CINXE.COM
What Is Ransomware? | IBM
<!DOCTYPE HTML> <html lang="en"> <head> <meta charset="UTF-8"/> <meta name="languageCode" content="en"/> <meta name="countryCode" content="us"/> <meta name="searchTitle" content="What Is Ransomware?"/> <meta name="focusArea" content="Security - All"/> <title>What Is Ransomware? | IBM</title> <script defer="defer" type="text/javascript" src="https://rum.hlx.page/.rum/@adobe/helix-rum-js@%5E2/dist/rum-standalone.js" data-routing="program=131558,environment=1281329,tier=publish"></script> <link rel="icon" href="/content/dam/adobe-cms/default-images/favicon.svg"/> <meta name="keywords" content="Ransomware"/> <meta name="description" content="Ransomware is a type of malware that holds data and devices hostage until a ransom is paid. "/> <meta name="template" content="learn"/> <meta name="viewport" content="width=device-width, initial-scale=1"/> <meta name="robots" content="index, follow, max-image-preview:large"/> <meta name="ibm.com.search.appid" content="thinkhub"/> <meta name="ibm.com.search.scopes" content="thinkhub"/> <meta name="dcterms.date" content="2024-06-04T00:00:00.000"/> <meta name="ibm.search.facet.field_hierarchy_01" content="taxonomy : Topics / Cybersecurity / Threat management / Cyberattack / Malware / Ransomware"/> <meta name="ibm.search.facet.field_hierarchy_02"/> <meta name="ibm.search.facet.field_hierarchy_03" content="taxonomy : Content Format / Article"/> <meta name="ibm.search.facet.field_hierarchy_04" content="taxonomy : Content Type / Explainer"/> <meta name="ibm.search.facet.field_hierarchy_05"/> <meta name="ibm.search.facet.field_keyword_01" content="Ransomware"/> <meta name="ibm.search.facet.field_keyword_09" content="https://prod-cloud-publish.aem.ibm.net/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/98/4d/content-hub-security-and-identity-page-leadspace-short.component.crop-thumbnail-16-by-9-retina.ts=0.png/content/adobe-cms/us/en/topics/ransomware/jcr:content/root/leadspace"/> <meta name="ibm.search.facet.field_keyword_14"/> <meta name="ibm.search.facet.field_text_01" content="04 June 2024"/> <meta name="ibm.search.facet.field_text_03" content="Explainer"/> <link rel="canonical" href="https://www.ibm.com/topics/ransomware"/> <style id="anti-flicker-style"> :not(:defined) { visibility: hidden; } </style> <!-- <sly data-sly-test="false"> <link href="//1.www.s81c.com/common/v18/css/www.css" rel="preload" as="style"/> <link rel="stylesheet" href="//1.www.s81c.com/common/v18/css/www.css" media="all"/> <link href="//1.www.s81c.com/common/v18/css/grid-fluid.css" rel="preload" as="style"/> <link rel="stylesheet" href="//1.www.s81c.com/common/v18/css/grid-fluid.css" media="all"/> <link href="//1.www.s81c.com/common/v19a/css/www.css" rel="stylesheet"/> </sly>--> <script src="https://assets.adobedtm.com/0f2de1d5b89a/565c2aeb0d39/launch-560e54b3e83c.min.js" type="text/javascript" async="async"></script> <script type="text/javascript" async="async"> var adobeDataLayer = window.adobeDataLayer || []; </script> <script type="text/javascript"> window.searchKey = { templateName: 'learn', taxonomylist: 'taxonomy : Topics \/ Cybersecurity \/ Threat management \/ Cyberattack \/ Malware \/ Ransomware', L0Tag: 'Topics,Brands,Industries,Geography,Compliance Entities,Products,Events,Computer Languages,Content Format,Series,Content Type,CMaaS Focus Areas,brands,Deployment Types,Product Types,Search Index', } </script> <link rel="alternate" hreflang="it-it" href="https://www.ibm.com/it-it/topics/ransomware"/> <link rel="alternate" hreflang="de-de" href="https://www.ibm.com/de-de/topics/ransomware"/> <link rel="alternate" hreflang="en-us" href="https://www.ibm.com/topics/ransomware"/> <link rel="alternate" hreflang="ko-kr" href="https://www.ibm.com/kr-ko/topics/ransomware"/> <link rel="alternate" hreflang="pt-br" href="https://www.ibm.com/br-pt/topics/ransomware"/> <link rel="alternate" hreflang="id-id" href="https://www.ibm.com/id-id/topics/ransomware"/> <link rel="alternate" hreflang="es-es" href="https://www.ibm.com/es-es/topics/ransomware"/> <link rel="alternate" hreflang="fr-fr" href="https://www.ibm.com/fr-fr/topics/ransomware"/> <link rel="alternate" hreflang="zh-cn" href="https://www.ibm.com/cn-zh/topics/ransomware"/> <link rel="alternate" hreflang="es-mx" href="https://www.ibm.com/mx-es/topics/ransomware"/> <link rel="alternate" hreflang="ja-jp" href="https://www.ibm.com/jp-ja/topics/ransomware"/> <script type="text/javascript"> window.antiFlicker = { active: true, timeout: 3000 } </script> <script type="text/javascript"> var languageCode = document.getElementsByName('languageCode')[0].content; var countryCode = document.getElementsByName('countryCode')[0].content; var focusArea = document.getElementsByName('focusArea')[0].content; /* Define digital data object based on _appInfo object */ window._ibmAnalytics = { settings: { name: "AEM Sites", tealiumProfileName: "aem-sites" }, }; window.digitalData = { page: { category: { primaryCategory: '', }, pageInfo: { language: languageCode + '-' + countryCode, ibm: { siteID: 'MarketingAEM', country: countryCode, messaging: { routing: { focusArea: focusArea, languageCode: languageCode, regionCode: countryCode }, translation: { languageCode: languageCode, regionCode: countryCode } }, sections: 0, patterns: 0, }, carbon: { '@carbon/web-components': 'v1.47.1', '@carbon/ibmdotcom-web-components': 'v1.51.1', 'carbon-for-aem': 'v0.19.0', }, }, }, }; </script> <script type="application/ld+json"> { "@context": "https://schema.org", "@type": "BlogPosting", "mainEntityOfPage": { "@type": "WebPage", "@id": "https://www.ibm.com/topics/ransomware" }, "headline": "Ransomware", "image": [ "https://www.ibm.com/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/98/4d/content-hub-security-and-identity-page-leadspace-short.png" ], "datePublished": "", "dateModified": "2024-10-01T13:08:39.751Z", "author": {"@type": "Organization","name": "IBM","url": "https://www.ibm.com"} } </script> <!-- Instana script specific to Dev environment start --> <!-- <script> (function(s,t,a,n){s[t]||(s[t]=a,n=s[a]=function(){n.q.push(arguments)}, n.q=[],n.v=2,n.l=1*new Date)})(window,"InstanaEumObject","ineum"); ineum('reportingUrl', 'https://eum-orange-saas.instana.io'); ineum('key', 'mFJnYtpBSiCKl9zenWHXtg'); ineum('trackSessions'); </script> <script defer crossorigin="anonymous" src=https://eum.instana.io/1.7.2/eum.min.js integrity="sha384-cgeSlevgebehPauohUhsnAeBrpjXzaj94mSv3L2EXjCQH0RRb9xSQ2ErGOWkthIJ"></script>--> <!-- Instana script specific to Dev environment end --> <meta property="og:url" content="https://www.ibm.com/topics/ransomware"/> <meta property="og:type" content="website"/> <meta property="og:title" content="What Is Ransomware? | IBM"/> <meta property="og:description" content="Ransomware is a type of malware that holds data and devices hostage until a ransom is paid. "/> <meta property="og:image" content="https://assets.ibm.com/is/image/ibm/ibm-8bar-logo-2560x2560?$original$"/> <script src="https://1.www.s81c.com/common/stats/ibm-common.js" type="text/javascript" async="async"></script> <script src="https://hybrid-cloud-widgets-production.s3.us.cloud-object-storage.appdomain.cloud/loader.js" type="application/javascript"></script> <link rel="stylesheet" href="/etc.clientlibs/adobe-cms/clientlibs/clientlib-idlStylesCarbon.lc-92a431776e26f162dd2424f414af0c9a-lc.min.css" type="text/css"> <link rel="stylesheet" href="/etc.clientlibs/adobe-cms/clientlibs/clientlib-idlStyles.lc-781111ab1b5d0bf5e1a3598eac05aba5-lc.min.css" type="text/css"> <link rel="stylesheet" href="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/tag/v1/latest/plex.css"/> <link rel="stylesheet" href="https://1.www.s81c.com/common/carbon/plex/sans.css"/> <link rel="stylesheet" href="/etc.clientlibs/adobe-cms/clientlibs/clientlib-pdfviewer.lc-c79c6cf22a5b660f493131a4be3ded5f-lc.min.css" type="text/css"> </head> <body class="learn-page content-page page basicpage publish" id="learn-page-830f8e719d" data-fullwidthtemplate="false"> <dds-video-cta-container> <div class="root container responsivegrid"> <div id="container-e9b80bd4f1" class="cmp-container"> <div class="masthead"> <c4d-masthead-container data-endpoint="#" auth-method="profile-api" has-contact="true" has-profile has-search has-cart></c4d-masthead-container> <script src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v2.15.0/masthead.min.js" type="module"></script> <script> let l0Json = "{\x22profileMenu\x22:{\x22signedout\x22:[{\x22title\x22:\x22My IBM\x22,\x22url\x22:\x22https:\/\/myibm.ibm.com\/?lnk=mmi\x22},{\x22title\x22:\x22Log in\x22,\x22url\x22:\x22https:\/\/login.ibm.com\/oidc\/endpoint\/default\/authorize?redirect_uri=https%3A%2F%2Fmyibm.ibm.com%2FOIDCHandler.html\x26response_type=token\x26client_id=v18LoginProdCI\x26scope=openid\x26state=https%3A%2F%2Fwww.ibm.com\x26nonce=8675309\x22}],\x22signedin\x22:[{\x22title\x22:\x22My IBM\x22,\x22url\x22:\x22https:\/\/myibm.ibm.com\/?lnk=mmi\x22},{\x22title\x22:\x22Log in\x22,\x22url\x22:\x22https:\/\/login.ibm.com\/oidc\/endpoint\/default\/authorize?redirect_uri=https%3A%2F%2Fmyibm.ibm.com%2FOIDCHandler.html\x26response_type=token\x26client_id=v18LoginProdCI\x26scope=openid\x26state=https%3A%2F%2Fwww.ibm.com\x26nonce=8675309\x22}]},\x22mastheadNav\x22:{\x22links\x22:[{\x22title\x22:\x22Products\x22,\x22url\x22:\x22\x22,\x22submenu\x22:{\x22sections\x22:[{\x22heading\x22:{\x22title\x22:\x22Featured\x22,\x22description\x22:\x22\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22API Connect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/api\u002Dconnect?lnk=flatitem\x22,\x22description\x22:\x22Software to rapidly create, protect, socialize and manage APIs\x22},{\x22title\x22:\x22Concert\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/concert?lnk=flatitem\x22,\x22description\x22:\x22AI to analyze and manage IT infrastructure using natural language\x22},{\x22title\x22:\x22Environmental Intelligence\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/environmental\u002Dintelligence?lnk=flatitem\x22,\x22description\x22:\x22SaaS