograms of clouds, mobile phone, fingerprint, check mark"/> </picture> </div> </dds-background-media> </dds-leadspace> </div> </div> <div class="table-of-contents container responsivegrid"> <dds-table-of-contents data-cmp-is="table-of-contents" data-autoid="dds--table-of-contents" class="cmp-table-of-contents" stickyoffset="96"> <div id="table-of-contents-6c17892966" class="cmp-table-of-contents"> <div class="body container responsivegrid"> <div id="body-055505a59f" class="cmp-container"> <div class="content-section-styled content-section container responsivegrid"> <div class="bx--grid"> <div class="bx--row"> <div class="bx--col-lg-16 bx--no-gutter"> <div class="bx--content-section"> <div id="container-8f81c00a1a" class="cmp-container"> <div class="complex-narrative"> <dds-content-block-segmented data-autoid="dds-content-block-segmented" no-image content-section-body> <div slot="heading"> <a data-title="What is social engineering?" name="What+is+social+engineering%3F"></a> <dds-content-block-heading data-autoid="dds--content-block__heading" role="heading"> <a data-title="What is social engineering?" name="What+is+social+engineering%3F"></a> What is social engineering? </dds-content-block-heading> </div> <dds-content-block-copy data-autoid="dds--content-block__copy" slot="copy"> <dds-content-block-paragraph> <div class="cms-richtext " id="rich-text-c746b8d1fe" data-dynamic-inner-content="description"> <p>Social engineering attacks manipulate people into sharing information that they shouldn’t share, downloading software that they shouldn’t download, visiting websites they shouldn’t visit, sending money to criminals or making other mistakes that compromise their personal or organizational security.</p> </div> </dds-content-block-paragraph> </dds-content-block-copy> <dds-content-block-segmented-item> <dds-content-item-copy> <div class="cms-richtext " id="rich-text-92f67ae395" data-dynamic-inner-content="description"> <p>An email that seems to be from a trusted coworker requesting sensitive information, a threatening voicemail claiming to be from the IRS and an offer of riches from a foreign potentate are just a few examples of social engineering. Because social engineering uses psychological manipulation and exploits human error or weakness rather than technical or digital system vulnerabilities, it is sometimes called &#34;human hacking.&#34;</p> <p>Cybercriminals frequently use social engineering tactics to obtain personal data or financial information, including login credentials, credit card numbers, bank account numbers and Social Security numbers. They use the information that they have stolen for identity theft, enabling them to make purchases using other peoples’ money or credit, apply for loans in someone else’s name, apply for other peoples’ unemployment benefits and more. But a social engineering attack can also be the first stage of a larger-scale <a href="https://www.ibm.com/topics/cyber-attack" target="_self" rel="noopener noreferrer">cyberattack</a>. For example, a cybercriminal might trick a victim into sharing a username and password and then use those credentials to plant <a href="https://www.ibm.com/topics/ransomware" target="_self" rel="noopener noreferrer">ransomware</a> on the victim’s employer’s network.</p> <p>Social engineering is attractive to cybercriminals because it enables them to access digital networks, devices and accounts without having to do the difficult technical work of getting around firewalls, antivirus software and other <a href="https://www.ibm.com/topics/cybersecurity" target="_self" rel="noopener noreferrer">cybersecurity</a> controls. This is one reason why social engineering is the leading cause of network compromise today according to ISACA&#39;s <a href="https://www.isaca.org/resources/reports/state-of-cybersecurity-2022" target="_blank" rel="noopener noreferrer">State of Cybersecurity 2022 report</a> (link resides outside ibm.com). According to IBM&#39;s <em><a href="https://www.ibm.com/reports/data-breach" target="_self" rel="noopener noreferrer">Cost of a Data Breach</a> </em>report, breaches caused by social engineering tactics (such as phishing and business email compromise) were among the most costly.</p> </div> </dds-content-item-copy> </dds-content-block-segmented-item> <div slot="complementary"> <div class="aside-card"> <dds-card-cta href="https://www.ibm.com/account/reg/signup?formid=urx-52629" target="_blank" pictogram-placement="top" cta-type="local"> <dds-card-eyebrow slot="eyebrow" aria-hidden="true"> Report </dds-card-eyebrow> <dds-card-heading role="heading" aria-level="3" slot="heading"> IBM X-Force® Threat Intelligence Index </dds-card-heading> <p>Gain insights to prepare and respond to cyberattacks with greater speed and effectiveness with the IBM X-Force Threat Intelligence Index.