CINXE.COM
What Is Cybersecurity? | IBM
<!DOCTYPE HTML> <html lang="en"> <head> <meta charset="UTF-8"/> <meta name="languageCode" content="en"/> <meta name="countryCode" content="us"/> <meta name="searchTitle" content="What Is Cybersecurity?"/> <meta name="focusArea" content="Security - All"/> <title>What Is Cybersecurity? | IBM</title> <script defer="defer" type="text/javascript" src="https://rum.hlx.page/.rum/@adobe/helix-rum-js@%5E2/dist/rum-standalone.js" data-routing="program=131558,environment=1281329,tier=publish"></script> <link rel="icon" href="/content/dam/adobe-cms/default-images/favicon.svg"/> <meta name="keywords" content="Cybersecurity"/> <meta name="description" content="Cybersecurity technology and best practices protect critical systems and sensitive information from an ever-growing volume of continually evolving threats."/> <meta name="template" content="learn"/> <meta name="viewport" content="width=device-width, initial-scale=1"/> <meta name="robots" content="index, follow, max-image-preview:large"/> <meta name="ibm.com.search.appid" content="thinkhub"/> <meta name="ibm.com.search.scopes" content="thinkhub"/> <meta name="dcterms.date" content="2024-08-12T00:00:00.000"/> <meta name="ibm.search.facet.field_hierarchy_01" content="taxonomy : Topics / Cybersecurity"/> <meta name="ibm.search.facet.field_hierarchy_02"/> <meta name="ibm.search.facet.field_hierarchy_03" content="taxonomy : Content Format / Article"/> <meta name="ibm.search.facet.field_hierarchy_04" content="taxonomy : Content Type / Explainer"/> <meta name="ibm.search.facet.field_hierarchy_05"/> <meta name="ibm.search.facet.field_keyword_01" content="Cybersecurity"/> <meta name="ibm.search.facet.field_keyword_09" content="https://prod-cloud-publish.aem.ibm.net/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/38/9c/maas360-pricing-leadspace.component.crop-thumbnail-16-by-9-retina.ts=0.png/content/adobe-cms/us/en/topics/cybersecurity/jcr:content/root/leadspace"/> <meta name="ibm.search.facet.field_keyword_14"/> <meta name="ibm.search.facet.field_text_01" content="12 August 2024"/> <meta name="ibm.search.facet.field_text_03" content="Explainer"/> <link rel="canonical" href="https://www.ibm.com/topics/cybersecurity"/> <style id="anti-flicker-style"> :not(:defined) { visibility: hidden; } </style> <!-- <sly data-sly-test="false"> <link href="//1.www.s81c.com/common/v18/css/www.css" rel="preload" as="style"/> <link rel="stylesheet" href="//1.www.s81c.com/common/v18/css/www.css" media="all"/> <link href="//1.www.s81c.com/common/v18/css/grid-fluid.css" rel="preload" as="style"/> <link rel="stylesheet" href="//1.www.s81c.com/common/v18/css/grid-fluid.css" media="all"/> <link href="//1.www.s81c.com/common/v19a/css/www.css" rel="stylesheet"/> </sly>--> <script src="https://assets.adobedtm.com/0f2de1d5b89a/565c2aeb0d39/launch-560e54b3e83c.min.js" type="text/javascript" async="async"></script> <script type="text/javascript" async="async"> var adobeDataLayer = window.adobeDataLayer || []; </script> <script type="text/javascript"> window.searchKey = { templateName: 'learn', taxonomylist: 'taxonomy : Topics \/ Cybersecurity', L0Tag: 'Topics,Brands,Industries,Geography,Compliance Entities,Products,Events,Computer Languages,Content Format,Series,Content Type,CMaaS Focus Areas,brands,Deployment Types,Product Types,Search Index', } </script> <link rel="alternate" hreflang="ar-sa" href="https://www.ibm.com/sa-ar/topics/cybersecurity"/> <link rel="alternate" hreflang="de-de" href="https://www.ibm.com/de-de/topics/cybersecurity"/> <link rel="alternate" hreflang="en-us" href="https://www.ibm.com/topics/cybersecurity"/> <link rel="alternate" hreflang="ko-kr" href="https://www.ibm.com/kr-ko/topics/cybersecurity"/> <link rel="alternate" hreflang="pt-br" href="https://www.ibm.com/br-pt/topics/cybersecurity"/> <link rel="alternate" hreflang="es-es" href="https://www.ibm.com/es-es/topics/cybersecurity"/> <link rel="alternate" hreflang="zh-cn" href="https://www.ibm.com/cn-zh/topics/cybersecurity"/> <link rel="alternate" hreflang="es-mx" href="https://www.ibm.com/mx-es/topics/cybersecurity"/> <link rel="alternate" hreflang="it-it" href="https://www.ibm.com/it-it/topics/cybersecurity"/> <link rel="alternate" hreflang="id-id" href="https://www.ibm.com/id-id/topics/cybersecurity"/> <link rel="alternate" hreflang="fr-fr" href="https://www.ibm.com/fr-fr/topics/cybersecurity"/> <link rel="alternate" hreflang="ja-jp" href="https://www.ibm.com/jp-ja/topics/cybersecurity"/> <script type="text/javascript"> window.antiFlicker = { active: true, timeout: 3000 } </script> <script type="text/javascript"> var languageCode = document.getElementsByName('languageCode')[0].content; var countryCode = document.getElementsByName('countryCode')[0].content; var focusArea = document.getElementsByName('focusArea')[0].content; /* Define digital data object based on _appInfo object */ window._ibmAnalytics = { settings: { name: "AEM Sites", tealiumProfileName: "aem-sites" }, }; window.digitalData = { page: { category: { primaryCategory: '', }, pageInfo: { language: languageCode + '-' + countryCode, ibm: { siteID: 'MarketingAEM', country: countryCode, messaging: { routing: { focusArea: focusArea, languageCode: languageCode, regionCode: countryCode }, translation: { languageCode: languageCode, regionCode: countryCode } }, sections: 0, patterns: 0, }, carbon: { '@carbon/web-components': 'v1.47.1', '@carbon/ibmdotcom-web-components': 'v1.51.1', 'carbon-for-aem': 'v0.19.0', }, }, }, }; </script> <script type="application/ld+json"> { "@context": "https://schema.org", "@type": "BlogPosting", "mainEntityOfPage": { "@type": "WebPage", "@id": "https://www.ibm.com/topics/cybersecurity" }, "headline": "Cybersecurity", "image": [ "https://www.ibm.com/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/38/9c/maas360-pricing-leadspace.png" ], "datePublished": "", "dateModified": "2024-10-25T21:10:01.726Z", "author": {"@type": "Organization","name": "IBM","url": "https://www.ibm.com"} } </script> <!-- Instana script specific to Dev environment start --> <!-- <script> (function(s,t,a,n){s[t]||(s[t]=a,n=s[a]=function(){n.q.push(arguments)}, n.q=[],n.v=2,n.l=1*new Date)})(window,"InstanaEumObject","ineum"); ineum('reportingUrl', 'https://eum-orange-saas.instana.io'); ineum('key', 'mFJnYtpBSiCKl9zenWHXtg'); ineum('trackSessions'); </script> <script defer crossorigin="anonymous" src=https://eum.instana.io/1.7.2/eum.min.js integrity="sha384-cgeSlevgebehPauohUhsnAeBrpjXzaj94mSv3L2EXjCQH0RRb9xSQ2ErGOWkthIJ"></script>--> <!-- Instana script specific to Dev environment end --> <meta property="og:url" content="https://www.ibm.com/topics/cybersecurity"/> <meta property="og:type" content="website"/> <meta property="og:title" content="What Is Cybersecurity? | IBM"/> <meta property="og:description" content="Cybersecurity technology and best practices protect critical systems and sensitive information from an ever-growing volume of continually evolving threats."/> <meta property="og:image" content="https://assets.ibm.com/is/image/ibm/ibm-8bar-logo-2560x2560?$original$"/> <script src="https://1.www.s81c.com/common/stats/ibm-common.js" type="text/javascript" async="async"></script> <script src="https://hybrid-cloud-widgets-production.s3.us.cloud-object-storage.appdomain.cloud/loader.js" type="application/javascript"></script> <link rel="stylesheet" href="/etc.clientlibs/adobe-cms/clientlibs/clientlib-idlStylesCarbon.lc-92a431776e26f162dd2424f414af0c9a-lc.min.css" type="text/css"> <link rel="stylesheet" href="/etc.clientlibs/adobe-cms/clientlibs/clientlib-idlStyles.lc-781111ab1b5d0bf5e1a3598eac05aba5-lc.min.css" type="text/css"> <link rel="stylesheet" href="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/tag/v1/latest/plex.css"/> <link rel="stylesheet" href="https://1.www.s81c.com/common/carbon/plex/sans.css"/> <link rel="stylesheet" href="/etc.clientlibs/adobe-cms/clientlibs/clientlib-pdfviewer.lc-c79c6cf22a5b660f493131a4be3ded5f-lc.min.css" type="text/css"> </head> <body class="learn-page content-page page basicpage publish" id="learn-page-e1ad7c74b7" data-fullwidthtemplate="false"> <dds-video-cta-container> <div class="root container responsivegrid"> <div id="container-e9b80bd4f1" class="cmp-container"> <div class="masthead"> <c4d-masthead-container data-endpoint="#" auth-method="profile-api" has-contact="true" has-profile has-search has-cart></c4d-masthead-container> <script src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v2.15.0/masthead.min.js" type="module"></script> <script> let l0Json = "{\x22profileMenu\x22:{\x22signedout\x22:[{\x22title\x22:\x22My IBM\x22,\x22url\x22:\x22https:\/\/myibm.ibm.com\/?lnk=mmi\x22},{\x22title\x22:\x22Log in\x22,\x22url\x22:\x22https:\/\/login.ibm.com\/oidc\/endpoint\/default\/authorize?redirect_uri=https%3A%2F%2Fmyibm.ibm.com%2FOIDCHandler.html\x26response_type=token\x26client_id=v18LoginProdCI\x26scope=openid\x26state=https%3A%2F%2Fwww.ibm.com\x26nonce=8675309\x22}],\x22signedin\x22:[{\x22title\x22:\x22My IBM\x22,\x22url\x22:\x22https:\/\/myibm.ibm.com\/?lnk=mmi\x22},{\x22title\x22:\x22Log in\x22,\x22url\x22:\x22https:\/\/login.ibm.com\/oidc\/endpoint\/default\/authorize?redirect_uri=https%3A%2F%2Fmyibm.ibm.com%2FOIDCHandler.html\x26response_type=token\x26client_id=v18LoginProdCI\x26scope=openid\x26state=https%3A%2F%2Fwww.ibm.com\x26nonce=8675309\x22}]},\x22mastheadNav\x22:{\x22links\x22:[{\x22title\x22:\x22Products\x22,\x22url\x22:\x22\x22,\x22submenu\x22:{\x22sections\x22:[{\x22heading\x22:{\x22title\x22:\x22Featured\x22,\x22description\x22:\x22\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22API Connect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/api\u002Dconnect?lnk=flatitem\x22,\x22description\x22:\x22Software to rapidly create, protect, socialize and manage APIs\x22},{\x22title\x22:\x22Concert\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/concert?lnk=flatitem\x22,\x22description\x22:\x22AI to analyze and manage IT infrastructure using natural language\x22},{\x22title\x22:\x22Environmental Intelligence\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/environmental\u002Dintelligence?lnk=flatitem\x22,\x22description\x22:\x22SaaS for predicting and responding to weather and climate events\x22},{\x22title\x22:\x22Envizi\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/envizi?lnk=flatitem\x22,\x22description\x22:\x22ESG data management, reporting and analysis SaaS\x22},{\x22title\x22:\x22FlashSystem\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/flashsystem?lnk=flatitem\x22,\x22description\x22:\x22Primary storage for performance and latency sensitive workloads\x22},{\x22title\x22:\x22Hybrid Cloud Mesh\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/hybrid\u002Dcloud\u002Dmesh?lnk=flatitem\x22,\x22description\x22:\x22SaaS for deploying and managing hybrid and multicloud networks\x22},{\x22title\x22:\x22IBM Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/cloud?lnk=flatitem\x22,\x22description\x22:\x22On\u002Ddemand cloud computing platform and APIs\x22},{\x22title\x22:\x22IBM Z\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/z?lnk=flatitem\x22,\x22description\x22:\x22Flagship mainframe with on\u002Dchip AI and quantum\u002Dsafe cryptography\x22},{\x22title\x22:\x22Instana\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/instana?lnk=flatitem\x22,\x22description\x22:\x22Software for application performance monitoring and automation\x22},{\x22title\x22:\x22MaaS360\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/maas360?lnk=flatitem\x22,\x22description\x22:\x22Unified endpoint management software for many device types\x22},{\x22title\x22:\x22Maximo\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/maximo?lnk=flatitem\x22,\x22description\x22:\x22Software for asset management and related workflows\x22},{\x22title\x22:\x22Planning Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/planning\u002Danalytics?lnk=flatitem\x22,\x22description\x22:\x22Software to automate financial and operational planning\x22},{\x22title\x22:\x22Robotic Process Automation (RPA)\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/robotic\u002Dprocess\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22Software to automate workflows and business processes\x22},{\x22title\x22:\x22Storage Defender\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Ddefender?lnk=flatitem\x22,\x22description\x22:\x22Data resiliency software for threat detection and data recovery\x22},{\x22title\x22:\x22Turbonomic\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/turbonomic?lnk=flatitem\x22,\x22description\x22:\x22Software to manage and optimize IT resource usage\x22},{\x22title\x22:\x22watsonx\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/watsonx?lnk=flatitem\x22,\x22description\x22:\x22AI and data platform\x22},{\x22title\x22:\x22watsonx Assistant\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dassistant?lnk=flatitem\x22,\x22description\x22:\x22Virtual agents customizable to any domain\x22},{\x22title\x22:\x22watsonx Orchestrate\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dorchestrate?lnk=flatitem\x22,\x22description\x22:\x22Personal\u002Dassistant software that automates repetitive tasks\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22AI \x26 machine learning\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/artificial\u002Dintelligence?lnk=flathl\x22,\x22description\x22:\x22Use IBM Watson’s AI or build your own machine learning models\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloud Pak for AIOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Daiops?lnk=flatitem\x22,\x22description\x22:\x22DevOps management tool with AI analysis and recommendations\x22},{\x22title\x22:\x22Cloud Pak for Data\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Ddata?lnk=flatitem\x22,\x22description\x22:\x22Tools for data analysis, organization and management\x22},{\x22title\x22:\x22Knowledge Catalog\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/knowledge\u002Dcatalog?lnk=flatitem\x22,\x22description\x22:\x22SaaS to catalog data, AI models, metadata, policies and more\x22},{\x22title\x22:\x22Watson Discovery\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watson\u002Ddiscovery?lnk=flatitem\x22,\x22description\x22:\x22AI to search in and answer questions about business documents\x22},{\x22title\x22:\x22Watson Natural Language Understanding\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/natural\u002Dlanguage\u002Dunderstanding?lnk=flatitem\x22,\x22description\x22:\x22API for text analysis and metadata extraction\x22},{\x22title\x22:\x22Watson Speech to Text\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/speech\u002Dto\u002Dtext?lnk=flatitem\x22,\x22description\x22:\x22API for real\u002Dtime speech recognition and transcription\x22},{\x22title\x22:\x22Watson Studio\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watson\u002Dstudio?lnk=flatitem\x22,\x22description\x22:\x22IDE to build, run and manage AI models\x22},{\x22title\x22:\x22Watson Text to Speech\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/text\u002Dto\u002Dspeech?lnk=flatitem\x22,\x22description\x22:\x22API for real\u002Dtime text to speech conversion\x22},{\x22title\x22:\x22Z Anomaly Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/z\u002Danomaly\u002Danalytics?lnk=flatitem\x22,\x22description\x22:\x22Operational anomaly detection software for mainframes\x22},{\x22title\x22:\x22watsonx\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/watsonx?lnk=flatitem\x22,\x22description\x22:\x22AI and data platform\x22},{\x22title\x22:\x22watsonx Assistant\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dassistant?lnk=flatitem\x22,\x22description\x22:\x22Virtual agents customizable to any domain\x22},{\x22title\x22:\x22watsonx Code Assistant\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dcode\u002Dassistant?lnk=flatitem\x22,\x22description\x22:\x22AI tool to generate code\x22},{\x22title\x22:\x22watsonx Orders\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dorders?lnk=flatitem\x22,\x22description\x22:\x22AI voice agent for taking restaurant orders\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/analytics?lnk=flathl\x22,\x22description\x22:\x22Aggregate and analyze large datasets\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Business Analytics Enterprise\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/business\u002Danalytics\u002Denterprise?lnk=flatitem\x22,\x22description\x22:\x22Software for business planning and analysis\x22},{\x22title\x22:\x22CPLEX\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ilog\u002Dcplex\u002Doptimization\u002Dstudio?lnk=flatitem\x22,\x22description\x22:\x22Software to build and solve complex optimization models\x22},{\x22title\x22:\x22Cloud Pak for Data\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Ddata?lnk=flatitem\x22,\x22description\x22:\x22Tools for data analysis, organization and management\x22},{\x22title\x22:\x22Cognos Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cognos\u002Danalytics?lnk=flatitem\x22,\x22description\x22:\x22Software for business intelligence and performance management\x22},{\x22title\x22:\x22Databand\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databand?lnk=flatitem\x22,\x22description\x22:\x22Data observability software for data engineers and DataOps teams\x22},{\x22title\x22:\x22InfoSphere Information Server\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/information\u002Dserver?lnk=flatitem\x22,\x22description\x22:\x22Data integration suite for ETL, governance and analysis\x22},{\x22title\x22:\x22Manta Data