for predicting and responding to weather and climate events\x22},{\x22title\x22:\x22Envizi\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/envizi?lnk=flatitem\x22,\x22description\x22:\x22ESG data management, reporting and analysis SaaS\x22},{\x22title\x22:\x22FlashSystem\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/flashsystem?lnk=flatitem\x22,\x22description\x22:\x22Primary storage for performance and latency sensitive workloads\x22},{\x22title\x22:\x22Hybrid Cloud Mesh\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/hybrid\u002Dcloud\u002Dmesh?lnk=flatitem\x22,\x22description\x22:\x22SaaS for deploying and managing hybrid and multicloud networks\x22},{\x22title\x22:\x22IBM Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/cloud?lnk=flatitem\x22,\x22description\x22:\x22On\u002Ddemand cloud computing platform and APIs\x22},{\x22title\x22:\x22IBM Z\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/z?lnk=flatitem\x22,\x22description\x22:\x22Flagship mainframe with on\u002Dchip AI and quantum\u002Dsafe cryptography\x22},{\x22title\x22:\x22Instana\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/instana?lnk=flatitem\x22,\x22description\x22:\x22Software for application performance monitoring and automation\x22},{\x22title\x22:\x22MaaS360\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/maas360?lnk=flatitem\x22,\x22description\x22:\x22Unified endpoint management software for many device types\x22},{\x22title\x22:\x22Maximo\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/maximo?lnk=flatitem\x22,\x22description\x22:\x22Software for asset management and related workflows\x22},{\x22title\x22:\x22Planning Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/planning\u002Danalytics?lnk=flatitem\x22,\x22description\x22:\x22Software to automate financial and operational planning\x22},{\x22title\x22:\x22Robotic Process Automation (RPA)\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/robotic\u002Dprocess\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22Software to automate workflows and business processes\x22},{\x22title\x22:\x22Storage Defender\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Ddefender?lnk=flatitem\x22,\x22description\x22:\x22Data resiliency software for threat detection and data recovery\x22},{\x22title\x22:\x22Turbonomic\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/turbonomic?lnk=flatitem\x22,\x22description\x22:\x22Software to manage and optimize IT resource usage\x22},{\x22title\x22:\x22watsonx\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/watsonx?lnk=flatitem\x22,\x22description\x22:\x22AI and data platform\x22},{\x22title\x22:\x22watsonx Assistant\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dassistant?lnk=flatitem\x22,\x22description\x22:\x22Virtual agents customizable to any domain\x22},{\x22title\x22:\x22watsonx Orchestrate\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dorchestrate?lnk=flatitem\x22,\x22description\x22:\x22Personal\u002Dassistant software that automates repetitive tasks\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22AI \x26 machine learning\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/artificial\u002Dintelligence?lnk=flathl\x22,\x22description\x22:\x22Use IBM Watson’s AI or build your own machine learning models\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloud Pak for AIOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Daiops?lnk=flatitem\x22,\x22description\x22:\x22DevOps management tool with AI analysis and recommendations\x22},{\x22title\x22:\x22Cloud Pak for Data\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Ddata?lnk=flatitem\x22,\x22description\x22:\x22Tools for data analysis, organization and management\x22},{\x22title\x22:\x22Knowledge Catalog\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/knowledge\u002Dcatalog?lnk=flatitem\x22,\x22description\x22:\x22SaaS to catalog data, AI models, metadata, policies and more\x22},{\x22title\x22:\x22Watson Discovery\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watson\u002Ddiscovery?lnk=flatitem\x22,\x22description\x22:\x22AI to search in and answer questions about business documents\x22},{\x22title\x22:\x22Watson Natural Language Understanding\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/natural\u002Dlanguage\u002Dunderstanding?lnk=flatitem\x22,\x22description\x22:\x22API for text analysis and metadata extraction\x22},{\x22title\x22:\x22Watson Speech to Text\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/speech\u002Dto\u002Dtext?lnk=flatitem\x22,\x22description\x22:\x22API for real\u002Dtime speech recognition and transcription\x22},{\x22title\x22:\x22Watson Studio\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watson\u002Dstudio?lnk=flatitem\x22,\x22description\x22:\x22IDE to build, run and manage AI models\x22},{\x22title\x22:\x22Watson Text to Speech\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/text\u002Dto\u002Dspeech?lnk=flatitem\x22,\x22description\x22:\x22API