</p> <dds-card-cta-footer icon-placement="right" href="https://www.ibm.com/account/reg/signup?formid=urx-52629" target="_blank" slot="footer" aria-hidden="true"> </dds-card-cta-footer> </dds-card-cta> </div> <dds-link-list type="default"> <dds-link-list-heading role="heading" aria-level="4" slot="heading"> Related content </dds-link-list-heading> <dds-link-list-item-card cta-type="local" href="https://www.ibm.com/account/reg//signup?formid=urx-52913" target="_blank"> <p>Register for the Cost of a Data Breach report</p> <dds-card-cta-footer href="https://www.ibm.com/account/reg//signup?formid=urx-52913" target="_blank" cta-type="local"> </dds-card-cta-footer> </dds-link-list-item-card> <dds-link-list-item-card cta-type="blog" href="https://www.ibm.com/blog/x-force-cloud-threat-landscape/" target="_self"> <p>Get the X-Force Cloud Threat Landscape Report 2024</p> <dds-card-cta-footer href="https://www.ibm.com/blog/x-force-cloud-threat-landscape/" target="_self" cta-type="blog"> </dds-card-cta-footer> </dds-link-list-item-card> </dds-link-list> </div> </dds-content-block-segmented> <div horizontal-ruler> <dds-hr></dds-hr> </div> </div> <div class="simple-narrative"> <dds-content-block-simple data-autoid="dds--content-block-simple" class=" " no-aside content-section-body> <div slot="heading"> <a data-title="How and why social engineering works" name="How+and+why+social+engineering+works"></a> <dds-content-block-heading data-autoid="dds--content-block__heading" role="heading"> <a data-title="How and why social engineering works" name="How+and+why+social+engineering+works"></a> How and why social engineering works </dds-content-block-heading> </div> <dds-content-block-copy data-autoid="dds--content-block__copy" slot="copy" size="sm"> <div class="cms-richtext " id="rich-text-fcb423e0ea" data-dynamic-inner-content="description"> <p>Social engineering tactics and techniques are grounded in the science of human motivation. They manipulate victims’ emotions and instincts in ways proven to drive people to take actions that are not in their best interests.</p> <p>Most social engineering attacks employ one or more of the following tactics:</p> <ul><li><p><strong>Posing as a trusted brand</strong>: Scammers often impersonate or &#34;spoof&#34; companies that victims know, trust and perhaps do business with often or regularly—so regularly that they follow instructions from these brands reflexively, without taking the proper precautions. Some social engineering scammers use widely available kits for staging fake websites that resemble those of major brands or companies.<br />  </p> </li><li><p><strong>Posing as a government agency or authority figure</strong>: People trust, respect or fear authority (in varying degrees). Social engineering attacks play on these instincts with messages that appear or claim to be from government agencies (example: the FBI or IRS), political figures or even celebrities.<br />  </p> </li><li><p><strong>Inducing fear or a sense of urgency</strong>: People tend to act rashly when scared or hurried. Social engineering scams can use any number of techniques to induce fear or urgency in victims. For instance, telling the victim that a recent credit transaction was not approved, that a virus has infected their computer, that an image used on their website violates a copyright and so on. Social engineering can also appeal to victims’ fear of missing out (FOMO), which creates a different kind of urgency.<br />  </p> </li><li><p><strong>Appealing to greed</strong>: The Nigerian Prince scam, an email wherein someone claiming to be a Nigerian royal trying to flee his country offers a giant financial reward in exchange for the recipient’s bank account information or a small advance fee, is one of the best-known examples of social engineering that appeals to greed. This type of social engineering attack can also come from an alleged authority figure and creates a sense of urgency, which is a powerful combination. This scam is as old as email itself, but was still raking in USD 700,000 per year as of 2018.<br />  </p> </li><li><p><strong>Appealing to helpfulness or curiosity</strong>: Social engineering ploys can also appeal to victims’ better nature. For instance, a message that appears to be from a friend or a social networking site can offer technical help, ask for participation in a survey, claim that the recipients’ post has gone viral and provide a spoofed link to a fake website or <a href="https://www.ibm.com/topics/malware" target="_self" rel="noopener noreferrer">malware</a> download.