Lineage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/manta\u002Ddata\u002Dlineage?lnk=flatitem\x22,\x22description\x22:\x22Software to visualize the flow of data from origin to consumption\x22},{\x22title\x22:\x22Netezza\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/netezza?lnk=flatitem\x22,\x22description\x22:\x22Data warehousing and analytics system on custom hardware\x22},{\x22title\x22:\x22Optim\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/infosphere\u002Doptim?lnk=flatitem\x22,\x22description\x22:\x22Software to manage test, production, and archived data\x22},{\x22title\x22:\x22Planning Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/planning\u002Danalytics?lnk=flatitem\x22,\x22description\x22:\x22Software to automate financial and operational planning\x22},{\x22title\x22:\x22SPSS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/spss?lnk=flatitem\x22,\x22description\x22:\x22Software for statistical analysis and business intelligence\x22},{\x22title\x22:\x22Spectrum Computing\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/high\u002Dperformance\u002Dcomputing?lnk=flatitem\x22,\x22description\x22:\x22Software to optimize resources in complex computing clusters\x22},{\x22title\x22:\x22StreamSets\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/streamsets?lnk=flatitem\x22,\x22description\x22:\x22Graphical interface to build and manage streaming data pipelines\x22},{\x22title\x22:\x22Watson Discovery\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watson\u002Ddiscovery?lnk=flatitem\x22,\x22description\x22:\x22AI to search in and answer questions about business documents\x22},{\x22title\x22:\x22Watson Studio\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watson\u002Dstudio?lnk=flatitem\x22,\x22description\x22:\x22IDE to build, run and manage AI models\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Asset lifecycle management\x22,\x22description\x22:\x22Manage and maintain physical assets\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Environmental Intelligence\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/environmental\u002Dintelligence?lnk=flatitem\x22,\x22description\x22:\x22SaaS for predicting and responding to weather and climate events\x22},{\x22title\x22:\x22Envizi\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/envizi?lnk=flatitem\x22,\x22description\x22:\x22ESG data management, reporting and analysis SaaS\x22},{\x22title\x22:\x22Maximo\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/maximo?lnk=flatitem\x22,\x22description\x22:\x22Software for asset management and related workflows\x22},{\x22title\x22:\x22TRIRIGA\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/tririga?lnk=flatitem\x22,\x22description\x22:\x22Software for real estate and workplace management\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Business automation\x22,\x22description\x22:\x22Automate workflows and business processes\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Blueworks Live\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/blueworkslive?lnk=flatitem\x22,\x22description\x22:\x22SaaS for collaboratively modeling business processes\x22},{\x22title\x22:\x22Business Automation Manager Open Editions\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/business\u002Dautomation\u002Dmanager\u002Dopen\u002Deditions?lnk=flatitem\x22,\x22description\x22:\x22Workflow automation and decision management software\x22},{\x22title\x22:\x22Business Automation Workflow\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/business\u002Dautomation\u002Dworkflow?lnk=flatitem\x22,\x22description\x22:\x22Cloud Pak for Business Automation add\u002Don to automate workflows\x22},{\x22title\x22:\x22Cloud Pak for Business Automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Dbusiness\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22Operations management software with AI insights\x22},{\x22title\x22:\x22Datacap\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/data\u002Dcapture\u002Dand\u002Dimaging?lnk=flatitem\x22,\x22description\x22:\x22Document management for IBM Cloud Pak for Business Automation\x22},{\x22title\x22:\x22Event Automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/event\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22No\u002Dcode tool for building automated event driven workflows\x22},{\x22title\x22:\x22FileNet Content Manager\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/filenet\u002Dcontent\u002Dmanager?lnk=flatitem\x22,\x22description\x22:\x22Content management solution for Cloud Pak for Business Automation\x22},{\x22title\x22:\x22Operational Decision Manager\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/operational\u002Ddecision\u002Dmanager?lnk=flatitem\x22,\x22description\x22:\x22Cloud Pak for Business Automation addon for rule\u002Dbased decisions\x22},{\x22title\x22:\x22Process Mining\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/process\u002Dmining?lnk=flatitem\x22,\x22description\x22:\x22Software to extract process data from business applications\x22},{\x22title\x22:\x22Robotic Process Automation (RPA)\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/robotic\u002Dprocess\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22Software to automate workflows and business processes\x22},{\x22title\x22:\x22watsonx Orchestrate\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dorchestrate?lnk=flatitem\x22,\x22description\x22:\x22Personal\u002Dassistant software that automates repetitive tasks\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Containers\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/containers?lnk=flathl\x22,\x22description\x22:\x22Allocate compute infrastructure on demand\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloud Satellite\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/satellite?lnk=flatitem\x22,\x22description\x22:\x22Platform for running managed cloud services on any infrastructure\x22},{\x22title\x22:\x22Code Engine\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/code\u002Dengine?lnk=flatitem\x22,\x22description\x22:\x22Managed serverless runtime for containers, batch jobs, or code\x22},{\x22title\x22:\x22Container Registry\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/container\u002Dregistry?lnk=flatitem\x22,\x22description\x22:\x22Private SaaS registry for container storage and management\x22},{\x22title\x22:\x22Kubernetes Service\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/kubernetes\u002Dservice?lnk=flatitem\x22,\x22description\x22:\x22Managed Kubernetes for high availability container deployments\x22},{\x22title\x22:\x22Red Hat OpenShift on IBM Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/openshift?lnk=flatitem\x22,\x22description\x22:\x22Managed service with tools for security, management and monitoring\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Databases\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/database?lnk=flathl\x22,\x22description\x22:\x22Store, query and analyze structured data\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloudant\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloudant?lnk=flatitem\x22,\x22description\x22:\x22Managed PCI\u002Dcompliant JSON document store on Apache CouchDB\x22},{\x22title\x22:\x22Db2\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/db2\u002Ddatabase?lnk=flatitem\x22,\x22description\x22:\x22Data management software including IBM Db2 Database\x22},{\x22title\x22:\x22Db2 for z\/OS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/db2\u002Dfor\u002Dzos?lnk=flatitem\x22,\x22description\x22:\x22IBM Db2 Database for IBM Z mainframes\x22},{\x22title\x22:\x22IBM Cloud Databases for Elastic Search\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Delasticsearch?lnk=flatitem\x22,\x22description\x22:\x22JSON document store for full\u002Dtext search\x22},{\x22title\x22:\x22IBM Cloud Databases for EnterpriseDB\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Denterprisedb?lnk=flatitem\x22,\x22description\x22:\x22PostgreSQL with added performance, security and management features\x22},{\x22title\x22:\x22IBM Cloud Databases for MongoDB\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Dmongodb?lnk=flatitem\x22,\x22description\x22:\x22Managed NoSQL JSON document store\x22},{\x22title\x22:\x22IBM Cloud Databases for MySQL\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Dmysql?lnk=flatitem\x22,\x22description\x22:\x22Managed SQL database\x22},{\x22title\x22:\x22IBM Cloud Databases for PostgreSQL\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Dpostgresql?lnk=flatitem\x22,\x22description\x22:\x22Managed SQL database with advanced features\x22},{\x22title\x22:\x22IBM Cloud Databases for etcd\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Detcd?lnk=flatitem\x22,\x22description\x22:\x22Distributed key\u002Dvalue store\x22},{\x22title\x22:\x22Information Management System (IMS)\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ims?lnk=flatitem\x22,\x22description\x22:\x22Database and management system for high\u002Dvolume transactions\x22},{\x22title\x22:\x22Informix\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/informix?lnk=flatitem\x22,\x22description\x22:\x22Embeddable database for SQL, NoSQL, time\u002Dseries and spatial data\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22DevOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/devops?lnk=flathl\x22,\x22description\x22:\x22Manage infrastructure, environments and deployments\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Application Delivery Foundation for z\/OS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Ddelivery\u002Dfoundation\u002Dfor\u002Dzos?lnk=flatitem\x22,\x22description\x22:\x22Application development and DevOps tools for z\/OS\x22},{\x22title\x22:\x22Application Discovery and Delivery Intelligence\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Ddiscovery\u002Dand\u002Ddelivery\u002Dintelligence?lnk=flatitem\x22,\x22description\x22:\x22Analysis tool for visualizing applications, data and jobs on z\/OS\x22},{\x22title\x22:\x22Cloud Continuous Delivery\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/continuous\u002Ddelivery?lnk=flatitem\x22,\x22description\x22:\x22Toolchains to automate building and deploying applications\x22},{\x22title\x22:\x22Cloud Pak for AIOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Daiops?lnk=flatitem\x22,\x22description\x22:\x22DevOps management tool with AI analysis and recommendations\x22},{\x22title\x22:\x22DevOps Build\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/devops\u002Dbuild?lnk=flatitem\x22,\x22description\x22:\x22Management tool for configuring and running software builds\x22},{\x22title\x22:\x22DevOps Code ClearCase\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/devops\u002Dcode\u002Dclearcase?lnk=flatitem\x22,\x22description\x22:\x22Configuration management system for software asset access control\x22},{\x22title\x22:\x22DevOps Deploy\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/devops\u002Ddeploy?lnk=flatitem\x22,\x22description\x22:\x22Automation software for continuous delivery and deployment\x22},{\x22title\x22:\x22DevOps Test\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/devops\u002Dtest?lnk=flatitem\x22,\x22description\x22:\x22Continuous testing and virtualization platform\x22},{\x22title\x22:\x22DevOps Velocity\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/devops\u002Dvelocity?lnk=flatitem\x22,\x22description\x22:\x22Release management software for pipeline orchestration and analytics\x22},{\x22title\x22:\x22Engineering Lifecycle Management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/engineering\u002Dlifecycle\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22Software for product and application lifecycle management\x22},{\x22title\x22:\x22IBM i Modernization Engine\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ibm\u002Di\u002Dmerlin?lnk=flatitem\x22,\x22description\x22:\x22Development and modernization tools for IBM i applications\x22},{\x22title\x22:\x22Rational ClearQuest\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/rational\u002Dclearquest?lnk=flatitem\x22,\x22description\x22:\x22Change management software\x22},{\x22title\x22:\x22Rational Software Architect Designer\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/rational\u002Dsoftware\u002Darchitect\u002Ddesigner?lnk=flatitem\x22,\x22description\x22:\x22Tools to create, evaluate, and communicate software architecture\x22},{\x22title\x22:\x22Test Accelerator for Z\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/test\u002Daccelerator\u002Dz?lnk=flatitem\x22,\x22description\x22:\x22Test automation and test generation framework for z\/OS\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22IT automation\x22,\x22description\x22:\x22Automate IT infrastructure management\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Apptio\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/apptio?lnk=flatitem\x22,\x22description\x22:\x22Hybrid cloud financial management and planning software\x22},{\x22title\x22:\x22Cloud App Configuration\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Dconfiguration?lnk=flatitem\x22,\x22description\x22:\x22Feature management and configuration service for web and mobile apps\x22},{\x22title\x22:\x22Cloud App ID\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Did?lnk=flatitem\x22,\x22description\x22:\x22Authentication and user management service for web and mobile apps\x22},{\x22title\x22:\x22Cloud Monitoring\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dmonitoring?lnk=flatitem\x22,\x22description\x22:\x22Hosted monitoring tool for organization\u002Dwide system performance\x22},{\x22title\x22:\x22Cloud Pak for AIOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Daiops?lnk=flatitem\x22,\x22description\x22:\x22DevOps management tool with AI analysis and recommendations\x22},{\x22title\x22:\x22Cloud Schematics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/schematics?lnk=flatitem\x22,\x22description\x22:\x22Management and provisionining of cloud infrastructure with code\x22},{\x22title\x22:\x22Concert\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/concert?lnk=flatitem\x22,\x22description\x22:\x22AI to analyze and manage IT infrastructure using natural language\x22},{\x22title\x22:\x22Event Notifications\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/event\u002Dnotifications?lnk=flatitem\x22,\x22description\x22:\x22Notification and workflow automation service for IBM Cloud events\x22},{\x22title\x22:\x22Flexera One\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/flexera\u002Done?lnk=flatitem\x22,\x22description\x22:\x22IT asset management software\x22},{\x22title\x22:\x22IBM Cloud Logs\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dlogs?lnk=flatitem\x22,\x22description\x22:\x22Logging and observability service for applications and infrastructure\x22},{\x22title\x22:\x22Instana\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/instana?lnk=flatitem\x22,\x22description\x22:\x22Software for application performance monitoring and automation\x22},{\x22title\x22:\x22Turbonomic\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/turbonomic?lnk=flatitem\x22,\x22description\x22:\x22Software to manage and optimize IT resource usage\x22},{\x22title\x22:\x22Z IntelliMagic Vision for z\/OS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/z\u002Dintellimagic\u002Dvision\u002Dfor\u002Dzos?lnk=flatitem\x22,\x22description\x22:\x22Infrastructure performance management and monitoring software\x22},{\x22title\x22:\x22Z Service Management Suite\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/z\u002Dservice\u002Dmanagement\u002Dsuite?lnk=flatitem\x22,\x22description\x22:\x22Monitoring, control, and automation suite for Z\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Middleware\x22,\x22description\x22:\x22Connect your applications, data and events\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22API Connect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/api\u002Dconnect?lnk=flatitem\x22,\x22description\x22:\x22Software to rapidly create, protect, socialize and manage APIs\x22},{\x22title\x22:\x22App Connect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Dconnect?lnk=flatitem\x22,\x22description\x22:\x22Codeless connectors for your data, apps and APIs\x22},{\x22title\x22:\x22Aspera\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/aspera?lnk=flatitem\x22,\x22description\x22:\x22System to transfer, sync or stream huge data globally\x22},{\x22title\x22:\x22CICS Transaction Server for z\/OS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cics\u002Dtransaction\u002Dserver?lnk=flatitem\x22,\x22description\x22:\x22Application server for online transaction processing\x22},{\x22title\x22:\x22Cloud Pak for Applications\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Dapplications?lnk=flatitem\x22,\x22description\x22:\x22Kubernetes\u002Dbased platform for hybrid cloud applications\x22},{\x22title\x22:\x22Cloud Pak for Integration\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Dintegration?lnk=flatitem\x22,\x22description\x22:\x22Tools to connect all of your apps, data and events\x22},{\x22title\x22:\x22DataPower\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/datapower\u002Dgateway?lnk=flatitem\x22,\x22description\x22:\x22Physical or virtual multi\u002Dprotocol network gateway\x22},{\x22title\x22:\x22Event Streams\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/event\u002Dstreams?lnk=flatitem\x22,\x22description\x22:\x22PaaS stream processing based on Apache Kafka\x22},{\x22title\x22:\x22IBM Cloud