for real\u002Dtime text to speech conversion\x22},{\x22title\x22:\x22Z Anomaly Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/z\u002Danomaly\u002Danalytics?lnk=flatitem\x22,\x22description\x22:\x22Operational anomaly detection software for mainframes\x22},{\x22title\x22:\x22watsonx\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/watsonx?lnk=flatitem\x22,\x22description\x22:\x22AI and data platform\x22},{\x22title\x22:\x22watsonx Assistant\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dassistant?lnk=flatitem\x22,\x22description\x22:\x22Virtual agents customizable to any domain\x22},{\x22title\x22:\x22watsonx Code Assistant\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dcode\u002Dassistant?lnk=flatitem\x22,\x22description\x22:\x22AI tool to generate code\x22},{\x22title\x22:\x22watsonx Orders\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dorders?lnk=flatitem\x22,\x22description\x22:\x22AI voice agent for taking restaurant orders\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/analytics?lnk=flathl\x22,\x22description\x22:\x22Aggregate and analyze large datasets\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Business Analytics Enterprise\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/business\u002Danalytics\u002Denterprise?lnk=flatitem\x22,\x22description\x22:\x22Software for business planning and analysis\x22},{\x22title\x22:\x22CPLEX\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ilog\u002Dcplex\u002Doptimization\u002Dstudio?lnk=flatitem\x22,\x22description\x22:\x22Software to build and solve complex optimization models\x22},{\x22title\x22:\x22Cloud Pak for Data\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Ddata?lnk=flatitem\x22,\x22description\x22:\x22Tools for data analysis, organization and management\x22},{\x22title\x22:\x22Cognos Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cognos\u002Danalytics?lnk=flatitem\x22,\x22description\x22:\x22Software for business intelligence and performance management\x22},{\x22title\x22:\x22Databand\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databand?lnk=flatitem\x22,\x22description\x22:\x22Data observability software for data engineers and DataOps teams\x22},{\x22title\x22:\x22InfoSphere Information Server\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/information\u002Dserver?lnk=flatitem\x22,\x22description\x22:\x22Data integration suite for ETL, governance and analysis\x22},{\x22title\x22:\x22Manta Data Lineage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/manta\u002Ddata\u002Dlineage?lnk=flatitem\x22,\x22description\x22:\x22Software to visualize the flow of data from origin to consumption\x22},{\x22title\x22:\x22Netezza\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/netezza?lnk=flatitem\x22,\x22description\x22:\x22Data warehousing and analytics system on custom hardware\x22},{\x22title\x22:\x22Optim\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/infosphere\u002Doptim?lnk=flatitem\x22,\x22description\x22:\x22Software to manage test, production, and archived data\x22},{\x22title\x22:\x22Planning Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/planning\u002Danalytics?lnk=flatitem\x22,\x22description\x22:\x22Software to automate financial and operational planning\x22},{\x22title\x22:\x22SPSS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/spss?lnk=flatitem\x22,\x22description\x22:\x22Software for statistical analysis and business intelligence\x22},{\x22title\x22:\x22Spectrum Computing\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/high\u002Dperformance\u002Dcomputing?lnk=flatitem\x22,\x22description\x22:\x22Software to optimize resources in complex computing clusters\x22},{\x22title\x22:\x22StreamSets\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/streamsets?lnk=flatitem\x22,\x22description\x22:\x22Graphical interface to build and manage streaming data pipelines\x22},{\x22title\x22:\x22Watson Discovery\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watson\u002Ddiscovery?lnk=flatitem\x22,\x22description\x22:\x22AI to search in and answer questions about business documents\x22},{\x22title\x22:\x22Watson Studio\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watson\u002Dstudio?lnk=flatitem\x22,\x22description\x22:\x22IDE to build, run and manage AI models\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Asset lifecycle management\x22,\x22description\x22:\x22Manage and maintain physical assets\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Environmental Intelligence\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/environmental\u002Dintelligence?lnk=flatitem\x22,\x22description\x22:\x22SaaS for predicting and responding to weather and climate events\x22},{\x22title\x22:\x22Envizi\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/envizi?lnk=flatitem\x22,\x22description\x22:\x22ESG data management, reporting and analysis SaaS\x22},{\x22title\x22:\x22Maximo\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/maximo?lnk=flatitem\x22,\x22description\x22:\x22Software