</p> </li></ul> </div> </dds-content-block-copy> </dds-content-block-simple> <div horizontal-ruler> <dds-hr></dds-hr> </div> </div> <div class="simple-narrative"> <dds-content-block-simple data-autoid="dds--content-block-simple" class=" " no-aside content-section-body> <div slot="heading"> <a data-title="Types of social engineering attacks" name="Types+of+social+engineering+attacks"></a> <dds-content-block-heading data-autoid="dds--content-block__heading" role="heading"> <a data-title="Types of social engineering attacks" name="Types+of+social+engineering+attacks"></a> Types of social engineering attacks </dds-content-block-heading> </div> <dds-content-block-copy data-autoid="dds--content-block__copy" slot="copy" size="sm"> <div class="cms-richtext " id="rich-text-97b3328654" data-dynamic-inner-content="description"> <h3>Phishing</h3> <p><a href="https://www.ibm.com/topics/phishing" target="_self" rel="noopener noreferrer">Phishing</a> attacks are digital or voice messages that try to manipulate recipients into sharing sensitive information, downloading malicious software, transferring money or assets to the wrong people or taking some other damaging actions. Scammers craft phishing messages to look or sound like they come from a trusted or credible organization or individual—sometimes, even an individual the recipient knows personally.</p> <p>There are many types of phishing scams:</p> <ul><li><p><strong>Bulk phishing emails</strong> are sent to millions of recipients at a time. They appear to be sent by a large, well-known business or organization, such as a national or global bank, a large online retailer, a popular online payments provider and so on, and make a generic request such as &#34;<em>we’re having trouble processing your purchase, please update your credit information</em>.&#34; Frequently, these messages include a malicious link that takes the recipient to a fake website that captures the recipient’s username, password, credit card data and more.<br />  </p> </li><li><p><strong><a href="https://www.ibm.com/topics/spear-phishing" target="_self" rel="noopener noreferrer">Spear phishing</a></strong> targets a specific individual, typically one with privileged access to user information, the computer network or corporate funds. A scammer will research the target, often using information that is found on LinkedIn, Facebook or other social media to create a message that appears to come from someone the target knows and trusts or that refers to situations with which the target is familiar. <a href="https://www.ibm.com/topics/whale-phishing" target="_self" rel="noopener noreferrer">Whale phishing</a> is a spear phishing attack that targets a high-profile individual, such as a CEO or political figure. In <a href="https://www.ibm.com/topics/business-email-compromise" target="_self" rel="noopener noreferrer">business email compromise (BEC)</a>, the hacker uses compromised credentials to send email messages from an authority figure’s actual email account, making the scam that much more difficult to detect.<br />  </p> </li><li><p><strong>Voice phishing or vishing</strong>, is phishing that is conducted through phone calls. Individuals typically experience vishing in the form of threatening recorded calls claiming to be from the FBI.<br />  </p> </li><li><p>SMS phishing, or <a href="https://www.ibm.com/topics/smishing" target="_self" rel="noopener noreferrer">smishing</a>, is phishing through a text message.<br />  </p> </li><li><p><strong>Search engine phishing</strong> involves hackers creating malicious websites that rank high in search results for popular search terms.<br />  </p> </li><li><p><strong>Angler phishing</strong> is phishing using fake social media accounts that masquerade as the official accounts of trusted companies’ customer service or customer support teams.</p> </li></ul> <p>According to the <a href="https://www.ibm.com/reports/threat-intelligence" target="_self" rel="noopener noreferrer"><em>IBM X-Force® Threat Intelligence Index</em></a>, phishing is the leading malware infection vector, identified in 41% of all incidents. According to the <a href="https://www.ibm.com/reports/data-breach" target="_self" rel="noopener noreferrer"><em>Cost of a Data Breach</em></a> report, phishing is the initial attack vector leading to the most costly <a href="https://www.ibm.com/topics/data-breach" target="_self" rel="noopener noreferrer">data breaches</a>.</p> <h3>Baiting</h3> <p>Baiting lures (no pun intended) victims into knowingly or unwittingly giving up sensitive information or downloading malicious code by tempting them with a valuable offer or even a valuable object.