Messages for RabbitMQ\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/messages\u002Dfor\u002Drabbitmq?lnk=flatitem\x22,\x22description\x22:\x22Managed open\u002Dsource message broker\x22},{\x22title\x22:\x22IBM webMethods\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/webmethods?lnk=flatitem\x22,\x22description\x22:\x22iPaaS capabilities including app integration, API management, B2B integration and managed file transfer\x22},{\x22title\x22:\x22Information Management System\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ims?lnk=flatitem\x22,\x22description\x22:\x22Hierarchical database and transaction processor for Z\x22},{\x22title\x22:\x22MQ\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/mq?lnk=flatitem\x22,\x22description\x22:\x22Software and hardware for messaging between distributed systems\x22},{\x22title\x22:\x22z\/OS Connect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/zos\u002Dconnect?lnk=flatitem\x22,\x22description\x22:\x22Software to build and serve RESTful APIs to z\/OS applications\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Network\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/networking?lnk=flathl\x22,\x22description\x22:\x22Run and manage public, private and virtual networks\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloud Pak for Network Automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Dnetwork\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22Management software for telco network operations\x22},{\x22title\x22:\x22Hybrid Cloud Mesh\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/hybrid\u002Dcloud\u002Dmesh?lnk=flatitem\x22,\x22description\x22:\x22SaaS for deploying and managing hybrid and multicloud networks\x22},{\x22title\x22:\x22NS1 Connect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ns1\u002Dconnect?lnk=flatitem\x22,\x22description\x22:\x22Authoritative DNS and traffic steering as a service\x22},{\x22title\x22:\x22Rapid Network Automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/rapid\u002Dnetwork\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22No\u002Dcode tool to build automation workflows across apps and APIs\x22},{\x22title\x22:\x22SevOne Network Performance Management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/sevone\u002Dnetwork\u002Dperformance\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22Software to collect and analyze network performance data\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Operating systems\x22,\x22description\x22:\x22Run critical workloads on specialized operating systems\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22AIX\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/aix?lnk=flatitem\x22,\x22description\x22:\x22UNIX operating system for Power servers\x22},{\x22title\x22:\x22IBM i\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ibm\u002Di?lnk=flatitem\x22,\x22description\x22:\x22Integrated operating system for Power servers\x22},{\x22title\x22:\x22Linux\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/linux?lnk=flatitem\x22,\x22description\x22:\x22Run Linux workloads on IBM servers\x22},{\x22title\x22:\x22z\/OS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/zos?lnk=flatitem\x22,\x22description\x22:\x22Flagship OS for continuous, high\u002Dvolume mainframe operation\x22},{\x22title\x22:\x22z\/TPF\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/z\u002Dtransaction\u002Dprocessing\u002Dfacility?lnk=flatitem\x22,\x22description\x22:\x22Real\u002Dtime operating system for mainframes\x22},{\x22title\x22:\x22z\/VM\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/zvm?lnk=flatitem\x22,\x22description\x22:\x22Hypervisor and virtualization software for IBM Z and LinuxONE\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Quantum\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/quantum?lnk=flathl\x22,\x22description\x22:\x22Run code on real quantum systems using a full\u002Dstack SDK\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Qiskit Runtime\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/quantum\/qiskit?lnk=flatitem\x22,\x22description\x22:\x22Cloud service for executing quantum workloads at scale\x22},{\x22title\x22:\x22Quantum Safe\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/quantum\/quantum\u002Dsafe?lnk=flatitem\x22,\x22description\x22:\x22Technology and consulting services for quantum\u002Dsafe cryptography\x22},{\x22title\x22:\x22Quantum Systems\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/quantum\/technology?lnk=flatitem\x22,\x22description\x22:\x22Quantum computing systems accessible on the cloud\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Security \x26 identity\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/security?lnk=flathl\x22,\x22description\x22:\x22Cloud\u002Dnative software to secure resources and simplify compliance\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloud AppID\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Did?lnk=flatitem\x22,\x22description\x22:\x22Authentication and user profiles as a service for mobile and web apps\x22},{\x22title\x22:\x22Cloud Security and Compliance Center\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/security\u002Dand\u002Dcompliance\u002Dcenter?lnk=flatitem\x22,\x22description\x22:\x22SaaS to define and audit the compliance posture of your cloud\x22},{\x22title\x22:\x22Data Security Broker\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/data\u002Dsecurity\u002Dbroker?lnk=flatitem\x22,\x22description\x22:\x22Administrative console to enable data encryption in the cloud\x22},{\x22title\x22:\x22Guardium\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/guardium?lnk=flatitem\x22,\x22description\x22:\x22Suite for data encryption, management and simplified compliance\x22},{\x22title\x22:\x22Key Protect for IBM Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/key\u002Dprotect?lnk=flatitem\x22,\x22description\x22:\x22Tool to provision and store keys for apps across IBM Cloud services\x22},{\x22title\x22:\x22MaaS360\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/maas360?lnk=flatitem\x22,\x22description\x22:\x22Unified endpoint management for mobile workforces\x22},{\x22title\x22:\x22QRadar EDR\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/qradar\u002Dedr?lnk=flatitem\x22,\x22description\x22:\x22Advanced AI threat detection and response for endpoints\x22},{\x22title\x22:\x22QRadar SIEM\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/qradar\u002Dsiem?lnk=flatitem\x22,\x22description\x22:\x22Threat detection and prioritization for real\u002Dtime visibility\x22},{\x22title\x22:\x22QRadar SOAR\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/qradar\u002Dsoar?lnk=flatitem\x22,\x22description\x22:\x22Automation and workflow management for security operations\x22},{\x22title\x22:\x22Trusteer\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/trusteer?lnk=flatitem\x22,\x22description\x22:\x22Software to authenticate customers, detect fraud and assess risk\x22},{\x22title\x22:\x22Verify\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/verify?lnk=flatitem\x22,\x22description\x22:\x22Identity, authentication, and access control software\x22},{\x22title\x22:\x22zSecure\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/zsecure?lnk=flatitem\x22,\x22description\x22:\x22Security, risk management and compliance tools for Z hardware\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Servers\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/servers?lnk=flathl\x22,\x22description\x22:\x22Run workloads on hybrid cloud infrastructure\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22IBM Cloud Bare Metal Servers\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/bare\u002Dmetal\u002Dservers?lnk=flatitem\x22,\x22description\x22:\x22Dedicated hardware for maximum performance\x22},{\x22title\x22:\x22IBM Cloud Virtual Servers for VPC\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/virtual\u002Dservers?lnk=flatitem\x22,\x22description\x22:\x22Virtual servers with Intel Xeon or IBM Z CPUs\x22},{\x22title\x22:\x22LinuxONE 4\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/linuxone\u002D4?lnk=flatitem\x22,\x22description\x22:\x22Physical and virtual servers for running Linux\x22},{\x22title\x22:\x22Power\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/power?lnk=flatitem\x22,\x22description\x22:\x22Physical and virtual servers with IBM Power CPUs\x22},{\x22title\x22:\x22z16\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/z16?lnk=flatitem\x22,\x22description\x22:\x22Flagship mainframe with on\u002Dchip AI and quantum\u002Dsafe cryptography\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/storage?lnk=flathl\x22,\x22description\x22:\x22Software, hardware and services for critical and operational workloads and data\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Ceph\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dceph?lnk=flatitem\x22,\x22description\x22:\x22Multi\u002Dprotocol software\u002Ddefined enterprise storage platform\x22},{\x22title\x22:\x22Cloud Block Storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/block\u002Dstorage?lnk=flatitem\x22,\x22description\x22:\x22Managed service optimized for low latency and high transfer rates\x22},{\x22title\x22:\x22Cloud File Storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/file\u002Dstorage?lnk=flatitem\x22,\x22description\x22:\x22Managed service for flash\u002Dbacked, durable, NFS\u002Dbased file storage\x22},{\x22title\x22:\x22Cloud Object Storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dobject\u002Dstorage?lnk=flatitem\x22,\x22description\x22:\x22Unstructured data storage accessible via cloud APIs\x22},{\x22title\x22:\x22DS8000\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ds8000?lnk=flatitem\x22,\x22description\x22:\x22High\u002Dcapacity, high\u002Davailability mainframe storage system\x22},{\x22title\x22:\x22Defender\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Ddefender?lnk=flatitem\x22,\x22description\x22:\x22Data resiliency software for threat detection and data recovery\x22},{\x22title\x22:\x22FlashSystem\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/flashsystem?lnk=flatitem\x22,\x22description\x22:\x22All\u002Dflash array with performance and capacity for any workload\x22},{\x22title\x22:\x22Fusion\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dfusion?lnk=flatitem\x22,\x22description\x22:\x22Container\u002Dnative storage and data orchestration for OpenShift\x22},{\x22title\x22:\x22Insights\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dinsights?lnk=flatitem\x22,\x22description\x22:\x22Storage AIOps for metrics\u002Dpowered analysis and decisions\x22},{\x22title\x22:\x22Protect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dprotect?lnk=flatitem\x22,\x22description\x22:\x22Data resiliency, backup and recovery delivered via SaaS\x22},{\x22title\x22:\x22Protect for Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dprotect\u002Dfor\u002Dcloud?lnk=flatitem\x22,\x22description\x22:\x22Backup and recovery SaaS for data in public cloud services\x22},{\x22title\x22:\x22SAN Switches\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/storage\u002Darea\u002Dnetwork?lnk=flatitem\x22,\x22description\x22:\x22Scalable and highly available storage area network solutions\x22},{\x22title\x22:\x22Scale\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dscale?lnk=flatitem\x22,\x22description\x22:\x22Software defined storage for AI and high performance workloads\x22},{\x22title\x22:\x22Scale System\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dscale\u002Dsystem?lnk=flatitem\x22,\x22description\x22:\x22All\u002Dflash or hybrid performant storage for cloud scale use\u002Dcases\x22},{\x22title\x22:\x22Tape Systems\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/tape\u002Dstorage?lnk=flatitem\x22,\x22description\x22:\x22Software and hardware for encrypted and air\u002Dgapped archives\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Supply chain\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/supply\u002Dchain?lnk=flathl\x22,\x22description\x22:\x22Manage the flow of goods and services\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Sterling Order and Fulfillment Suite\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/order\u002Dfulfillment\u002Dsuite?lnk=flatitem\x22,\x22description\x22:\x22Complete order management system with AI and machine learning\x22},{\x22title\x22:\x22Sterling Supply Chain Intelligence Suite\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/supply\u002Dchain\u002Dintelligence\u002Dsuite?lnk=flatitem\x22,\x22description\x22:\x22Software for supply chain optimization and automation\x22}]}]}],\x22viewAll\x22:{\x22title\x22:\x22View all products\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\x22}}},{\x22title\x22:\x22Solutions\x22,\x22url\x22:\x22\x22,\x22submenu\x22:{\x22sections\x22:[{\x22heading\x22:{\x22title\x22:\x22Automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/automation?lnk=flathl\x22,\x22description\x22:\x22Intelligent automation for business and IT operations\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22AIOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/aiops?lnk=flatitem\x22,\x22description\x22:\x22Enable proactive, continuous application performance management\x22},{\x22title\x22:\x22Application delivery\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/application\u002Ddelivery?lnk=flatitem\x22,\x22description\x22:\x22Modernize applications and deliver new cloud\u002Dnative applications\x22},{\x22title\x22:\x22Application performance management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/application\u002Dperformance\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22Bridge observability and automated resource management\x22},{\x22title\x22:\x22Business automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/business\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22Deliver intelligent automation solutions quickly with low\u002Dcode\x22},{\x22title\x22:\x22Cloud cost management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/cloud\u002Dcost\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22Optimize performance at the lowest cost and align business value\x22},{\x22title\x22:\x22Decision management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/decision\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22Model, manage and automate repeatable business processes\x22},{\x22title\x22:\x22DevOps automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/devops\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22Automate your software delivery process\x22},{\x22title\x22:\x22Enterprise content management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/enterprise\u002Dcontent\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22Accelerate information management and governance processes\x22},{\x22title\x22:\x22FinOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/finops?lnk=flatitem\x22,\x22description\x22:\x22Manage the variable economics of cloud infrastructure\x22},{\x22title\x22:\x22Integration\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/integration?lnk=flatitem\x22,\x22description\x22:\x22Connect applications and systems to unlock critical data\x22},{\x22title\x22:\x22License compliance\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/license\u002Dcompliance?lnk=flatitem\x22,\x22description\x22:\x22Reduce compliance risks with application resource management\x22},{\x22title\x22:\x22Networking\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/networking?lnk=flatitem\x22,\x22description\x22:\x22Automate network configuration, provisioning and troubleshooting\x22},{\x22title\x22:\x22Workflow\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/workflow?lnk=flatitem\x22,\x22description\x22:\x22Increase productivity by streamlining processes and tasks\x22},{\x22title\x22:\x22iPaaS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/ipaas?lnk=flatitem\x22,\x22description\x22:\x22Deliver connectivity across all your apps and data\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Data \x26 AI\x22,\x22description\x22:\x22Optimize your data strategy to support data\u002Ddriven decisions\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22AI\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/artificial\u002Dintelligence?lnk=flatitem\x22,\x22description\x22:\x22Artificial intelligence solutions built with industry expertise\x22},{\x22title\x22:\x22AI ethics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/impact\/ai\u002Dethics?lnk=flatitem\x22,\x22description\x22:\x22Trustworthy, transparent AI with a multidimensional approach\x22},{\x22title\x22:\x22Customer experience\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/ai\u002Dcustomer\u002Dservice?lnk=flatitem\x22,\x22description\x22:\x22Build a full\u002Dservice AI chatbot that integrates with your CRM\x22},{\x22title\x22:\x22Data fabric\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/data\u002Dfabric?lnk=flatitem\x22,\x22description\x22:\x22Automate data discovery, governance and consumption\x22},{\x22title\x22:\x22Data lake\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/data\u002Dlake?lnk=flatitem\x22,\x22description\x22:\x22Analyze structured, semi\u002Dstructured and unstructured data\x22},{\x22title\x22:\x22Data management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/data\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22Consistent data access and delivery across apps and domains\x22},{\x22title\x22:\x22Data