for asset management and related workflows\x22},{\x22title\x22:\x22TRIRIGA\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/tririga?lnk=flatitem\x22,\x22description\x22:\x22Software for real estate and workplace management\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Business automation\x22,\x22description\x22:\x22Automate workflows and business processes\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Blueworks Live\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/blueworkslive?lnk=flatitem\x22,\x22description\x22:\x22SaaS for collaboratively modeling business processes\x22},{\x22title\x22:\x22Business Automation Manager Open Editions\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/business\u002Dautomation\u002Dmanager\u002Dopen\u002Deditions?lnk=flatitem\x22,\x22description\x22:\x22Workflow automation and decision management software\x22},{\x22title\x22:\x22Business Automation Workflow\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/business\u002Dautomation\u002Dworkflow?lnk=flatitem\x22,\x22description\x22:\x22Cloud Pak for Business Automation add\u002Don to automate workflows\x22},{\x22title\x22:\x22Cloud Pak for Business Automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Dbusiness\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22Operations management software with AI insights\x22},{\x22title\x22:\x22Datacap\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/data\u002Dcapture\u002Dand\u002Dimaging?lnk=flatitem\x22,\x22description\x22:\x22Document management for IBM Cloud Pak for Business Automation\x22},{\x22title\x22:\x22Event Automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/event\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22No\u002Dcode tool for building automated event driven workflows\x22},{\x22title\x22:\x22FileNet Content Manager\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/filenet\u002Dcontent\u002Dmanager?lnk=flatitem\x22,\x22description\x22:\x22Content management solution for Cloud Pak for Business Automation\x22},{\x22title\x22:\x22Operational Decision Manager\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/operational\u002Ddecision\u002Dmanager?lnk=flatitem\x22,\x22description\x22:\x22Cloud Pak for Business Automation addon for rule\u002Dbased decisions\x22},{\x22title\x22:\x22Process Mining\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/process\u002Dmining?lnk=flatitem\x22,\x22description\x22:\x22Software to extract process data from business applications\x22},{\x22title\x22:\x22Robotic Process Automation (RPA)\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/robotic\u002Dprocess\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22Software to automate workflows and business processes\x22},{\x22title\x22:\x22watsonx Orchestrate\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dorchestrate?lnk=flatitem\x22,\x22description\x22:\x22Personal\u002Dassistant software that automates repetitive tasks\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Containers\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/containers?lnk=flathl\x22,\x22description\x22:\x22Allocate compute infrastructure on demand\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloud Satellite\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/satellite?lnk=flatitem\x22,\x22description\x22:\x22Platform for running managed cloud services on any infrastructure\x22},{\x22title\x22:\x22Code Engine\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/code\u002Dengine?lnk=flatitem\x22,\x22description\x22:\x22Managed serverless runtime for containers, batch jobs, or code\x22},{\x22title\x22:\x22Container Registry\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/container\u002Dregistry?lnk=flatitem\x22,\x22description\x22:\x22Private SaaS registry for container storage and management\x22},{\x22title\x22:\x22Kubernetes Service\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/kubernetes\u002Dservice?lnk=flatitem\x22,\x22description\x22:\x22Managed Kubernetes for high availability container deployments\x22},{\x22title\x22:\x22Red Hat OpenShift on IBM Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/openshift?lnk=flatitem\x22,\x22description\x22:\x22Managed service with tools for security, management and monitoring\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Databases\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/database?lnk=flathl\x22,\x22description\x22:\x22Store, query and analyze structured data\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloudant\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloudant?lnk=flatitem\x22,\x22description\x22:\x22Managed PCI\u002Dcompliant JSON document store on Apache CouchDB\x22},{\x22title\x22:\x22Db2\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/db2\u002Ddatabase?lnk=flatitem\x22,\x22description\x22:\x22Data management software including IBM Db2 Database\x22},{\x22title\x22:\x22Db2 for