</p> <p>The Nigerian Prince scam is probably the best-known example of this social engineering technique. More current examples include free but malware-infected games, music or software downloads. But some forms of baiting are barely artful. For example, some threat actors leave malware-infected USB drives where people will find them, grab them and use them because &#34;hey, free USB drive.&#34;</p> <h3>Tailgating</h3> <p>In tailgating, also called &#34;piggybacking&#34;, an unauthorized person closely follows an authorized person into an area containing sensitive information or valuable assets. Tailgating can be conducted in person, for example, a threat actor can follow an employee through an unlocked door. But tailgating can also be a digital tactic, such as when a person leaves a computer unattended while still logged in to a private account or network.</p> <h3>Pretexting</h3> <p>In pretexting, the threat actor creates a fake situation for the victim, and poses as the right person to resolve it. Very often (and most ironically) the scammer claims that the victim has been impacted by a security breach, and then offers to fix things if the victim will provide important account information or control over the victim’s computer or device. Technically speaking, almost every social engineering attack involves some degree of pretexting.</p> <h3>Quid pro quo</h3> <p>In a quid pro quo scam, hackers dangle a desirable good or service in exchange for the victim’s sensitive information. Fake contest winnings or seemingly innocent loyalty rewards (&#34;thank your for your payment, we have a gift for you&#34;) are examples of quid pro quo ploys.</p> <h3>Scareware</h3> <p>Also considered a form of malware, scareware is software that uses fear to manipulate people into sharing confidential information or downloading malware. Scareware often takes the form of a fake law enforcement notice accusing the user of a crime, or a fake tech support message warning the user of malware on their device.</p> <h3>Watering hole attack</h3> <p>From the phrase &#34;somebody poisoned the watering hole&#34;, hackers inject malicious code into a legitimate web page that is frequented by their targets. Watering hole attacks are responsible for everything, from stolen credentials to unwitting drive-by ransomware downloads.</p> </div> </dds-content-block-copy> </dds-content-block-simple> <div horizontal-ruler> <dds-hr></dds-hr> </div> </div> <div class="simple-narrative"> <dds-content-block-simple data-autoid="dds--content-block-simple" class=" " no-aside content-section-body> <div slot="heading"> <a data-title="Social engineering defenses" name="Social+engineering+defenses"></a> <dds-content-block-heading data-autoid="dds--content-block__heading" role="heading"> <a data-title="Social engineering defenses" name="Social+engineering+defenses"></a> Social engineering defenses </dds-content-block-heading> </div> <dds-content-block-copy data-autoid="dds--content-block__copy" slot="copy" size="sm"> <div class="cms-richtext " id="rich-text-9d2131807f" data-dynamic-inner-content="description"> <p>Social engineering attacks are notoriously difficult to prevent because they rely on human psychology rather than technological pathways. The <a href="https://www.ibm.com/topics/attack-surface" target="_self" rel="noopener noreferrer">attack surface</a> is also significant: In a larger organization, it takes just one employee&#39;s mistake to compromise the integrity of the entire enterprise network. Some of the steps that experts recommend to mitigate the risk and success of social engineering scams include:</p> <ul><li><p><strong>Security awareness training</strong>: Many users don&#39;t know how to identify social engineering attacks. In a time when users frequently trade personal information for goods and services, they don’t realize that surrendering seemingly mundane information, such as a phone number or date of birth, can allow hackers to breach an account. Security awareness training, combined with <a href="https://www.ibm.com/topics/data-security" target="_self" rel="noopener noreferrer">data security</a> policies, can help employees understand how to protect their sensitive data and how to detect and respond to social engineering attacks in progress.<br />  </p> </li><li><p><strong>Access control policies</strong>: Secure access control policies and technologies, including <a href="https://www.ibm.com/topics/multi-factor-authentication" target="_self" rel="noopener noreferrer">multi-factor authentication</a>, adaptive authentication and a <a href="https://www.ibm.com/topics/zero-trust" target="_self" rel="noopener noreferrer">zero trust</a> security approach can limit cybercriminals&#39; access to sensitive information and assets on the corporate network even if they obtain users&#39; login credentials.