quality\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/data\u002Dquality?lnk=flatitem\x22,\x22description\x22:\x22Robust tools help identify, understand and correct data flaws\x22},{\x22title\x22:\x22Data science\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/data\u002Dscience?lnk=flatitem\x22,\x22description\x22:\x22Operationalize data science models on any cloud\x22},{\x22title\x22:\x22Data warehouse\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/data\u002Dwarehouse?lnk=flatitem\x22,\x22description\x22:\x22A flexible foundation optimized for data from disparate sources\x22},{\x22title\x22:\x22DataOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/dataops?lnk=flatitem\x22,\x22description\x22:\x22Develop a coordinated overview of the data acquisition journey\x22},{\x22title\x22:\x22Master data management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/master\u002Ddata\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22A trusted, 360\u002Ddegree view of master data across the enterprise\x22},{\x22title\x22:\x22Prescriptive analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/prescriptive\u002Danalytics?lnk=flatitem\x22,\x22description\x22:\x22Use optimization technology to solve complex decisions\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Industry\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries?lnk=flathl\x22,\x22description\x22:\x22Customized, end\u002Dto\u002Dend, AI\u002Dpowered solutions for your industry\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Automotive\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/automotive?lnk=flatitem\x22,\x22description\x22:\x22Shift focus to connected vehicles and digital services\x22},{\x22title\x22:\x22Banking\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/banking\u002Dfinancial\u002Dmarkets?lnk=flatitem\x22,\x22description\x22:\x22Create compliant, customer\u002Dcentric banking experiences\x22},{\x22title\x22:\x22Consumer goods\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/consumer\u002Dgoods?lnk=flatitem\x22,\x22description\x22:\x22Infuse agility and automation into operations and supply chains\x22},{\x22title\x22:\x22Energy \x26 utilities\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/energy?lnk=flatitem\x22,\x22description\x22:\x22Get your utility ready for the new, sustainable energy ecosystem\x22},{\x22title\x22:\x22Government\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/government?lnk=flatitem\x22,\x22description\x22:\x22Support citizens with greater speed and confidence\x22},{\x22title\x22:\x22Healthcare\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/healthcare?lnk=flatitem\x22,\x22description\x22:\x22Navigate a more interconnected, data\u002Drich healthcare ecosystem\x22},{\x22title\x22:\x22Insurance\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/insurance?lnk=flatitem\x22,\x22description\x22:\x22Improve operations and customer experiences at speed and scale\x22},{\x22title\x22:\x22Life Sciences\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/life\u002Dsciences?lnk=flatitem\x22,\x22description\x22:\x22Accelerate product innovation and drive patient centricity\x22},{\x22title\x22:\x22Manufacturing\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/manufacturing?lnk=flatitem\x22,\x22description\x22:\x22Digitally transform traditional manufacturing processes\x22},{\x22title\x22:\x22Retail\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/retail?lnk=flatitem\x22,\x22description\x22:\x22Meet changing consumer needs with new retail business models\x22},{\x22title\x22:\x22Telecommunications\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/telecommunications?lnk=flatitem\x22,\x22description\x22:\x22Achieve a more flexible, seamless network architecture\x22},{\x22title\x22:\x22Travel\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/travel\u002Dtransportation?lnk=flatitem\x22,\x22description\x22:\x22Restore traveler trust and increase operational efficiency\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Infrastructure\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/it\u002Dinfrastructure?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Backup \x26 recovery\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/backup\u002Drecovery?lnk=flatitem\x22,\x22description\x22:\x22Comprehensive data resilience for physical and virtual servers\x22},{\x22title\x22:\x22Edge computing\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/edge\u002Dcomputing?lnk=flatitem\x22,\x22description\x22:\x22Manage workloads from edge to core across any hybrid multicloud\x22},{\x22title\x22:\x22High performance computing (HPC)\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/high\u002Dperformance\u002Dcomputing?lnk=flatitem\x22,\x22description\x22:\x22HPC infrastructure for advanced and data\u002Dintensive workloads\x22},{\x22title\x22:\x22Hybrid cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/hybrid\u002Dcloud?lnk=flatitem\x22,\x22description\x22:\x22Use a common platform across cloud, on\u002Dprem and edge environments\x22},{\x22title\x22:\x22IT modernization\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/infrastructure\u002Dmodernization?lnk=flatitem\x22,\x22description\x22:\x22Modernize legacy IT in place with containerized microservices\x22},{\x22title\x22:\x22Mainframe application modernization\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/mainframe\u002Dapplication\u002Dmodernization?lnk=flatitem\x22,\x22description\x22:\x22Apply modern development and DevOps tools to mainframe applications\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Security\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/security?lnk=flathl\x22,\x22description\x22:\x22Enterprise cybersecurity for today’s hybrid cloud environments\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloud security\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/cloud\u002Dsecurity?lnk=flatitem\x22,\x22description\x22:\x22Trust IBM Cloud security for data protection and compliance\x22},{\x22title\x22:\x22Data security\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/data\u002Dsecurity?lnk=flatitem\x22,\x22description\x22:\x22Meet data privacy regulations and simplify operational complexity\x22},{\x22title\x22:\x22Insider threat\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/insider\u002Dthreat?lnk=flatitem\x22,\x22description\x22:\x22Protection from malicious or unintentional threats from insiders\x22},{\x22title\x22:\x22Ransomware\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/ransomware?lnk=flatitem\x22,\x22description\x22:\x22Proactively manage cyber risks to reduce the impact of attacks\x22},{\x22title\x22:\x22Threat detection and response\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/threat\u002Ddetection\u002Dresponse?lnk=flatitem\x22,\x22description\x22:\x22Accelerate and streamline responses across the attack lifecycle\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Sustainability\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/sustainability?lnk=flathl\x22,\x22description\x22:\x22Embed sustainability into your business transformation\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Asset lifecycle management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/maximo\/sustainability?lnk=flatitem\x22,\x22description\x22:\x22Optimize performance, extend asset lifecycles and reduce downtime\x22},{\x22title\x22:\x22ESG reporting\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/envizi?lnk=flatitem\x22,\x22description\x22:\x22Data foundation to streamline meeting ESG reporting requirements\x22},{\x22title\x22:\x22Facilities management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/tririga\/sustainability?lnk=flatitem\x22,\x22description\x22:\x22A single source of truth to manage your corporate real estate\x22},{\x22title\x22:\x22IT sustainability\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/turbonomic\/sustainability?lnk=flatitem\x22,\x22description\x22:\x22Software to estimate infrastructure resource consumption\x22},{\x22title\x22:\x22Supply chain\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/supply\u002Dchain?lnk=flatitem\x22,\x22description\x22:\x22Build supply chain resiliency with intelligent automation\x22},{\x22title\x22:\x22Weather Risk Management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/environmental\u002Dintelligence\u002Dsuite\/sustainability?lnk=flatitem\x22,\x22description\x22:\x22Manage the economic impact of weather and climate on your business\x22}]}]}],\x22viewAll\x22:{\x22title\x22:\x22\x22,\x22url\x22:\x22\x22}}},{\x22title\x22:\x22Consulting\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/consulting?lnk=L0G\x22},{\x22title\x22:\x22Support\x22,\x22url\x22:\x22\x22,\x22submenu\x22:{\x22sections\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22What\x27s New\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/new?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Community\x22,\x22url\x22:\x22https:\/\/community.ibm.com\/community\/user\/community?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Developer\x22,\x22url\x22:\x22https:\/\/developer.ibm.com\/?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Call for Code\x22,\x22url\x22:\x22https:\/\/developer.ibm.com\/callforcode\/?lnk=flatitem\x22},{\x22title\x22:\x22Generative AI\x22,\x22url\x22:\x22https:\/\/developer.ibm.com\/generative\u002Dai\u002Dfor\u002Ddevelopers\/?lnk=flatitem\x22},{\x22title\x22:\x22Open Source @ IBM\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/opensource\/?lnk=flatitem\x22},{\x22title\x22:\x22Products\x22,\x22url\x22:\x22https:\/\/developer.ibm.com\/components\/?lnk=flatitem\x22},{\x22title\x22:\x22Technologies\x22,\x22url\x22:\x22https:\/\/developer.ibm.com\/technologies\/?lnk=flatitem\x22}]},{\x22heading\x22:{\x22title\x22:\x22Documentation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/docs\/en?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22All product documentation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/docs\/en?lnk=flatitem\x22},{\x22title\x22:\x22IBM Cloud documentation\x22,\x22url\x22:\x22https:\/\/cloud.ibm.com\/docs?lnk=flatitem\x22},{\x22title\x22:\x22IBM Redbooks\x22,\x22url\x22:\x22https:\/\/www.redbooks.ibm.com\/?lnk=flatitem\x22}]},{\x22heading\x22:{\x22title\x22:\x22IBM Cloud platform support\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/cloud\/support?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Implementation\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Expert Labs\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/expertlabs?lnk=flatitem\x22}]},{\x22heading\x22:{\x22title\x22:\x22Support\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/mysupport\/s\/?language=en_US\x26lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Download fixes, updates \x26 drivers\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/support\/fixcentral?lnk=flatitem\x22},{\x22title\x22:\x22Download licensed software \u002D Passport Advantage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/software\/passportadvantage\/pao_customer.html?lnk=flatitem\x22},{\x22title\x22:\x22IBM Software Licensing\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/about\/software\u002Dlicensing\/?lnk=flatitem\x22},{\x22title\x22:\x22Open a case\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/mysupport\/s\/redirecttoopencasepage?lnk=flatitem\x22},{\x22title\x22:\x22View more\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/mysupport\/s\/?language=en_US\x26lnk=flatitem\x22},{\x22title\x22:\x22View support plans\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/support\/pages\/ibm\u002Dsupport\u002Dofferings?lnk=flatitem\x22},{\x22title\x22:\x22View your cases\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/mysupport\/s\/my\u002Dcases?lnk=flatitem\x22}]},{\x22heading\x22:{\x22title\x22:\x22Technology Lifecycle Services\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/services\/technology\u002Dlifecycle\u002Dservices?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Enterprise networking and security\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/services\/networking\u002Dsupport?lnk=flatitem\x22},{\x22title\x22:\x22Servers and storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/services\/systems\u002Dsupport?lnk=flatitem\x22},{\x22title\x22:\x22Software\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/services\/software\u002Dsupport?lnk=flatitem\x22}]},{\x22heading\x22:{\x22title\x22:\x22Training\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/training\/?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Courses\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/training\/search?q=course\x26lnk=flatitem\x22},{\x22title\x22:\x22Digital learning subscriptions\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/training\/subscriptions?lnk=flatitem\x22},{\x22title\x22:\x22Learning paths \x26 collections\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/training\/learning\u002Dpaths\u002Dand\u002Dcollections?lnk=flatitem\x22},{\x22title\x22:\x22Professional certifications\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/training\/credentials?lnk=flatitem\x22}]}]}],\x22viewAll\x22:{\x22title\x22:\x22\x22,\x22url\x22:\x22\x22}}},{\x22title\x22:\x22Think\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think?lnk=L0G\x22}]}}"; const searchPlaceholderText = "Search all of IBM"; const links = JSON.parse(l0Json).mastheadNav.links; const unAuthenticated = JSON.parse(l0Json).profileMenu.signedout; const authenticated = JSON.parse(l0Json).profileMenu.signedin; const mastheadContainerEl = document.querySelector('c4d-masthead-container'); mastheadContainerEl.navLinks = links; mastheadContainerEl.unauthenticatedProfileItems = unAuthenticated; mastheadContainerEl.authenticatedProfileItems = authenticated; const appendSearchPlaceholderText = () => { const typeheadEl = mastheadContainerEl.querySelector('c4d-search-with-typeahead'); if (typeheadEl) { typeheadEl.searchPlaceholder = searchPlaceholderText; observer.disconnect(); } } let observer = new MutationObserver(appendSearchPlaceholderText); observer.observe(mastheadContainerEl, {subtree: true, childList: true}); </script> <script> var json = "{\x22title\x22:\x22Think\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\x22,\x22menuItems\x22:[{\x22title\x22:\x22Artificial intelligence\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/artificial\u002Dintelligence\x22},{\x22title\x22:\x22Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/cloud\x22},{\x22title\x22:\x22Security\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/security\x22},{\x22title\x22:\x22Sustainability\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/sustainability\x22},{\x22title\x22:\x22Blog\x22,\x22submenu\x22:{\x22columns\x22:2,\x22footer\x22:{\x22title\x22:\x22View all blog posts\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/\x22},\x22menuSections\x22:[{\x22span\x22:1,\x22heading\x22:{\x22headingLevel\x22:2,\x22title\x22:\x22Categories\x22},\x22items\x22:[{\x22title\x22:\x22Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/analytics\/\x22},{\x22title\x22:\x22Artificial intelligence\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/artificial\u002Dintelligence\/\x22},{\x22title\x22:\x22Automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/automation\/\x22},{\x22title\x22:\x22Business transformation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/business\u002Dtransformation\/\x22},{\x22title\x22:\x22Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/cloud\/\x22},{\x22title\x22:\x22Security\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/security\/\x22},{\x22title\x22:\x22Social impact\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/social\u002Dimpact\/\x22},{\x22title\x22:\x22Supply chain\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/supply\u002Dchain\/\x22},{\x22title\x22:\x22Sustainability\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/sustainability\/\x22}]},{\x22span\x22:1,\x22heading\x22:{\x22headingLevel\x22:2,\x22title\x22:\x22Industries\x22},\x22items\x22:[{\x22title\x22:\x22Energy and utilities\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/energy\u002Dand\u002Dutilities\/\x22},{\x22title\x22:\x22Financial services\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/financial\u002Dservices\/\x22},{\x22title\x22:\x22Government\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/government\/\x22},{\x22title\x22:\x22Healthcare\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/healthcare\/\x22},{\x22title\x22:\x22Manufacturing\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/manufacturing\/\x22},{\x22title\x22:\x22Media and entertainment\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/media\u002Dand\u002Dentertainment\/\x22},{\x22title\x22:\x22Mining and extraction\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/mining\u002Dand\u002Dextraction\/\x22},{\x22title\x22:\x22Technology\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/technology\/\x22},{\x22title\x22:\x22Telecommunications\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/telecommunications\/\x22},{\x22title\x22:\x22Transportation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/transportation\/\x22}]}]}},{\x22title\x22:\x22Videos\x22,\x22submenu\x22:{\x22columns\x22:1,\x22menuSections\x22:[{\x22span\x22:1,\x22items\x22:[{\x22title\x22:\x22Overview\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/videos\x22},{\x22title\x22:\x22AI Academy\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/videos\/ai\u002Dacademy\x22},{\x22title\x22:\x22Rethink