z\/OS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/db2\u002Dfor\u002Dzos?lnk=flatitem\x22,\x22description\x22:\x22IBM Db2 Database for IBM Z mainframes\x22},{\x22title\x22:\x22IBM Cloud Databases for Elastic Search\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Delasticsearch?lnk=flatitem\x22,\x22description\x22:\x22JSON document store for full\u002Dtext search\x22},{\x22title\x22:\x22IBM Cloud Databases for EnterpriseDB\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Denterprisedb?lnk=flatitem\x22,\x22description\x22:\x22PostgreSQL with added performance, security and management features\x22},{\x22title\x22:\x22IBM Cloud Databases for MongoDB\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Dmongodb?lnk=flatitem\x22,\x22description\x22:\x22Managed NoSQL JSON document store\x22},{\x22title\x22:\x22IBM Cloud Databases for MySQL\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Dmysql?lnk=flatitem\x22,\x22description\x22:\x22Managed SQL database\x22},{\x22title\x22:\x22IBM Cloud Databases for PostgreSQL\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Dpostgresql?lnk=flatitem\x22,\x22description\x22:\x22Managed SQL database with advanced features\x22},{\x22title\x22:\x22IBM Cloud Databases for etcd\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Detcd?lnk=flatitem\x22,\x22description\x22:\x22Distributed key\u002Dvalue store\x22},{\x22title\x22:\x22Information Management System (IMS)\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ims?lnk=flatitem\x22,\x22description\x22:\x22Database and management system for high\u002Dvolume transactions\x22},{\x22title\x22:\x22Informix\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/informix?lnk=flatitem\x22,\x22description\x22:\x22Embeddable database for SQL, NoSQL, time\u002Dseries and spatial data\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22DevOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/devops?lnk=flathl\x22,\x22description\x22:\x22Manage infrastructure, environments and deployments\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Application Delivery Foundation for z\/OS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Ddelivery\u002Dfoundation\u002Dfor\u002Dzos?lnk=flatitem\x22,\x22description\x22:\x22Application development and DevOps tools for z\/OS\x22},{\x22title\x22:\x22Application Discovery and Delivery Intelligence\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Ddiscovery\u002Dand\u002Ddelivery\u002Dintelligence?lnk=flatitem\x22,\x22description\x22:\x22Analysis tool for visualizing applications, data and jobs on z\/OS\x22},{\x22title\x22:\x22Cloud Continuous Delivery\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/continuous\u002Ddelivery?lnk=flatitem\x22,\x22description\x22:\x22Toolchains to automate building and deploying applications\x22},{\x22title\x22:\x22Cloud Pak for AIOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Daiops?lnk=flatitem\x22,\x22description\x22:\x22DevOps management tool with AI analysis and recommendations\x22},{\x22title\x22:\x22DevOps Build\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/devops\u002Dbuild?lnk=flatitem\x22,\x22description\x22:\x22Management tool for configuring and running software builds\x22},{\x22title\x22:\x22DevOps Code ClearCase\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/devops\u002Dcode\u002Dclearcase?lnk=flatitem\x22,\x22description\x22:\x22Configuration management system for software asset access control\x22},{\x22title\x22:\x22DevOps Deploy\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/devops\u002Ddeploy?lnk=flatitem\x22,\x22description\x22:\x22Automation software for continuous delivery and deployment\x22},{\x22title\x22:\x22DevOps Test\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/devops\u002Dtest?lnk=flatitem\x22,\x22description\x22:\x22Continuous testing and virtualization platform\x22},{\x22title\x22:\x22DevOps Velocity\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/devops\u002Dvelocity?lnk=flatitem\x22,\x22description\x22:\x22Release management software for pipeline orchestration and analytics\x22},{\x22title\x22:\x22Engineering Lifecycle Management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/engineering\u002Dlifecycle\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22Software for product and application lifecycle management\x22},{\x22title\x22:\x22IBM i Modernization Engine\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ibm\u002Di\u002Dmerlin?lnk=flatitem\x22,\x22description\x22:\x22Development and modernization tools for IBM i applications\x22},{\x22title\x22:\x22Rational ClearQuest\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/rational\u002Dclearquest?lnk=flatitem\x22,\x22description\x22:\x22Change management software\x22},{\x22title\x22:\x22Rational Software Architect Designer\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/rational\u002Dsoftware\u002Darchitect\u002Ddesigner?lnk=flatitem\x22,\x22description\x22:\x22Tools to create, evaluate, and communicate software