<br />  </p> </li><li><p><strong>Cybersecurity technologies</strong>: Spam filters and secure email gateways can prevent some phishing attacks from reaching employees in the first place. Firewalls and antivirus software can mitigate the extent of any damage done by attackers who gain access to the network. Keeping operating systems updated with the latest patches can also close some vulnerabilities that attackers exploit through social engineering. Additionally, advanced detection and response solutions, including <a href="https://www.ibm.com/topics/edr" target="_self" rel="noopener noreferrer">endpoint detection and response (EDR)</a> and <a href="https://www.ibm.com/topics/xdr" target="_self" rel="noopener noreferrer">extended detection and response (XDR)</a>, can help security teams quickly detect and neutralize security threats that infect the network through social engineering tactics.</p> </li></ul> <p> </p> </div> </dds-content-block-copy> </dds-content-block-simple> <div horizontal-ruler> <dds-hr></dds-hr> </div> </div> <div class="offering-group"> <a data-title="Related solutions" name="Related+solutions"></a> <dds-content-block-horizontal border content-section-body> <dds-content-block-heading role="heading" aria-level="2" data-autoid="dds--content-block__heading" slot="heading"> Related solutions </dds-content-block-heading> <div id="offering-group-items-container-cbfbb16eb6" class="cmp-container"> <div class="offering-item"> <dds-content-item-horizontal> <dds-content-item-heading> X-Force® Red social engineering services </dds-content-item-heading> <dds-content-item-horizontal-copy> <caem-paragraph size="normal"> <div class="cms-richtext " id="rich-text-24f6868a4e" data-dynamic-inner-content="description"> <p>Put your people to the test through phishing, vishing and physical social engineering exercises. Uncover employee, process and policy vulnerabilities to reduce the risk that real social engineering attacks will succeed.</p> </div> </caem-paragraph> </dds-content-item-horizontal-copy> <dds-link-list slot="footer" type="vertical"> <dds-link-list-item-cta cta-type="local" href="https://www.ibm.com/services/social-engineering" icon-placement="right" role="listitem" target="_self"> Explore X-Force Red social engineering services </dds-link-list-item-cta> </dds-link-list> </dds-content-item-horizontal> </div> <div class="offering-item"> <dds-content-item-horizontal> <dds-content-item-heading> X-Force Red penetration testing services </dds-content-item-heading> <dds-content-item-horizontal-copy> <caem-paragraph size="normal"> <div class="cms-richtext " id="rich-text-4fd4131c57" data-dynamic-inner-content="description"> <p>Penetration testing for your AI models, applications, networks, hardware and personnel to uncover and fix vulnerabilities that expose your most important assets to attacks.</p> </div> </caem-paragraph> </dds-content-item-horizontal-copy> <dds-link-list slot="footer" type="vertical"> <dds-link-list-item-cta cta-type="local" href="https://www.ibm.com/services/penetration-testing" icon-placement="right" role="listitem" target="_self"> Explore penetration testing services </dds-link-list-item-cta> </dds-link-list> </dds-content-item-horizontal> </div> </div> </dds-content-block-horizontal> </div> <div class="block-card-container container responsivegrid"> <dds-content-block-cards data-autoid="dds--content-block-cards" content-section-body> <a data-title="Resources" name="Resources" slot="heading"></a> <dds-content-block-heading slot="heading" data-autoid="dds--content-block__heading" role="heading"> <a data-title="Resources" name="Resources"></a> Resources </dds-content-block-heading> <dds-card-group cards-per-row="3" grid-mode="border"> <dds-card-group-item href="https://www.ibm.com/topics/phishing" target="_self" pictogram-placement="top" cta-type="local" no-poster="true"> <dds-card-eyebrow slot="eyebrow" aria-hidden="true" class="bx--card__eyebrow"> Related topic </dds-card-eyebrow> <dds-card-heading role="heading" aria-level="3" slot="heading" class="bx--card__heading"> What is phishing? </dds-card-heading> <p>Phishing scams trick victims into divulging sensitive data, downloading malware and exposing themselves or their organizations to cybercrime.