use cases\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/videos\/series\/rethink\x22},{\x22title\x22:\x22Think 2024 on demand\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/videos\/series\/think\u002Dkeynotes\x22}]}]}},{\x22title\x22:\x22Reports\x22,\x22submenu\x22:{\x22columns\x22:1,\x22menuSections\x22:[{\x22span\x22:1,\x22items\x22:[{\x22title\x22:\x22AI in Action 2024\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22http:\/\/www.ibm.com\/think\/reports\/ai\u002Din\u002Daction\x22},{\x22title\x22:\x22State of Sustainability Readiness Report 2024\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/reports\/sustainability\u002Dreadiness\x22},{\x22title\x22:\x22Cost of a Data Breach 2024\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/reports\/data\u002Dbreach\x22},{\x22title\x22:\x22IBM X\u002DForce Threat Intelligence Index 2024\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/reports\/threat\u002Dintelligence\x22},{\x22title\x22:\x22CEO’s Guide to Generative AI\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/thought\u002Dleadership\/institute\u002Dbusiness\u002Dvalue\/en\u002Dus\/report\/ceo\u002Dgenerative\u002Dai\x22},{\x22title\x22:\x22Hybrid by Design: The great tech reset\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/thought\u002Dleadership\/institute\u002Dbusiness\u002Dvalue\/en\u002Dus\/report\/hybrid\u002Dby\u002Ddesign\x22},{\x22title\x22:\x222024 CEO Study\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/thought\u002Dleadership\/institute\u002Dbusiness\u002Dvalue\/en\u002Dus\/c\u002Dsuite\u002Dstudy\/ceo\x22},{\x22title\x22:\x22View all IBV reports\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/thought\u002Dleadership\/institute\u002Dbusiness\u002Dvalue\x22}]}]}},{\x22title\x22:\x22Podcasts\x22,\x22submenu\x22:{\x22columns\x22:1,\x22menuSections\x22:[{\x22span\x22:1,\x22items\x22:[{\x22title\x22:\x22Overview\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/podcasts\x22},{\x22title\x22:\x22Mixture of Experts\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/podcasts\/mixture\u002Dof\u002Dexperts\x22},{\x22title\x22:\x22AI in Action\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/podcasts\/ai\u002Din\u002Daction\x22},{\x22title\x22:\x22Smart Talks with IBM\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/podcasts\/smart\u002Dtalks\x22}]}]}},{\x22title\x22:\x22Events\x22,\x22submenu\x22:{\x22columns\x22:1,\x22menuSections\x22:[{\x22span\x22:1,\x22items\x22:[{\x22title\x22:\x22Think 2024\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/events\/think\x22},{\x22title\x22:\x22Think on Tour\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/events\/think\/on\u002Dtour\x22},{\x22title\x22:\x22TechXchange\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/community\/ibm\u002Dtechxchange\u002Dconference\/\x22}]}]}},{\x22title\x22:\x22More\x22,\x22submenu\x22:{\x22columns\x22:2,\x22footer\x22:{\x22title\x22:\x22View all\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/search\x22},\x22menuSections\x22:[{\x22span\x22:1,\x22heading\x22:{\x22headingLevel\x22:2,\x22title\x22:\x22Topics\x22},\x22items\x22:[{\x22title\x22:\x22Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/analytics\x22},{\x22title\x22:\x22Asset management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/asset\u002Dmanagement\x22},{\x22title\x22:\x22Business automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/business\u002Dautomation\x22},{\x22title\x22:\x22Business operations\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/business\u002Doperations\x22},{\x22title\x22:\x22Compute and servers\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/compute\x22},{\x22title\x22:\x22DevOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/devops\x22},{\x22title\x22:\x22IT automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/it\u002Dautomation\x22},{\x22title\x22:\x22IT infrastructure\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/it\u002Dinfrastructure\x22},{\x22title\x22:\x22Middleware\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/middleware\x22},{\x22title\x22:\x22Network\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/network\x22},{\x22title\x22:\x22Quantum\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/quantum\x22},{\x22title\x22:\x22Storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/storage\x22}]},{\x22span\x22:1,\x22heading\x22:{\x22headingLevel\x22:2,\x22title\x22:\x22Content types\x22},\x22items\x22:[{\x22title\x22:\x22Explainers\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/topics\x22},{\x22title\x22:\x22News\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/news\x22},{\x22title\x22:\x22Newsletters\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/subscribe\x22},{\x22title\x22:\x22Reference architectures\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/architectures\x22}]}]}}],\x22actions\x22:{\x22login\x22:null,\x22cta\x22:{\x22title\x22:\x22Subscribe\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/account\/reg\/signup?formid=news\u002Durx\u002D52954\x22}},\x22linkOrContactModule\x22:false,\x22optinalCta\x22:true}"; document.querySelector('c4d-masthead-container').l1Data = JSON.parse(json); document.querySelector('.masthead').classList.add("hasNavigation"); document.documentElement.style.setProperty('--anker-navigation-spacing', '-6rem'); document.addEventListener('DOMContentLoaded', () => { document.querySelector('c4d-masthead-l1').overviewText = 'Overview'; }); </script> <script type="text/javascript"> if(window.location.href.includes("/careers")){ document.querySelector('c4d-masthead-container').setAttribute("has-search","false"); document.querySelector('c4d-masthead-container').setAttribute("has-profile","false"); } </script> </div> <div class="leadspace"> <div class="bx--grid bx--no-gutter "> <dds-leadspace type="left" size="medium" loadinganimation gradient-style-scheme> <bx-breadcrumb slot="navigation"> <bx-breadcrumb-item> <bx-breadcrumb-link href="/"> <caem-paragraph size="normal" type-style="body-short-01">Home</caem-paragraph> </bx-breadcrumb-link> </bx-breadcrumb-item> <bx-breadcrumb-item> <bx-breadcrumb-link href="/topics"> <caem-paragraph size="normal" type-style="body-short-01">Topics</caem-paragraph> </bx-breadcrumb-link> </bx-breadcrumb-item> <bx-breadcrumb-item class="no-trailing-slash"> <caem-paragraph size="normal" type-style="body-short-01">Cybersecurity</caem-paragraph> </bx-breadcrumb-item> </bx-breadcrumb> <dds-leadspace-heading id="leadspaceSimpleTitle"> What is cybersecurity? </dds-leadspace-heading> <div class="leadspace__copy "> </div> <dds-button-group slot="action"> <dds-button-cta href="https://www.ibm.com/security" target="_self" kind="primary" aria-label="Explore cybersecurity solutions" cta-type="local" data-aem-autoid="aem--leadspace_cta-0"> <span>Explore IBM's cybersecurity solutions</span> </dds-button-cta> <dds-button-cta href="https://www.ibm.com/account/reg/signup?formid=news-urx-52954" target="_blank" kind="tertiary" aria-label="Subscribe for updates" cta-type="local" data-aem-autoid="aem--leadspace_cta-1"> <span>Sign up for security topic updates</span> </dds-button-cta> </dds-button-group> <dds-background-media mobile-position="bottom" opacity="100" gradient-hidden> <div class="bx--image "> <picture> <source media="(min-width: 1312px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/38/9c/maas360-pricing-leadspace.component.xl-retina.ts=1729890591680.png/content/adobe-cms/us/en/topics/cybersecurity/jcr:content/root/leadspace"/> <source media="(min-width: 1312px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/38/9c/maas360-pricing-leadspace.component.xl.ts=1729890591680.png/content/adobe-cms/us/en/topics/cybersecurity/jcr:content/root/leadspace"/> <source media="(min-width: 1056px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/38/9c/maas360-pricing-leadspace.component.l-retina.ts=1729890591680.png/content/adobe-cms/us/en/topics/cybersecurity/jcr:content/root/leadspace"/> <source media="(min-width: 1056px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/38/9c/maas360-pricing-leadspace.component.l.ts=1729890591680.png/content/adobe-cms/us/en/topics/cybersecurity/jcr:content/root/leadspace"/> <source media="(min-width: 672px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/38/9c/maas360-pricing-leadspace.component.m-retina.ts=1729890591680.png/content/adobe-cms/us/en/topics/cybersecurity/jcr:content/root/leadspace"/> <source media="(min-width: 672px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/38/9c/maas360-pricing-leadspace.component.m.ts=1729890591680.png/content/adobe-cms/us/en/topics/cybersecurity/jcr:content/root/leadspace"/> <source media="(min-width: 481px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/38/9c/maas360-pricing-leadspace.component.s-retina.ts=1729890591680.png/content/adobe-cms/us/en/topics/cybersecurity/jcr:content/root/leadspace"/> <source media="(min-width: 481px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/38/9c/maas360-pricing-leadspace.component.s.ts=1729890591680.png/content/adobe-cms/us/en/topics/cybersecurity/jcr:content/root/leadspace"/> <source media="(max-width: 480px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/38/9c/maas360-pricing-leadspace.component.xs-retina.ts=1729890591680.png/content/adobe-cms/us/en/topics/cybersecurity/jcr:content/root/leadspace"/> <source media="(max-width: 480px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/38/9c/maas360-pricing-leadspace.component.xs.ts=1729890591680.png/content/adobe-cms/us/en/topics/cybersecurity/jcr:content/root/leadspace"/> <img id="image--1538280798" class="bx--image__img" src="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/38/9c/maas360-pricing-leadspace.component.xl.ts=1729890591680.png/content/adobe-cms/us/en/topics/cybersecurity/_jcr_content/root/leadspace" alt="Illustration showing how cybersecurity helps protect critical systems and sensitive information from cyberattacks"/> </picture> </div> </dds-background-media> </dds-leadspace> </div> </div> <div class="table-of-contents container responsivegrid"> <dds-table-of-contents data-cmp-is="table-of-contents" data-autoid="dds--table-of-contents" class="cmp-table-of-contents" stickyoffset="96"> <div id="table-of-contents-fd76069c24" class="cmp-table-of-contents"> <div class="body container responsivegrid"> <div id="body-17c49a942e" class="cmp-container"> <div class="content-section-styled content-section container responsivegrid"> <div class="bx--grid"> <div class="bx--row"> <div class="bx--col-lg-16 bx--no-gutter"> <div class="bx--content-section"> <div id="container-8b5cb5aed7" class="cmp-container"> <div class="modular-container container responsivegrid"> <div id="modular-container-6e7769e694" class="cmp-container"> <div class="standalone-text rich-text text"> <caem-paragraph size="normal"> <p><strong>Published:</strong> 12 August 2024<br /> <strong>Contributors</strong>: Gregg Lindemulder, Matt Kosinski<br /> </p> </caem-paragraph> </div> </div> </div> <div class="complex-narrative"> <dds-content-block-segmented data-autoid="dds-content-block-segmented" no-image content-section-body> <div slot="heading"> <a data-title="What is cybersecurity?" name="What+is+cybersecurity%3F"></a> <dds-content-block-heading data-autoid="dds--content-block__heading" role="heading"> <a data-title="What is cybersecurity?" name="What+is+cybersecurity%3F"></a> What is cybersecurity? </dds-content-block-heading> </div> <dds-content-block-copy data-autoid="dds--content-block__copy" slot="copy"> <dds-content-block-paragraph> <div class="cms-richtext " id="rich-text-d5c185fcda" data-dynamic-inner-content="description"> <p>Cybersecurity refers to any technologies, practices and policies for preventing <a href="https://www.ibm.com/topics/cyber-attack" target="_self" rel="noopener noreferrer">cyberattacks</a> or mitigating their impact. Cybersecurity aims to protect computer systems, applications, devices, data, financial assets and people against <a href="https://www.ibm.com/topics/ransomware" target="_self" rel="noopener noreferrer">ransomware</a> and other <a href="https://www.ibm.com/topics/malware" target="_self" rel="noopener noreferrer">malware</a>, <a href="https://www.ibm.com/topics/phishing" target="_self" rel="noopener noreferrer">phishing</a> scams, data theft and other cyberthreats.</p> </div> </dds-content-block-paragraph> </dds-content-block-copy> <dds-content-block-segmented-item> <dds-content-item-copy> <div class="cms-richtext " id="rich-text-1281b1fc52" data-dynamic-inner-content="description"> <p>At the enterprise level, cybersecurity is a key component of an organization’s overall <a href="https://www.ibm.com/topics/risk-management">risk management</a> strategy. According to Cybersecurity Ventures, global spending on cybersecurity products and services will exceed USD 1.75 trillion total during the years 2021 through 2025.<sup>1</sup><br /> </p> <p>Cybersecurity job growth is also robust. The US Bureau of Labor Statistics projects that “employment of information security analysts is projected to grow 32% from 2022 to 2032, faster than the average for all occupations.”<sup>2</sup></p> <h2> </h2> </div> </dds-content-item-copy> </dds-content-block-segmented-item> <div slot="complementary"> <div class="aside-card"> <dds-card-cta href="https://www.ibm.com/account/reg/signup?formid=urx-52913" target="_blank" pictogram-placement="top" cta-type="local"> <dds-card-eyebrow slot="eyebrow" aria-hidden="true"> Report </dds-card-eyebrow> <dds-card-heading role="heading" aria-level="3" slot="heading"> Cost of a Data Breach Report </dds-card-heading> <p>Get essential insights to help your security and IT teams better manage risk and limit potential losses. </p> <dds-card-cta-footer icon-placement="right" href="https://www.ibm.com/account/reg/signup?formid=urx-52913" target="_blank" slot="footer" aria-hidden="true"> <span>Download the report</span> </dds-card-cta-footer> </dds-card-cta> </div> <dds-link-list type="default"> <dds-link-list-heading role="heading" aria-level="4" slot="heading"> Related content </dds-link-list-heading> <dds-link-list-item-card cta-type="local" href="https://www.ibm.com/account/reg/signup?formid=urx-52629" target="_self"> <p>Register for the X-Force Threat Intelligence Index 2024</p> <dds-card-cta-footer href="https://www.ibm.com/account/reg/signup?formid=urx-52629" target="_self" cta-type="local"> </dds-card-cta-footer> </dds-link-list-item-card> </dds-link-list> </div> </dds-content-block-segmented> <div horizontal-ruler> <dds-hr></dds-hr> </div> </div> <div class="content-group-banner"> <dds-content-group-banner data-autoid="dds--content-group-banner" class="bx--content-group-banner " content-section-body> <dds-content-group-heading data-autoid="dds--content-group__title" class="bx--content-group__title " slot="heading"> Get the X-Force Cloud Threat Landscape Report 2024 </dds-content-group-heading> <div hidden class="bx--content-layout__body"></div> <dds-link-list data-autoid="dds--link-list" type="vertical" slot="complementary"> <div> <a cta-type="local" href="https://www.ibm.com/blog/x-force-cloud-threat-landscape/" icon-placement="right" target="_self" data-link-type="local" data-dynamic-properties="{"ctaUrl":"href"}"> <span class="bx--link-text" data-link-text data-dynamic-inner-content="ctaLabel">Read the blog</span> <!-- LTR - Left to Right version --> <svg xmlns="http://www.w3.org/2000/svg" slot="icon" width="20" height="20" focusable="false" fill="currentColor" viewBox="0 0 20 20" aria-hidden="true"> <path d="M11.8 2.8L10.8 3.8 16.2 9.3 1 9.3 1 10.7 16.2 10.7 10.8 16.2 11.8 17.2 19 10z"></path> </svg> <!-- RTL - Right to Left version --> </a> </div> <div> <a cta-type="local" href="https://www.ibm.com/account/reg/signup?formid=urx-53217" icon-placement="right" target="_self" data-link-type="local" data-dynamic-properties="{"ctaUrl":"href"}"> <span class="bx--link-text" data-link-text data-dynamic-inner-content="ctaLabel">Download the report</span> <!-- LTR - Left to Right version --> <svg xmlns="http://www.w3.org/2000/svg" slot="icon" width="20" height="20" focusable="false" fill="currentColor" viewBox="0 0 20 20" aria-hidden="true"> <path d="M11.8 2.8L10.8 3.8 16.2 9.3 1 9.3 1 10.7 16.2 10.7 10.8 16.2 11.8 17.2 19 10z"></path> </svg> <!-- RTL - Right to Left version --> </a> </div> </dds-link-list> </dds-content-group-banner> <div class="horizontal-ruler" horizontal-ruler> <dds-hr></dds-hr> </div> </div> <div class="simple-narrative"> <dds-content-block-simple data-autoid="dds--content-block-simple" class=" " content-section-body> <div slot="heading"> <a data-title="Why cybersecurity is important " name="Why+cybersecurity+is+important%0A"></a> <dds-content-block-heading data-autoid="dds--content-block__heading" role="heading"> <a data-title="Why cybersecurity is important " name="Why+cybersecurity+is+important%0A"></a> Why cybersecurity is important </dds-content-block-heading> </div> <dds-content-block-copy data-autoid="dds--content-block__copy" slot="copy" size="sm"> <div class="cms-richtext " id="rich-text-1513b66ee9" data-dynamic-inner-content="description"> <p>Cybersecurity is important because cyberattacks and cybercrime have the power to disrupt, damage or destroy businesses, communities and lives. Successful cyberattacks lead to identity theft, personal and corporate extortion, loss of sensitive information and business-critical data, temporary business outages, lost business and lost customers and, in some cases, business closures.