architecture\x22},{\x22title\x22:\x22Test Accelerator for Z\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/test\u002Daccelerator\u002Dz?lnk=flatitem\x22,\x22description\x22:\x22Test automation and test generation framework for z\/OS\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22IT automation\x22,\x22description\x22:\x22Automate IT infrastructure management\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Apptio\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/apptio?lnk=flatitem\x22,\x22description\x22:\x22Hybrid cloud financial management and planning software\x22},{\x22title\x22:\x22Cloud App Configuration\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Dconfiguration?lnk=flatitem\x22,\x22description\x22:\x22Feature management and configuration service for web and mobile apps\x22},{\x22title\x22:\x22Cloud App ID\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Did?lnk=flatitem\x22,\x22description\x22:\x22Authentication and user management service for web and mobile apps\x22},{\x22title\x22:\x22Cloud Monitoring\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dmonitoring?lnk=flatitem\x22,\x22description\x22:\x22Hosted monitoring tool for organization\u002Dwide system performance\x22},{\x22title\x22:\x22Cloud Pak for AIOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Daiops?lnk=flatitem\x22,\x22description\x22:\x22DevOps management tool with AI analysis and recommendations\x22},{\x22title\x22:\x22Cloud Schematics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/schematics?lnk=flatitem\x22,\x22description\x22:\x22Management and provisionining of cloud infrastructure with code\x22},{\x22title\x22:\x22Concert\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/concert?lnk=flatitem\x22,\x22description\x22:\x22AI to analyze and manage IT infrastructure using natural language\x22},{\x22title\x22:\x22Event Notifications\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/event\u002Dnotifications?lnk=flatitem\x22,\x22description\x22:\x22Notification and workflow automation service for IBM Cloud events\x22},{\x22title\x22:\x22Flexera One\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/flexera\u002Done?lnk=flatitem\x22,\x22description\x22:\x22IT asset management software\x22},{\x22title\x22:\x22IBM Cloud Logs\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dlogs?lnk=flatitem\x22,\x22description\x22:\x22Logging and observability service for applications and infrastructure\x22},{\x22title\x22:\x22Instana\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/instana?lnk=flatitem\x22,\x22description\x22:\x22Software for application performance monitoring and automation\x22},{\x22title\x22:\x22Turbonomic\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/turbonomic?lnk=flatitem\x22,\x22description\x22:\x22Software to manage and optimize IT resource usage\x22},{\x22title\x22:\x22Z IntelliMagic Vision for z\/OS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/z\u002Dintellimagic\u002Dvision\u002Dfor\u002Dzos?lnk=flatitem\x22,\x22description\x22:\x22Infrastructure performance management and monitoring software\x22},{\x22title\x22:\x22Z Service Management Suite\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/z\u002Dservice\u002Dmanagement\u002Dsuite?lnk=flatitem\x22,\x22description\x22:\x22Monitoring, control, and automation suite for Z\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Middleware\x22,\x22description\x22:\x22Connect your applications, data and events\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22API Connect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/api\u002Dconnect?lnk=flatitem\x22,\x22description\x22:\x22Software to rapidly create, protect, socialize and manage APIs\x22},{\x22title\x22:\x22App Connect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Dconnect?lnk=flatitem\x22,\x22description\x22:\x22Codeless connectors for your data, apps and APIs\x22},{\x22title\x22:\x22Aspera\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/aspera?lnk=flatitem\x22,\x22description\x22:\x22System to transfer, sync or stream huge data globally\x22},{\x22title\x22:\x22CICS Transaction Server for z\/OS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cics\u002Dtransaction\u002Dserver?lnk=flatitem\x22,\x22description\x22:\x22Application server for online transaction processing\x22},{\x22title\x22:\x22Cloud Pak for Applications\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Dapplications?lnk=flatitem\x22,\x22description\x22:\x22Kubernetes\u002Dbased platform for hybrid cloud applications\x22},{\x22title\x22:\x22Cloud Pak for Integration\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Dintegration?lnk=flatitem\x22,\x22description\x22:\x22Tools to connect all of your apps, data and events\x22},{\x22title\x22:\x22DataPower\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/datapower\u002Dgateway?lnk=flatitem\x22,\x22description\x22:\x22Physical or virtual multi\u002Dprotocol network gateway\x22},{\x22title\x22:\x22Event