</p> <dds-card-cta-footer icon-placement="right" cta-type="local" href="https://www.ibm.com/topics/phishing" slot="footer" aria-hidden="true" target="_self" class="bx--card__footer-icon-size"> <span>Learn more</span> </dds-card-cta-footer> </dds-card-group-item> <dds-card-group-item href="https://www.ibm.com/topics/multi-factor-authentication" target="_self" pictogram-placement="top" cta-type="local" no-poster="true"> <dds-card-eyebrow slot="eyebrow" aria-hidden="true" class="bx--card__eyebrow"> Related topic </dds-card-eyebrow> <dds-card-heading role="heading" aria-level="3" slot="heading" class="bx--card__heading"> What is multi-factor authentication (MFA)? </dds-card-heading> <p>Learn how multi-factor authentication strengthens security, meets regulatory compliance requirements and supports a zero trust security strategy.</p> <dds-card-cta-footer icon-placement="right" cta-type="local" href="https://www.ibm.com/topics/multi-factor-authentication" slot="footer" aria-hidden="true" target="_self" class="bx--card__footer-icon-size"> <span>Learn more</span> </dds-card-cta-footer> </dds-card-group-item> <dds-card-group-item href="https://www.ibm.com/topics/cyber-hacking" target="_self" pictogram-placement="top" cta-type="local" no-poster="true"> <dds-card-eyebrow slot="eyebrow" aria-hidden="true" class="bx--card__eyebrow"> Related topic </dds-card-eyebrow> <dds-card-heading role="heading" aria-level="3" slot="heading" class="bx--card__heading"> What is hacking? </dds-card-heading> <p>Hacking is the use of unconventional or illicit means to gain unauthorized access to a digital device, computer system or computer network. </p> <dds-card-cta-footer icon-placement="right" cta-type="local" href="https://www.ibm.com/topics/cyber-hacking" slot="footer" aria-hidden="true" target="_self" class="bx--card__footer-icon-size"> <span>Learn more</span> </dds-card-cta-footer> </dds-card-group-item> <dds-card-group-item href="https://www.ibm.com/account/reg/signup?formid=urx-52913" target="_self" pictogram-placement="top" cta-type="local" no-poster="true"> <dds-card-eyebrow slot="eyebrow" aria-hidden="true" class="bx--card__eyebrow"> Report </dds-card-eyebrow> <dds-card-heading role="heading" aria-level="3" slot="heading" class="bx--card__heading"> Cost of a Data Breach Report </dds-card-heading> <p>Data breach costs have hit a new high. Get insights on how to reduce these costs from the experiences of 604 organizations and 3,556 cybersecurity and business leaders.</p> <dds-card-cta-footer icon-placement="right" cta-type="local" href="https://www.ibm.com/account/reg/signup?formid=urx-52913" slot="footer" aria-hidden="true" target="_self" class="bx--card__footer-icon-size"> <span>Read the report</span> </dds-card-cta-footer> </dds-card-group-item> <dds-card-group-item href="https://www.ibm.com/reports/threat-intelligence" target="_self" pictogram-placement="top" cta-type="local" no-poster="true"> <dds-card-eyebrow slot="eyebrow" aria-hidden="true" class="bx--card__eyebrow"> Report </dds-card-eyebrow> <dds-card-heading role="heading" aria-level="3" slot="heading" class="bx--card__heading"> IBM X-Force Threat Intelligence Index </dds-card-heading> <p>Learn from the challenges and successes experienced by security teams around the world.</p> <dds-card-cta-footer icon-placement="right" cta-type="local" href="https://www.ibm.com/reports/threat-intelligence" slot="footer" aria-hidden="true" target="_self" class="bx--card__footer-icon-size"> <span>Read the report</span> </dds-card-cta-footer> </dds-card-group-item> <dds-card-group-item href="https://www.ibm.com/account/reg/signup?formid=urx-53217" target="_self" pictogram-placement="top" cta-type="local" no-poster="true"> <dds-card-eyebrow slot="eyebrow" aria-hidden="true" class="bx--card__eyebrow"> Report </dds-card-eyebrow> <dds-card-heading role="heading" aria-level="3" slot="heading" class="bx--card__heading"> X-Force Cloud Threat Landscape Report </dds-card-heading> <p>Get key insights and practical strategies for securing your cloud with the latest threat intelligence.</p> <dds-card-cta-footer icon-placement="right" cta-type="local" href="https://www.ibm.com/account/reg/signup?formid=urx-53217" slot="footer" aria-hidden="true" target="_self" class="bx--card__footer-icon-size"> <span>Read the report</span> </dds-card-cta-footer> </dds-card-group-item> </dds-card-group> </dds-content-block-cards> <div horizontal-ruler> <dds-hr></dds-hr> </div> </div> </div> </div> </div> </div> </div> </div> <div class="experiencefragment"> <div id="experiencefragment-e718ef75d1" class="cmp-experiencefragment cmp-experiencefragment--security-services"> <div class="xf-content-height"> <div class="root container responsivegrid"> <div id="container-e5b583ab7e" class="cmp-container"> <div class="next-steps container responsivegrid"> <div id="next-steps-242cdb9ce5" class="cmp-container"> <div class="next-steps-container"> <div data-cmp-is="next-steps-container" class="bx--next-steps-container"> <div