</p> <p>Cyberattacks have an enormous and growing impact on businesses and the economy. By one estimate, cybercrime will cost the world economy USD 10.5 trillion per year by 2025.<sup>3 </sup>The cost of cyberattacks continues to rise as cybercriminals become more sophisticated.</p> <p>According to IBM's latest <a href="https://www.ibm.com/reports/data-breach"><em>Cost of a Data Breach Report</em></a>:</p> <ul><li>The average cost of a data breach jumped to USD 4.88 million from USD 4.45 million in 2023—a 10% spike and the highest increase since the pandemic.</li></ul> <ul><li>Business losses (revenue loss due to system downtime, lost customers and reputational damage) and post-breach response costs (costs to set up call centers and credit monitoring services for affected customers or to pay regulatory fines), rose nearly 11% over the previous year.<br /> <br /> </li><li>The number of organizations paying more than USD 50,000 in regulatory fines as a result of a data breach rose 22.7% over the previous year; those paying more than USD 100,000 rose 19.5%. </li></ul> </div> </dds-content-block-copy> <div slot="complementary"> </div> </dds-content-block-simple> <div horizontal-ruler> <dds-hr></dds-hr> </div> </div> <div class="simple-narrative"> <dds-content-block-simple data-autoid="dds--content-block-simple" class=" " no-aside content-section-body> <div slot="heading"> <a data-title="Cybersecurity challenges " name="Cybersecurity+challenges%0A"></a> <dds-content-block-heading data-autoid="dds--content-block__heading" role="heading"> <a data-title="Cybersecurity challenges " name="Cybersecurity+challenges%0A"></a> Cybersecurity challenges </dds-content-block-heading> </div> <dds-content-block-copy data-autoid="dds--content-block__copy" slot="copy" size="sm"> <div class="cms-richtext " id="rich-text-7fdfddcb6e" data-dynamic-inner-content="description"> <p>Apart from the sheer volume of cyberattacks, one of the biggest challenges for cybersecurity professionals is the ever-evolving nature of the information technology (IT) landscape, and the way threats evolve with it. Many emerging technologies that offer tremendous new advantages for businesses and individuals also present new opportunities for threat actors and cybercriminals to launch increasingly sophisticated attacks. For example:</p> <ul><li><strong>The pervasive adoption of cloud computing</strong> can increase network management complexity and raise the risk of cloud misconfigurations, improperly secured APIs and other avenues hackers can exploit.</li></ul> <ul><li><strong>More remote work, hybrid work and </strong><a href="https://www.ibm.com/topics/byod"><strong>bring-your-own-device (BYOD)</strong></a><strong> policies </strong>mean more connections, devices, applications and data for security teams to protect.</li></ul> <ul><li><strong>Proliferating </strong><a href="https://www.ibm.com/topics/internet-of-things"><strong>Internet of Things (IoT)</strong></a><strong> and connected devices,</strong> many of which are unsecured or improperly secured by default, can be easily hijacked by bad actors.<br /> <br /> </li><li><strong>The rise of </strong><a href="https://www.ibm.com/topics/artificial-intelligence"><strong>artificial intelligence (AI)</strong></a><strong>, and of </strong><a href="https://www.ibm.com/topics/generative-ai"><strong>generative AI</strong></a><strong> </strong>in particular, presents an entirely new threat landscape that hackers are already exploiting through prompt injection and other techniques. According to recent research from the IBM® Institute for Business Value, <a href="https://www.ibm.com/thought-leadership/institute-business-value/report/securing-generative-ai">only 24% of generative AI initiatives are secured</a>.</li></ul> <p>As the worldwide attack surface expands, the cybersecurity workforce is struggling to keep pace. A World Economic Forum study found that the global cybersecurity worker gap—the gap between cybersecurity workers and jobs that need to be filled—might reach 85 million workers by 2030.<sup>4</sup></p> <p>Closing this skills gap can have an impact. According to the <em>Cost of a Data Breach 2024 Report</em>, organizations suffering from a high-level shortage of security skills saw an average cost per breach of USD 5.74 million, compared to USD 3.98 million for organizations with lower-level skills shortages.</p> <p>Resource-strained security teams will increasingly turn to security technologies featuring advanced analytics, artificial intelligence (AI) and automation to strengthen their cyber defenses and minimize the impact of successful attacks.</p> </div> </dds-content-block-copy> </dds-content-block-simple> <div horizontal-ruler> <dds-hr></dds-hr> </div> </div> <div class="mixed-series"> <div> <div class="bx--col-lg-12 bx--no-gutter"> <dds-content-block-mixed content-section-body> <div slot="heading"> <a data-title="Types of cybersecurity" name="Types+of+cybersecurity"></a> <dds-content-block-heading> <a data-title="Types of cybersecurity" name="Types+of+cybersecurity"></a> Types of cybersecurity </dds-content-block-heading> </div> <div id="mixed-series-container-3408fb7d79" class="cmp-container"> <div class="simple-series"> <dds-content-group-simple> <dds-content-group-heading> </dds-content-group-heading> <dds-content-group-copy> <dds-content-group-paragraph> <div class="cms-richtext " id="rich-text-e2b6093187" data-dynamic-inner-content="description"> <p> </p> <p class="MsoNormal">Comprehensive cybersecurity strategies protect all of an organization’s IT infrastructure layers against cyberthreats and cybercrime. Some of the most important cybersecurity domains include:</p> <p> </p> <ul style=" margin-top: 0.0in; "><li class="MsoNormal"><strong>AI security</strong></li><li class="MsoNormal"><strong>Critical infrastructure security</strong></li><li class="MsoNormal"><strong>Network security</strong></li><li class="MsoNormal"><strong>Endpoint security</strong></li><li class="MsoNormal"><strong>Application security</strong></li><li class="MsoNormal"><strong>Cloud security</strong></li><li class="MsoNormal"><strong>Information security</strong></li><li class="MsoNormal"><strong>Mobile security</strong></li></ul> <p> </p> <p> </p> </div> </dds-content-group-paragraph> </dds-content-group-copy> <div id="simple-series-items-container-5c3762ce48" class="cmp-container"> <div class="content-block-item"> <dds-content-item> <dds-content-item-heading> </dds-content-item-heading> <dds-content-item-copy> <dds-content-item-paragraph> <div class="cms-richtext " id="rich-text-0297569747" data-dynamic-inner-content="description"> <h3>AI security<strong><br /> <br /> </strong></h3> <p><a href="https://www.ibm.com/think/topics/ai-security">AI security</a> refers to measures and technology aimed at preventing or mitigating cyberthreats and cyberattacks that target AI applications or systems or that use AI in malicious ways.</p> <p>Generative AI offers threat actors new attack vectors to exploit. Hackers can use malicious prompts to manipulate AI apps, poison data sources to distort AI outputs and even trick AI tools into sharing sensitive information. They can also use (and have already used) generative AI to create malicious code and phishing emails.</p> <p>AI security uses specialized <a href="https://www.ibm.com/think/insights/ai-risk-management">risk management frameworks</a>—and increasingly, AI-enabled cybersecurity tools—to protect the AI attack surface. According to the <em>Cost of a Data Breach 2024 Report</em>, organizations that deployed AI-enabled security tools and automation extensively for cyberthreat prevention saw a USD 2.2 million lower average cost per breach compared to organizations with no AI deployed.<br /> </p> </div> </dds-content-item-paragraph> </dds-content-item-copy> </dds-content-item> </div> <div class="content-block-item"> <dds-content-item> <dds-content-item-heading> </dds-content-item-heading> <dds-content-item-copy> <dds-content-item-paragraph> <div class="cms-richtext " id="rich-text-475d97f8e5" data-dynamic-inner-content="description"> <h3>Critical infrastructure security<br /> </h3> <p>Critical infrastructure security protects the computer systems, applications, networks, data and digital assets that a society depends on for national security, economic health and public safety.</p> <p>In the United States, the National Institute of Standards and Technology (NIST) offers a cybersecurity framework to help IT providers and stakeholders secure critical infrastructure.<sup>5</sup> The US Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) also provides guidance.<sup>6</sup><br /> <br /> </p> </div> </dds-content-item-paragraph> </dds-content-item-copy> </dds-content-item> </div> <div class="content-block-item"> <dds-content-item> <dds-content-item-heading> </dds-content-item-heading> <dds-content-item-copy> <dds-content-item-paragraph> <div class="cms-richtext " id="rich-text-9581cfb01e" data-dynamic-inner-content="description"> <h3>Network security<br /> </h3> <p><a href="https://www.ibm.com/topics/network-security">Network security</a> focuses on preventing unauthorized access to networks and network resources. It also helps ensure that authorized users have secure and reliable access to the resources and assets they need to do their jobs.<br /> </p> </div> </dds-content-item-paragraph> </dds-content-item-copy> </dds-content-item> </div> <div class="content-block-item"> <dds-content-item> <dds-content-item-heading> </dds-content-item-heading> <dds-content-item-copy> <dds-content-item-paragraph> <div class="cms-richtext " id="rich-text-70b8ca7fce" data-dynamic-inner-content="description"> <h3>Application security<br /> </h3> <p>Application security helps prevent unauthorized access to and use of apps and related data. It also helps identify and mitigate flaws or vulnerabilities in application design. Modern application development methods such as <a href="https://www.ibm.com/topics/devops">DevOps</a> and <a href="https://www.ibm.com/topics/devsecops">DevSecOps</a> build security and security testing into the development process.<br /> </p> </div> </dds-content-item-paragraph> </dds-content-item-copy> </dds-content-item> </div> <div class="content-block-item"> <dds-content-item> <dds-content-item-heading> </dds-content-item-heading> <dds-content-item-copy> <dds-content-item-paragraph> <div class="cms-richtext " id="rich-text-77ebb77cc7" data-dynamic-inner-content="description"> <h3>Cloud security<br /> </h3> <p><a href="https://www.ibm.com/topics/cloud-security">Cloud security</a> secures an organization’s cloud-based services and assets, including applications, data, virtual servers and other infrastructure.</p> <p>Generally speaking, cloud security operates on the shared responsibility model. The cloud provider is responsible for securing the services that they deliver and the infrastructure that delivers them. The customer is responsible for protecting their data, code and other assets they store or run in the cloud.<br /> </p> </div> </dds-content-item-paragraph> </dds-content-item-copy> </dds-content-item> </div> <div class="content-block-item"> <dds-content-item> <dds-content-item-heading> </dds-content-item-heading> <dds-content-item-copy> <dds-content-item-paragraph> <div class="cms-richtext " id="rich-text-94e100aa7f" data-dynamic-inner-content="description"> <h3>Information security and data security<br /> </h3> <p><a href="https://www.ibm.com/topics/information-security">Information security (InfoSec)</a> protects an organization's important information—digital files and data, paper documents, physical media—against unauthorized access, use or alteration.</p> <p><a href="https://www.ibm.com/topics/data-security">Data security</a>, the protection of digital information, is a subset of information security and the focus of most cybersecurity-related InfoSec measures.<br /> </p> </div> </dds-content-item-paragraph> </dds-content-item-copy> </dds-content-item> </div> <div class="content-block-item"> <dds-content-item> <dds-content-item-heading> </dds-content-item-heading> <dds-content-item-copy> <dds-content-item-paragraph> <div class="cms-richtext " id="rich-text-183f4335d8" data-dynamic-inner-content="description"> <h3>Mobile security<br /> </h3> <p><a href="https://www.ibm.com/topics/mobile-security">Mobile security</a> encompasses cybersecurity tools and practices specific to smartphones and other mobile devices, including mobile application management (MAM) and enterprise mobility management (EMM).</p> <p>More recently, organizations are adopting <a href="https://www.ibm.com/topics/uem">unified endpoint management (UEM)</a> solutions that allow them to protect, configure and manage all endpoint devices, including mobile devices, from a single console.<br /> </p> </div> </dds-content-item-paragraph> </dds-content-item-copy> </dds-content-item> </div> </div> </dds-content-group-simple> </div> </div> </dds-content-block-mixed> </div> </div> <div horizontal-ruler> <dds-hr></dds-hr> </div> </div> <div class="mixed-series"> <div> <div class="bx--col-lg-12 bx--no-gutter"> <dds-content-block-mixed content-section-body> <div slot="heading"> <a data-title="Common cybersecurity threats" name="Common+cybersecurity+threats"></a> <dds-content-block-heading> <a data-title="Common cybersecurity threats" name="Common+cybersecurity+threats"></a> Common cybersecurity threats </dds-content-block-heading> </div> <div id="mixed-series-container-01e20efd2e" class="cmp-container"> <div class="simple-series"> <dds-content-group-simple> <dds-content-group-copy> <dds-content-group-paragraph> <div class="cms-richtext " id="rich-text-111041814b" data-dynamic-inner-content="description"> <p>Some of the most common types of cyberthreats include</p> <ul><li><strong>Malware</strong></li><li><strong>Ransomware</strong></li><li><strong>Phishing</strong></li><li><strong>Credential theft and abuse</strong></li><li><strong>Insider threats</strong></li><li><strong>AI attacks</strong></li><li><strong>Cryptojacking</strong></li><li><strong>Distributed denial of service (DDoS)<br /> </strong></li></ul> </div> </dds-content-group-paragraph> </dds-content-group-copy> <div id="simple-series-items-container-87f136f450" class="cmp-container"> </div> </dds-content-group-simple> </div> <div class="simple-series"> <dds-content-group-simple> <dds-content-group-heading> </dds-content-group-heading> <dds-content-group-copy> <dds-content-group-paragraph> <div class="cms-richtext " id="rich-text-d454512e8f" data-dynamic-inner-content="description"> <h3>Malware<br /> </h3> <p>Malware, short for "malicious software", is any software code or computer program that is intentionally written to harm a computer system or its users. Almost every modern <a href="https://www.ibm.com/topics/cyber-attack">cyberattack</a> involves some type of malware.</p> <p>Hackers and cybercriminals create and use malware to gain unauthorized access to computer systems and sensitive data, hijack computer systems and operate them remotely, disrupt or damage computer systems, or hold data or systems hostage for large sums of money (see "Ransomware").<br /> </p> </div> </dds-content-group-paragraph> </dds-content-group-copy> <div id="simple-series-items-container-4670b8e55f" class="cmp-container"> </div> <div slot="footer"> <dds-text-cta cta-type="local" icon-placement="right" href="https://www.ibm.com/topics/malware" target="_self" data-dynamic-properties="{"ctaUrl":"href"}" data-dynamic-inner-content="ctaLabel">Read more about malware </dds-text-cta> </div> </dds-content-group-simple> </div> <div class="simple-series"> <dds-content-group-simple> <dds-content-group-copy> <dds-content-group-paragraph> <div class="cms-richtext " id="rich-text-590b70997f" data-dynamic-inner-content="description"> <h3>Ransomware<br /> <br /> </h3> <p>Ransomware is a type of malware that encrypts a victim’s data or device and threatens to keep it encrypted—or worse—unless the victim pays a ransom to the attacker.</p> <p>The earliest ransomware attacks demanded a ransom in exchange for the encryption key required to unlock the victim’s data. Starting around 2019, almost all ransomware attacks were <em>double extortion</em> attacks that also threatened to publicly share victims’ data; some <em>triple extortion</em> attacks added the threat of a distributed denial-of-service (DDoS) attack.</p> <p>More recently, ransomware attacks are on the decline. According to the <em><a href="https://www.ibm.com/reports/threat-intelligence" target="_self" rel="noopener noreferrer">IBM X-Force Threat Intelligence Index 2024</a>,</em> ransomware attacks accounted for 20% of all attacks in 2023, down 11.5% from 2022. The decline is likely the result of improved ransomware prevention, more effective law enforcement intervention and data backup and protection practices that enable businesses to recover without paying the ransom.</p> <p>In the meantime, ransomware attackers have repurposed their resources to start other types of cyberthreats, including <em>infostealer</em> malware that allows attackers to steal data and hold it hostage without locking down the victim’s systems and <em>data destruction </em>attacks that destroy or threaten to destroy data for specific purposes.<br /> </p> </div> </dds-content-group-paragraph> </dds-content-group-copy> <div id="simple-series-items-container-16ffca0033" class="cmp-container"> </div> <div slot="footer"> <dds-text-cta cta-type="local" icon-placement="right" href="https://www.ibm.com/topics/ransomware" target="_self" data-dynamic-properties="{"ctaUrl":"href"}" data-dynamic-inner-content="ctaLabel">Read more about ransomware </dds-text-cta> </div> </dds-content-group-simple> </div> <div class="simple-series"> <dds-content-group-simple> <dds-content-group-copy> <dds-content-group-paragraph> <div class="cms-richtext " id="rich-text-49c3b02d38" data-dynamic-inner-content="description"> <h3>Phishing<br /> </h3> <p>Phishing attacks are email, text or voice messages that trick users into downloading malware, sharing sensitive information or sending funds to the wrong people.</p> <p>Most users are familiar with bulk phishing scams—mass-mailed fraudulent messages that appear to be from a large and trusted brand, asking recipients to reset their passwords or reenter credit card information. More sophisticated phishing scams, such as <a href="https://www.ibm.com/topics/spear-phishing">spear phishing</a> and <a href="https://www.ibm.com/topics/business-email-compromise">business email compromise (BEC)</a>, target specific individuals or groups to steal especially valuable data or large sums of money.</p> <p>Phishing is just one type of <a href="https://www.ibm.com/topics/social-engineering">social engineering</a>, a class of “human hacking” tactics and interactive attacks that use psychological manipulation to pressure people into taking unwise actions.<br /> </p> </div> </dds-content-group-paragraph> </dds-content-group-copy> <div id="simple-series-items-container-314e23f919" class="cmp-container"> </div> <div slot="footer"> <dds-text-cta cta-type="local" icon-placement="right" href="https://www.ibm.com/topics/phishing" target="_self" data-dynamic-properties="{"ctaUrl":"href"}" data-dynamic-inner-content="ctaLabel">Read more about phishing </dds-text-cta> </div> </dds-content-group-simple> </div> <div class="simple-series"> <dds-content-group-simple> <dds-content-group-copy> <dds-content-group-paragraph> <div class="cms-richtext " id="rich-text-a4b3252845" data-dynamic-inner-content="description"> <h3>Credential theft and account abuse<br /> </h3> <p>The <em>X-Force Threat Intelligence Index </em>found that identity-based attacks, which hijack legitimate user accounts and abuse their privileges, account for 30% of attacks. This makes identity-based attacks the most common entry point into corporate networks.</p> <p>Hackers have many techniques for stealing credentials and taking over accounts. For example, Kerberoasting attacks manipulate the Kerberos authentication protocol commonly used in Microsoft Active Directory to seize privileged service accounts. In 2023, the <a href="https://www.ibm.com/reports/threat-intelligence">IBM X-Force team experienced</a> a 100% increase in Kerberoasting incidents.</p> <p>Similarly, the X-Force team saw a 266% increase in the use of infostealer malware that secretly records user credentials and other sensitive data.</p> </div> </dds-content-group-paragraph> </dds-content-group-copy> <div id="simple-series-items-container-0d5f1ccf17" class="cmp-container"> </div> <div slot="footer"> <dds-text-cta cta-type="local" icon-placement="right" href="https://www.ibm.com/topics/kerberoasting" target="_self" data-dynamic-properties="{"ctaUrl":"href"}" data-dynamic-inner-content="ctaLabel">Read more about Kerberoasting </dds-text-cta> </div> </dds-content-group-simple> </div> <div class="simple-series"> <dds-content-group-simple> <dds-content-group-heading> Insider threats </dds-content-group-heading> <dds-content-group-copy> <dds-content-group-paragraph> <div class="cms-richtext " id="rich-text-4a0b535084" data-dynamic-inner-content="description"> <p>Insider threats are threats that originate with authorized users—employees, contractors, business partners—who intentionally or accidentally misuse their legitimate access or have their accounts hijacked by cybercriminals.</p> <p>Insider threats can be harder to detect than external threats because they have the earmarks of authorized activity and are invisible to antivirus software, firewalls and other security solutions that block external attacks.</p> </div> </dds-content-group-paragraph> </dds-content-group-copy> <div id="simple-series-items-container-db8ddd9e1b" class="cmp-container"> </div> <div slot="footer"> <dds-text-cta cta-type="local" icon-placement="right" href="https://www.ibm.com/topics/insider-threats" target="_self" data-dynamic-properties="{"ctaUrl":"href"}" data-dynamic-inner-content="ctaLabel">Read more about insider threats </dds-text-cta> </div> </dds-content-group-simple> </div> <div class="simple-series"> <dds-content-group-simple> <dds-content-group-copy> <dds-content-group-paragraph> <div class="cms-richtext " id="rich-text-f4a98e34c5" data-dynamic-inner-content="description"> <h3>AI attacks<strong><br /> </strong></h3> <p>Much like cybersecurity professionals are using AI to strengthen their defenses, cybercriminals are using AI to conduct advanced attacks.</p> <p>In generative AI fraud, scammers use <a href="https://www.ibm.com/topics/generative-ai">generative AI</a> to produce fake emails, applications and other business documents to fool people into sharing sensitive data or sending money.</p> <p>The <em>X-Force Threat Intelligence Index </em>reports that scammers can use open source generative AI tools to craft convincing phishing emails in as little as five minutes. For comparison, it takes scammers 16 hours to come up with the same message manually.</p> <p>Hackers are also using organizations’ AI tools as attack vectors. For example, in prompt injection attacks, threat actors use malicious inputs to manipulate generative AI systems into leaking sensitive data, spreading misinformation or worse.<br /> </p> </div> </dds-content-group-paragraph> </dds-content-group-copy> <div id="simple-series-items-container-ec3d9bc5b9" class="cmp-container"> </div> <div slot="footer"> <dds-text-cta cta-type="local" icon-placement="right" href="https://www.ibm.com/topics/prompt-injection" target="_self" data-dynamic-properties="{"ctaUrl":"href"}" data-dynamic-inner-content="ctaLabel">Read more about prompt injection </dds-text-cta> </div> </dds-content-group-simple> </div> <div class="simple-series"> <dds-content-group-simple> <dds-content-group-copy> <dds-content-group-paragraph> <div class="cms-richtext " id="rich-text-c214e10159" data-dynamic-inner-content="description"> <h3>Cryptojacking<br /> </h3> <p>Cryptojacking happens when hackers gain access to an endpoint device and secretly use its computing resources to mine cryptocurrencies such as bitcoin, ether or monero.</p> <p>Security analysts identified cryptojacking as a cyberthreat around 2011, shortly after the introduction of cryptocurrency. According to the IBM <em>X-Force Threat Intelligence Index</em>, cryptojacking is now among the top three areas of operations for cybercriminals.<br /> </p> </div> </dds-content-group-paragraph> </dds-content-group-copy> <div id="simple-series-items-container-49a0ff557f" class="cmp-container"> </div> </dds-content-group-simple> </div> <div class="simple-series"> <dds-content-group-simple> <dds-content-group-copy> <dds-content-group-paragraph> <div class="cms-richtext " id="rich-text-bba536b32b" data-dynamic-inner-content="description"> <h3>Distributed denial of service (DDoS)<br /> </h3> <p>A DDoS attack attempts to crash a server, website or network by overloading it with traffic, usually from a botnet—a network of distributed systems that a cybercriminal hijacks by using malware and remote-controlled operations.</p> <p>The global volume of DDoS attacks spiked during the COVID-19 pandemic. Increasingly, attackers are combining DDoS attacks with ransomware attacks, or simply threatening to launch DDoS attacks unless the target pays a ransom.<br /> </p> </div> </dds-content-group-paragraph> </dds-content-group-copy> <div id="simple-series-items-container-24a9e1a5d5" class="cmp-container"> </div> <div slot="footer"> <dds-text-cta cta-type="local" icon-placement="right" href="https://www.ibm.com/topics/ddos" target="_self" data-dynamic-properties="{"ctaUrl":"href"}" data-dynamic-inner-content="ctaLabel">Read more about DDoS attacks </dds-text-cta> </div> </dds-content-group-simple> </div> </div> </dds-content-block-mixed> </div> </div> <div horizontal-ruler> <dds-hr></dds-hr> </div> </div> <div class="simple-narrative"> <dds-content-block-simple data-autoid="dds--content-block-simple" class=" " no-aside content-section-body> <div slot="heading"> <a data-title="Cybersecurity myths" name="Cybersecurity+myths"></a> <dds-content-block-heading data-autoid="dds--content-block__heading" role="heading"> <a data-title="Cybersecurity myths" name="Cybersecurity+myths"></a> Cybersecurity myths </dds-content-block-heading> </div> <dds-content-block-copy data-autoid="dds--content-block__copy" slot="copy" size="sm"> <div class="cms-richtext " id="rich-text-3768501234" data-dynamic-inner-content="description"> <p> </p> <p>Despite an ever-increasing volume of cybersecurity incidents worldwide and the insights gleaned from resolving these incidents, some misconceptions persist. Some of the most dangerous include:</p> <p> </p> <h3>Strong passwords are adequate protection<br /> <br /> </h3> <p>Strong passwords do make a difference; for example, a 12-character password takes 62 trillion times longer to crack than a 6-character password. But passwords are relatively easy to acquire in other ways, such as through social engineering, keylogging malware, buying them on the dark web or paying disgruntled insiders to steal them.</p> <p> </p> <h3>Most cybersecurity risks are well-known</h3> <p><br /> In fact, the cyberthreat landscape is constantly changing. Thousands of new vulnerabilities are reported in old and new applications and devices every year. Opportunities for human error—specifically by negligent employees or contractors who unintentionally cause a data breach—keep increasing.</p> <h3><strong> </strong></h3> <h3>All cyberattack vectors are contained<br /> </h3> <p>Cybercriminals find new attack vectors all the time. The rise of AI technologies, operational technology (OT), Internet of Things (IoT) devices and cloud environments all give hackers new opportunities to cause trouble.</p> <h3> </h3> <h3>My industry is safe<strong><br /> </strong></h3> <p>Every industry has its share of cybersecurity risks. For example, ransomware attacks are targeting more sectors than ever, including local governments, nonprofits and healthcare providers. Attacks on supply chains, ".gov" websites and critical infrastructure have also increased.</p> <h3><strong> </strong></h3> <h3>Cybercriminals don’t attack small businesses<br /> </h3> <p>Yes, they do. The<em> Hiscox Cyber Readiness Report</em> found that almost half (41%) of small businesses in the US experienced a cyberattack in the last year.<sup>7</sup></p> </div> </dds-content-block-copy> </dds-content-block-simple> <div horizontal-ruler> <dds-hr></dds-hr> </div> </div> <div class="simple-narrative"> <dds-content-block-simple data-autoid="dds--content-block-simple" class=" " no-aside content-section-body> <div slot="heading"> <a data-title="Key cybersecurity best practices and technologies " name="Key+cybersecurity+best+practices+and+technologies%0A"></a> <dds-content-block-heading data-autoid="dds--content-block__heading" role="heading"> <a data-title="Key cybersecurity best practices and technologies " name="Key+cybersecurity+best+practices+and+technologies%0A"></a> Key cybersecurity best practices and technologies </dds-content-block-heading> </div> <dds-content-block-copy data-autoid="dds--content-block__copy" slot="copy" size="sm"> <div class="cms-richtext " id="rich-text-7874511521" data-dynamic-inner-content="description"> <p>While each organization’s cybersecurity strategy differs, many use these tools and tactics to reduce vulnerabilities, prevent attacks and intercept attacks in progress:</p> <ul><li><strong>Security awareness training</strong></li><li><strong>Data security tools</strong></li><li><strong>Identity and access management</strong></li><li><strong>Threat detection and response</strong></li><li><strong>Disaster recovery</strong></li></ul> <p> </p> <h3>Security awareness training<br /> <br /> </h3> <p>Security awareness training helps users understand how seemingly harmless actions—from using the same simple password for multiple log-ins to oversharing on social media—increase their own or their organization’s risk of attack.</p> <p>Combined with thought-out <a href="https://www.ibm.com/topics/data-security">data security</a> policies, security awareness training can help employees protect sensitive personal and organizational data. It can also help them recognize and avoid phishing and malware attacks.</p> <p> </p> <h3>Data security tools<br /> </h3> <p>Data security tools, such as <a href="https://www.ibm.com/topics/encryption">encryption</a> and <a href="https://www.ibm.com/topics/data-loss-prevention">data loss prevention</a> (DLP) solutions, can help stop security threats in progress or mitigate their effects. For example, DLP tools can detect and block attempted data theft, while encryption can make it so that any data that hackers steal is useless to them.</p> <p> </p> <h3>Identity and access management<br /> </h3> <p><a href="https://www.ibm.com/topics/identity-access-management">Identity and access management (IAM)</a> refers to the tools and strategies that control how users access resources and what they can do with those resources.</p> <p>IAM technologies can help protect against account theft. For example, <a href="https://www.ibm.com/topics/multi-factor-authentication">multifactor authentication</a> requires users to supply multiple credentials to log in, meaning threat actors need more than just a password to break into an account.</p> <p>Likewise, adaptive authentication systems detect when users are engaging in risky behavior and raise additional authentication challenges before allowing them to proceed. Adaptive authentication can help limit the <a href="https://www.ibm.com/think/topics/lateral-movement">lateral movement</a> of hackers who make it into the system.</p> <p>A <a href="https://www.ibm.com/topics/zero-trust">zero trust</a> architecture is one way to enforce strict access controls by verifying all connection requests between users and devices, applications and data.</p> <p> </p> <h3>Attack surface management<br /> </h3> <p><a href="https://www.ibm.com/topics/attack-surface-management">Attack surface management (ASM)</a> is the continuous discovery, analysis, remediation and monitoring of the cybersecurity vulnerabilities and potential attack vectors that make up an organization’s <a href="https://www.ibm.com/topics/attack-surface">attack surface</a>.</p> <p>Unlike other cyberdefense disciplines, ASM is conducted entirely from a hacker’s perspective rather than the perspective of the defender. It identifies targets and assesses risks based on the opportunities they present to a malicious attacker.</p> <p> </p> <h3>Threat detection and response<br /> </h3> <p>Analytics- and AI-driven technologies can help identify and respond to attacks in progress. These technologies can include <a href="https://www.ibm.com/topics/siem">security information and event management (SIEM)</a>, <a href="https://www.ibm.com/topics/security-orchestration-automation-response">security orchestration, automation and response (SOAR)</a> and <a href="https://www.ibm.com/topics/edr">endpoint detection and response (EDR)</a>. Typically, organizations use these technologies as part of a formal <a href="https://www.ibm.com/topics/incident-response">incident response</a> plan.</p> <p> </p> <h3>Disaster recovery<br /> </h3> <p><a href="https://www.ibm.com/topics/disaster-recovery">Disaster recovery</a> capabilities can play a key role in maintaining business continuity and remediating threats in the event of a cyberattack. For example, the ability to fail over to a backup that is hosted in a remote location can help a business resume operations after a ransomware attack (sometimes without paying a ransom)<br /> </p> </div> </dds-content-block-copy> </dds-content-block-simple> <div horizontal-ruler> <dds-hr></dds-hr> </div> </div> <div class="offering-group"> <a data-title="Related solutions" name="Related+solutions"></a> <dds-content-block-horizontal border content-section-body> <dds-content-block-heading role="heading" aria-level="2" data-autoid="dds--content-block__heading" slot="heading"> Related solutions </dds-content-block-heading> <div id="offering-group-items-container-8d1576ca4a" class="cmp-container"> <div class="offering-item"> <dds-content-item-horizontal> <dds-content-item-heading> Cybersecurity services </dds-content-item-heading> <dds-content-item-horizontal-copy> <caem-paragraph size="normal"> <div class="cms-richtext " id="rich-text-c0e473d512" data-dynamic-inner-content="description"> <p>Transform your business and manage risk with cybersecurity consulting, cloud and managed security services.</p> </div> </caem-paragraph> </dds-content-item-horizontal-copy> <dds-link-list slot="footer" type="vertical"> <dds-link-list-item-cta cta-type="local" href="https://www.ibm.com/services/security" icon-placement="right" role="listitem" target="_self"> Explore cybersecurity services </dds-link-list-item-cta> </dds-link-list> </dds-content-item-horizontal> </div> <div class="offering-item"> <dds-content-item-horizontal> <dds-content-item-heading> Data security and protection solutions </dds-content-item-heading> <dds-content-item-horizontal-copy> <caem-paragraph size="normal"> <div class="cms-richtext " id="rich-text-8586b0ee21" data-dynamic-inner-content="description"> <p>Protect data across hybrid clouds, simplify regulatory compliance and enforce security policies and access controls in real time. </p> </div> </caem-paragraph> </dds-content-item-horizontal-copy> <dds-link-list slot="footer" type="vertical"> <dds-link-list-item-cta cta-type="local" href="https://www.ibm.com/data-security" icon-placement="right" role="listitem" target="_self"> Explore data security and protection solutions </dds-link-list-item-cta> </dds-link-list> </dds-content-item-horizontal> </div> <div class="offering-item"> <dds-content-item-horizontal> <dds-content-item-heading> Artificial intelligence (AI) cybersecurity </dds-content-item-heading> <dds-content-item-horizontal-copy> <caem-paragraph size="normal"> <div class="cms-richtext " id="rich-text-003b31128c" data-dynamic-inner-content="description"> <p>Improve the speed, accuracy and productivity of security teams with AI-powered solutions.