class="bx--cta-section--g10 bx--cta-section--theme" data-dynamic-content-type="ADOBE_TARGET" data-component-name="next-steps" data-component-identifier="next-steps"> <dds-cta-block no-border class=" cta-block-section__container"> <div role="heading" data-autoid="dds--content-block__heading" class="bx--content-block__heading" slot="heading"> <a data-title="Take the next step" name="Take+the+next+step"></a> <span class="enhanced-title ">Take the next step</span> </div> <dds-content-block-copy size="sm"> <dds-content-block-paragraph> <div class="cms-richtext " id="rich-text-8774c90ea1" data-dynamic-inner-content="description"> <p>IBM cybersecurity services deliver advisory, integration and managed security services and offensive and defensive capabilities. We combine a global team of experts with proprietary and partner technology to co-create tailored security programs that manage risk.</p> </div> </dds-content-block-paragraph> </dds-content-block-copy> <dds-button-group slot="action"> <dds-button-cta href="https://www.ibm.com/services/security" target="_self" kind="primary" cta-type="local"> <span>Explore cybersecurity services</span> </dds-button-cta> <dds-button-cta href="https://www.ibm.com/account/reg/signup?formid=news-urx-52954" target="_blank" kind="tertiary" cta-type="local"> <span>Subscribe to the Think Newsletter</span> </dds-button-cta> </dds-button-group> </dds-cta-block> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </dds-table-of-contents> </div> <div class="container responsivegrid"> <div id="container-b2cbad5bba" class="cmp-container"> </div> </div> <div class="footer"> <dds-footer-container data-cmp-is="footer" data-autoid="dds--footer" class="cmp-footer" data-children-count="0" size="tall"></dds-footer-container> </div> </div> </div> </dds-video-cta-container> <div class="video-modal-overlay" aria-hidden="true"> <div class="video-modal-overlay__dialog"> <div class="video-modal-overlay__dialog--body"> <div class="video-modal-overlay__dialog--body__close-btn"> <svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"> <rect width="24" height="24" fill="white" fill-opacity="0.01" style="mix-blend-mode:multiply"/> <path id="Vector" d="M13.0606 12L19.5 5.56058L18.4394 4.5L12 10.9394L5.56072 4.5L4.5 5.56058L10.9394 12L4.5 18.4394L5.56072 19.5L12 13.0606L18.4394 19.5L19.5 18.4394L13.0606 12Z" fill="#161616"/> </svg> </div> <div class="video-modal-overlay__dialog--body-content"> <div class="video-modal-overlay__loading-container"> <bx-loading></bx-loading> </div> <div class="video-wms hide"> <iframe class="video-modal-content" data-original-src="https://video.ibm.com/embed/$[wmsChanneId]?volume=0&autoplay=true&controls=true" src="" webkitallowfullscreen allowfullscreen frameborder="no" referrerpolicy="no-referrer-when-downgrade"></iframe> </div> <div class="video-media-center hide"> <dds-video-player-container video-id="" aspect-ratio="16x9" auto-play muted playing-mode="inline"></dds-video-player-container> </div> </div> </div> </div> </div> <dds-lightbox-video-player-container></dds-lightbox-video-player-container> <script src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-idlBundle.lc-184f1369edfafb914817c747b0b7778e-lc.min.js"></script> <script src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-target-antiflicker.lc-36a1efb28e947b5873f4a28c2cf9d5eb-lc.min.js"></script> <script src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-idlStyles.lc-f5a7744980f951b41a897229a7802b6f-lc.min.js"></script> <script src="https://www.ibm.com/common/digitaladvisor/cm-app/latest/cm-app.min.js" defer async></script> <script type="module" src="https://1.www.s81c.com/common/carbon/web-components/version/v1.47.1/tag.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon/web-components/version/v1.47.1/code-snippet.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon/web-components/version/v1.47.1/loading.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/leadspace.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-block-horizontal.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-item-horizontal.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/table-of-contents.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/tag-group.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-section.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-group-heading.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-block-simple.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-block-cards.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/cta-block.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-group.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/background-media.