</p> </div> </caem-paragraph> </dds-content-item-horizontal-copy> <dds-link-list slot="footer" type="vertical"> <dds-link-list-item-cta cta-type="local" href="https://www.ibm.com/ai-cybersecurity" icon-placement="right" role="listitem" target="_self"> Explore artificial intelligence (AI) cybersecurity </dds-link-list-item-cta> </dds-link-list> </dds-content-item-horizontal> </div> <div class="offering-item"> <dds-content-item-horizontal> <dds-content-item-heading> Threat detection and response services </dds-content-item-heading> <dds-content-item-horizontal-copy> <caem-paragraph size="normal"> <div class="cms-richtext " id="rich-text-e9e00a5c19" data-dynamic-inner-content="description"> <p>Your partner against cyber threats, featuring the new AI-powered IBM Consulting® Cybersecurity Assistant designed to accelerate and improve the identification, investigation and response to critical security threats.</p> </div> </caem-paragraph> </dds-content-item-horizontal-copy> <dds-link-list slot="footer" type="vertical"> <dds-link-list-item-cta cta-type="local" href="https://www.ibm.com/services/threat-detection-response" icon-placement="right" role="listitem" target="_self"> Explore threat detection and response solutions </dds-link-list-item-cta> </dds-link-list> </dds-content-item-horizontal> </div> </div> </dds-content-block-horizontal> </div> <div class="block-card-container container responsivegrid"> <dds-content-block-cards data-autoid="dds--content-block-cards" content-section-body> <a data-title="Resources" name="Resources" slot="heading"></a> <dds-content-block-heading slot="heading" data-autoid="dds--content-block__heading" role="heading"> <a data-title="Resources" name="Resources"></a> Resources </dds-content-block-heading> <dds-card-group cards-per-row="3" grid-mode="border"> <dds-card-group-item href="https://www.ibm.com/account/reg/signup?formid=urx-52629" target="_blank" pictogram-placement="top" cta-type="local" no-poster="true"> <dds-card-eyebrow slot="eyebrow" aria-hidden="true" class="bx--card__eyebrow"> Report </dds-card-eyebrow> <dds-card-heading role="heading" aria-level="3" slot="heading" class="bx--card__heading"> IBM X-Force® Threat Intelligence Index </dds-card-heading> <p>Get essential research insights and recommendations to help you prepare to respond to cyberthreats with greater speed and effectiveness.</p> <dds-card-cta-footer icon-placement="right" cta-type="local" href="https://www.ibm.com/account/reg/signup?formid=urx-52629" slot="footer" aria-hidden="true" target="_blank" class="bx--card__footer-icon-size"> <span>Get the report</span> </dds-card-cta-footer> </dds-card-group-item> <dds-card-group-item href="https://www.ibm.com/topics/cyber-attack" target="_self" pictogram-placement="top" cta-type="local" aria-label="Learn more about ransomware" no-poster="true"> <dds-card-eyebrow slot="eyebrow" aria-hidden="true" class="bx--card__eyebrow"> Related topic </dds-card-eyebrow> <dds-card-heading role="heading" aria-level="3" slot="heading" class="bx--card__heading"> What is a cyberattack? </dds-card-heading> <p>A cyberattack is any intentional effort to steal, expose, alter, disable or destroy data, applications or other assets through unauthorized access to a network, computer system or digital device.</p> <dds-card-cta-footer icon-placement="right" cta-type="local" href="https://www.ibm.com/topics/cyber-attack" slot="footer" aria-hidden="true" target="_self" class="bx--card__footer-icon-size"> <span>Learn more</span> </dds-card-cta-footer> </dds-card-group-item> <dds-card-group-item href="https://www.ibm.com/topics/devops" target="_self" pictogram-placement="top" cta-type="local" aria-label="IBM Security Framing and Discovery Workshop" no-poster="true"> <dds-card-eyebrow slot="eyebrow" aria-hidden="true" class="bx--card__eyebrow"> Related topic </dds-card-eyebrow> <dds-card-heading role="heading" aria-level="3" slot="heading" class="bx--card__heading"> What is DevOps? </dds-card-heading> <p>DevOps is a software development methodology that accelerates the delivery of higher-quality applications and services by combining and automating the work of software development and IT operations teams.</p> <dds-card-cta-footer icon-placement="right" cta-type="local" href="https://www.ibm.com/topics/devops" slot="footer" aria-hidden="true" target="_self" class="bx--card__footer-icon-size"> <span>Learn more</span> </dds-card-cta-footer> </dds-card-group-item> </dds-card-group> </dds-content-block-cards> </div> </div> </div> </div> </div> </div> </div> <div class="experiencefragment"> <div id="experiencefragment-bad7be14e7" class="cmp-experiencefragment cmp-experiencefragment--security-services"> <div class="xf-content-height"> <div class="root container responsivegrid"> <div id="container-3ffa64b49a" class="cmp-container"> <div class="next-steps container responsivegrid"> <div id="next-steps-5a2246aee2" class="cmp-container"> <div class="next-steps-container"> <div data-cmp-is="next-steps-container" class="bx--next-steps-container"> <div class="bx--cta-section--g10 bx--cta-section--theme" data-dynamic-content-type="ADOBE_TARGET" data-component-name="next-steps" data-component-identifier="next-steps"> <dds-cta-block no-border class=" cta-block-section__container"> <div role="heading" data-autoid="dds--content-block__heading" class="bx--content-block__heading" slot="heading"> <a data-title="Take the next step" name="Take+the+next+step"></a> <span class="enhanced-title ">Take the next step</span> </div> <dds-content-block-copy size="sm"> <dds-content-block-paragraph> <div class="cms-richtext " id="rich-text-767b57a8c3" data-dynamic-inner-content="description"> <p>IBM cybersecurity services deliver advisory, integration and managed security services and offensive and defensive capabilities. We combine a global team of experts with proprietary and partner technology to co-create tailored security programs that manage risk.</p> </div> </dds-content-block-paragraph> </dds-content-block-copy> <dds-button-group slot="action"> <dds-button-cta href="https://www.ibm.com/services/security" target="_self" kind="primary" cta-type="local"> <span>Explore cybersecurity services</span> </dds-button-cta> <dds-button-cta href="https://www.ibm.com/account/reg/signup?formid=news-urx-52954" target="_blank" kind="tertiary" cta-type="local"> <span>Subscribe to the Think Newsletter</span> </dds-button-cta> </dds-button-group> </dds-cta-block> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> <div class="footnotes"><div driverLocation="1-2"> <div data-autoid="dds--content-block" class="bx--content-block"> <div class="bx--grid"> <div class="bx--row"> <div class="bx--col-lg-4"> <div data-autoid="dds--content-block-segmented" class="bx--content-block-segmented"> <h5> Footnotes </h5> </div> </div> <div class="bx--col-lg-12"> <div data-autoid="dds--content-block-segmented" class="bx--content-block-segmented"> <div class="cms-richtext " id="rich-text-3a6f4625cb" data-dynamic-inner-content="description"> <p><em>All links reside outside IBM.com.</em><br /> </p> <p><sup>1</sup> <a href="https://cybersecurityventures.com/top-5-cybersecurity-facts-figures-predictions-and-statistics-for-2021-to-2025/" target="_blank" rel="noopener noreferrer">Top 10 Cybersecurity Predictions And Statistics For 2024</a>, <em>Cybercrime Magazine,</em> 5 February 2024.</p> <p><sup>2</sup> <a href="https://comptiacdn.azureedge.net/webcontent/docs/default-source/research-reports/comptia-state-of-the-tech-workforce-2024.pdf" target="_blank" rel="noopener noreferrer">State of the Tech Workforce | Cyberstates 2024</a>, <em>The Computing Technology Industry Association (CompTIA),</em> March 2024.</p> <p><sup>3</sup> <a href="https://www.zdnet.com/article/cybercrime-can-be-the-biggest-threat-to-business-growth/" target="_blank" rel="noopener noreferrer">Cybercrime threatens business growth. Take these steps to mitigate your risk</a>, <em>ZDNet,</em> April 2022.</p> <p><sup>4 </sup> <a href="https://www3.weforum.org/docs/WEF_Strategic_Cybersecurity_Talent_Framework_2024.pdf" target="_blank" rel="noopener noreferrer">Strategic Cybersecurity Talent Framework</a>,<em> World Economic Forum,</em> April 2024.</p> <p><sup>5</sup> <a href="https://www.nist.gov/cyberframework" target="_blank" rel="noopener noreferrer">NIST Cybersecurity Framework</a>, <em>National Institute of Standards and Technology (NIST),</em> 26 February 2024.</p> <p><sup>6</sup> <a href="https://www.cisa.gov/topics/cybersecurity-best-practices" target="_blank" rel="noopener noreferrer">Cybersecurity Best Practices</a>, <em>Cybersecurity and Infrastructure Security Agency (CISA).</em></p> <p><sup>7</sup> <a href="https://www.hiscox.com/cybersecurity" target="_blank" rel="noopener noreferrer">The Hiscox Cyber Readiness Report 2023</a>, <em>Hiscox Insurance Company Inc.,</em> 2023.</p> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </dds-table-of-contents> </div> <div class="container responsivegrid"> <div id="container-ba3f74820e" class="cmp-container"> </div> </div> <div class="footer"> <dds-footer-container data-cmp-is="footer" data-autoid="dds--footer" class="cmp-footer" data-children-count="0" size="tall"></dds-footer-container> </div> </div> </div> </dds-video-cta-container> <div class="video-modal-overlay" aria-hidden="true"> <div class="video-modal-overlay__dialog"> <div class="video-modal-overlay__dialog--body"> <div class="video-modal-overlay__dialog--body__close-btn"> <svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"> <rect width="24" height="24" fill="white" fill-opacity="0.01" style="mix-blend-mode:multiply"/> <path id="Vector" d="M13.0606 12L19.5 5.56058L18.4394 4.5L12 10.9394L5.56072 4.5L4.5 5.56058L10.9394 12L4.5 18.4394L5.56072 19.5L12 13.0606L18.4394 19.5L19.5 18.4394L13.0606 12Z" fill="#161616"/> </svg> </div> <div class="video-modal-overlay__dialog--body-content"> <div class="video-modal-overlay__loading-container"> <bx-loading></bx-loading> </div> <div class="video-wms hide"> <iframe class="video-modal-content" data-original-src="https://video.ibm.com/embed/$[wmsChanneId]?volume=0&autoplay=true&controls=true" src="" webkitallowfullscreen allowfullscreen frameborder="no" referrerpolicy="no-referrer-when-downgrade"></iframe> </div> <div class="video-media-center hide"> <dds-video-player-container video-id="" aspect-ratio="16x9" auto-play muted playing-mode="inline"></dds-video-player-container> </div> </div> </div> </div> </div> <dds-lightbox-video-player-container></dds-lightbox-video-player-container> <script src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-idlBundle.lc-184f1369edfafb914817c747b0b7778e-lc.min.js"></script> <script src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-target-antiflicker.lc-36a1efb28e947b5873f4a28c2cf9d5eb-lc.min.js"></script> <script src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-idlStyles.lc-f5a7744980f951b41a897229a7802b6f-lc.min.js"></script> <script src="https://www.ibm.com/common/digitaladvisor/cm-app/latest/cm-app.min.js" defer async></script> <script type="module" src="https://1.www.s81c.com/common/carbon/web-components/version/v1.47.1/tag.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon/web-components/version/v1.47.1/code-snippet.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon/web-components/version/v1.47.1/loading.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/leadspace.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-group-banner.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-block-horizontal.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-item-horizontal.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/table-of-contents.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/tag-group.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-section.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-group-heading.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-block-simple.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-block-cards.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/cta-block.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-group.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/background-media.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-block-mixed.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/footer.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-group-simple.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/card-group.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/text-cta.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-block.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/link-list.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/link-list-item-cta.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/video-player.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/button-group.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/card-cta-footer.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-item.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/button-cta.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-block-segmented.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/horizontal-rule.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/lightbox-video-player.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/video-cta-container.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon/carbon-for-aem/version/v0.19.0/paragraph.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon/carbon-for-aem/version/v0.19.0/breadcrumb.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon/carbon-for-aem/version/v0.19.0/star-rating.min.js"></script> <script type="module" id="anti-flicker-script"> document.getElementById('anti-flicker-style').remove(); document.getElementById('anti-flicker-script').remove(); </script> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-pdfviewer.lc-e4412705ab74ab8b0e2e21371e0762c9-lc.min.js"></script> <!-- Added for Adobe analytics implementation ADCMS-5834 <script type="text/javascript"> adobeDataLayer.push({ "event": "linkClick", "web": { "webPageDetails": { "URL": document.URL, "name": "home" }, "webInteraction": { "linkClick":"event", "value":"1", "type": "other", "URL": document.URL, "name": "linkClick: " + document.URL } }, }) </script> !--> <!-- Added for Adobe analytics implementation ADCMS-5834 & ADCMS-6152 !--> <script type="text/javascript"> document.addEventListener("DOMContentLoaded", function() { var templatePath = "\/conf\/adobe\u002Dcms\u002Deditable\/settings\/wcm\/templates\/learn"; var templateName = templatePath.split('/').pop(); const currentUrl = document.URL; const parts = currentUrl.split("/"); const sectionOne = parts.length > 3 ? parts[3].split("?")[0] : ""; const sectionTwo = parts.length > 4 ? parts[4].split("?")[0] : ""; const sectionThree = parts.length > 5 ? parts[5].split("?")[0] : ""; function getCookieByName(name) { const cookieArr = document.cookie.split(';'); for (let i = 0; i < cookieArr.length; i++) { const cookie = cookieArr[i].trim(); if (cookie.startsWith(name + "=")) { return cookie.substring(name.length + 1); } } return null; } function cleanUrl(url) { let modifiedUrl = url; if (modifiedUrl.startsWith("www")) { modifiedUrl = modifiedUrl.replace(/^www\.?/, ""); } return modifiedUrl; } const cisSessionId = getCookieByName("CISSESSIONIDP07A"); let loginStatus = cisSessionId ? "logged in" : "logged out"; adobeDataLayer.push({ "event": "pageLoad", "_ibm": { "page": { "siteSection2": sectionTwo, "siteSection3": sectionThree, "pageType": templateName, "domain": cleanUrl(window.location.host), "siteLanguage": "en", "pageName": cleanUrl(window.location.host) + " | " + templateName + " | Cybersecurity", "siteCountry": "us" }, "user": { "userAgent": navigator.userAgent, "loginStatus": loginStatus } }, "web": { "webPageDetails": { "pageViews": { "value": 1 }, "URL": document.URL, "name": "Cybersecurity", "siteSection": sectionOne }, "webReferrer": { "URL": document.referrer } } }); document.addEventListener('click', function(event) { if (event.target.closest('.WACLauncher__ButtonContainer')) { handleClick(event); } }); function handleClick(event) { adobeDataLayer.push({ "event": "chatInitialized", "_ibm": { "chat": { "chatBotClick": { "value": 1 }, "liveChatType": "Support or Sales", "chatLanguage": "en", "chatCountry": "us" }, "click": { "linkTileNumber": 1 } }, "web": { "webPageDetails": { "URL": document.URL, "name": "Cybersecurity" }, "webInteraction": { "name": "chatInitialized", "URL": document.URL, "type": "other" } } }); } }); </script> <script type="text/javascript" src="/wFMLQjOq7Suq/My4Jcp/22I91s/za1hpG0NbzLzEcEO/ZR4HPEILAQ/Sy4kWkA2/Imk"></script><link rel="stylesheet" type="text/css" href="/wFMLQjOq7Suq/My4Jcp/22I91s/wz1h1t/K1F0O0ILAQ/KXkyVH1B/I15X"> <script src="/wFMLQjOq7Suq/My4Jcp/22I91s/wz1h1t/K1F0O0ILAQ/HXh8BTwk/HRQp" async defer></script> <div id="sec-overlay" style="display:none;"> <div id="sec-container"> </div> </div></body> </html>