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/footer.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/card-group.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/text-cta.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-block.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/link-list.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/link-list-item-cta.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/video-player.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/button-group.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/card-cta-footer.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-item.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/button-cta.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-block-segmented.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/horizontal-rule.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/lightbox-video-player.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/video-cta-container.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon/carbon-for-aem/version/v0.19.0/paragraph.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon/carbon-for-aem/version/v0.19.0/breadcrumb.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon/carbon-for-aem/version/v0.19.0/star-rating.min.js"></script> <script type="module" id="anti-flicker-script"> document.getElementById('anti-flicker-style').remove(); document.getElementById('anti-flicker-script').remove(); </script> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-pdfviewer.lc-e4412705ab74ab8b0e2e21371e0762c9-lc.min.js"></script> <!-- Added for Adobe analytics implementation ADCMS-5834 <script type="text/javascript"> adobeDataLayer.push({ "event": "linkClick", "web": { "webPageDetails": { "URL": document.URL, "name": "home" }, "webInteraction": { "linkClick":"event", "value":"1", "type": "other", "URL": document.URL, "name": "linkClick: " + document.URL } }, }) </script> !--> <!-- Added for Adobe analytics implementation ADCMS-5834 & ADCMS-6152 !--> <script type="text/javascript"> document.addEventListener("DOMContentLoaded", function() { var templatePath = "\/conf\/adobe\u002Dcms\u002Deditable\/settings\/wcm\/templates\/learn"; var templateName = templatePath.split('/').pop(); const currentUrl = document.URL; const parts = currentUrl.split("/"); const sectionOne = parts.length > 3 ? parts[3].split("?")[0] : ""; const sectionTwo = parts.length > 4 ? parts[4].split("?")[0] : ""; const sectionThree = parts.length > 5 ? parts[5].split("?")[0] : ""; function getCookieByName(name) { const cookieArr = document.cookie.split(';'); for (let i = 0; i < cookieArr.length; i++) { const cookie = cookieArr[i].trim(); if (cookie.startsWith(name + "=")) { return cookie.substring(name.length + 1); } } return null; } function cleanUrl(url) { let modifiedUrl = url; if (modifiedUrl.startsWith("www")) { modifiedUrl = modifiedUrl.replace(/^www\.?/, ""); } return modifiedUrl; } const cisSessionId = getCookieByName("CISSESSIONIDP07A"); let loginStatus = cisSessionId ? "logged in" : "logged out"; adobeDataLayer.push({ "event": "pageLoad", "_ibm": { "page": { "siteSection2": sectionTwo, "siteSection3": sectionThree, "pageType": templateName, "domain": cleanUrl(window.location.host), "siteLanguage": "en", "pageName": cleanUrl(window.location.host) + " | " + templateName + " | Social Engineering", "siteCountry": "us" }, "user": { "userAgent": navigator.userAgent, "loginStatus": loginStatus } }, "web": { "webPageDetails": { "pageViews": { "value": 1 }, "URL": document.URL, "name": "Social Engineering", "siteSection": sectionOne }, "webReferrer": { "URL": document.referrer } } }); document.addEventListener('click', function(event) { if (event.target.closest('.WACLauncher__ButtonContainer')) { handleClick(event); } }); function handleClick(event) { adobeDataLayer.push({ "event": "chatInitialized", "_ibm": { "chat": { "chatBotClick": { "value": 1 }, "liveChatType": "Support or Sales", "chatLanguage": "en", "chatCountry": "us" }, "click": { "linkTileNumber": 1 } }, "web": { "webPageDetails": { "URL": document.URL, "name": "Social Engineering" }, "webInteraction": { "name": "chatInitialized", "URL": document.URL, "type": "other" } } }); } }); </script> <script type="text/javascript" src="/wFMLQjOq7Suq/My4Jcp/22I91s/za1hpG0NbzLzEcEO/ZR4HPEILAQ/Sy4kWkA2/Imk"></script><link rel="stylesheet" type="text/css" href="/wFMLQjOq7Suq/My4Jcp/22I91s/wz1h1t/K1F0O0ILAQ/KXkyVH1B/I15X"> <script src="/wFMLQjOq7Suq/My4Jcp/22I91s/wz1h1t/K1F0O0ILAQ/HXh8BTwk/HRQp" async defer></script> <div id="sec-overlay" style="display:none;"> <div id="sec-container"> </div> </div></body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10