Streams\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/event\u002Dstreams?lnk=flatitem\x22,\x22description\x22:\x22PaaS stream processing based on Apache Kafka\x22},{\x22title\x22:\x22IBM Cloud Messages for RabbitMQ\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/messages\u002Dfor\u002Drabbitmq?lnk=flatitem\x22,\x22description\x22:\x22Managed open\u002Dsource message broker\x22},{\x22title\x22:\x22IBM webMethods\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/webmethods?lnk=flatitem\x22,\x22description\x22:\x22iPaaS capabilities including app integration, API management, B2B integration and managed file transfer\x22},{\x22title\x22:\x22Information Management System\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ims?lnk=flatitem\x22,\x22description\x22:\x22Hierarchical database and transaction processor for Z\x22},{\x22title\x22:\x22MQ\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/mq?lnk=flatitem\x22,\x22description\x22:\x22Software and hardware for messaging between distributed systems\x22},{\x22title\x22:\x22z\/OS Connect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/zos\u002Dconnect?lnk=flatitem\x22,\x22description\x22:\x22Software to build and serve RESTful APIs to z\/OS applications\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Network\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/networking?lnk=flathl\x22,\x22description\x22:\x22Run and manage public, private and virtual networks\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloud Pak for Network Automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Dnetwork\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22Management software for telco network operations\x22},{\x22title\x22:\x22Hybrid Cloud Mesh\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/hybrid\u002Dcloud\u002Dmesh?lnk=flatitem\x22,\x22description\x22:\x22SaaS for deploying and managing hybrid and multicloud networks\x22},{\x22title\x22:\x22NS1 Connect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ns1\u002Dconnect?lnk=flatitem\x22,\x22description\x22:\x22Authoritative DNS and traffic steering as a service\x22},{\x22title\x22:\x22Rapid Network Automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/rapid\u002Dnetwork\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22No\u002Dcode tool to build automation workflows across apps and APIs\x22},{\x22title\x22:\x22SevOne Network Performance Management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/sevone\u002Dnetwork\u002Dperformance\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22Software to collect and analyze network performance data\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Operating systems\x22,\x22description\x22:\x22Run critical workloads on specialized operating systems\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22AIX\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/aix?lnk=flatitem\x22,\x22description\x22:\x22UNIX operating system for Power servers\x22},{\x22title\x22:\x22IBM i\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ibm\u002Di?lnk=flatitem\x22,\x22description\x22:\x22Integrated operating system for Power servers\x22},{\x22title\x22:\x22Linux\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/linux?lnk=flatitem\x22,\x22description\x22:\x22Run Linux workloads on IBM servers\x22},{\x22title\x22:\x22z\/OS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/zos?lnk=flatitem\x22,\x22description\x22:\x22Flagship OS for continuous, high\u002Dvolume mainframe operation\x22},{\x22title\x22:\x22z\/TPF\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/z\u002Dtransaction\u002Dprocessing\u002Dfacility?lnk=flatitem\x22,\x22description\x22:\x22Real\u002Dtime operating system for mainframes\x22},{\x22title\x22:\x22z\/VM\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/zvm?lnk=flatitem\x22,\x22description\x22:\x22Hypervisor and virtualization software for IBM Z and LinuxONE\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Quantum\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/quantum?lnk=flathl\x22,\x22description\x22:\x22Run code on real quantum systems using a full\u002Dstack SDK\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Qiskit Runtime\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/quantum\/qiskit?lnk=flatitem\x22,\x22description\x22:\x22Cloud service for executing quantum workloads at scale\x22},{\x22title\x22:\x22Quantum Safe\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/quantum\/quantum\u002Dsafe?lnk=flatitem\x22,\x22description\x22:\x22Technology and consulting services for quantum\u002Dsafe cryptography\x22},{\x22title\x22:\x22Quantum Systems\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/quantum\/technology?lnk=flatitem\x22,\x22description\x22:\x22Quantum computing systems accessible on the cloud\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Security \x26 identity\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/security?lnk=flathl\x22,\x22description\x22:\x22Cloud\u002Dnative software to secure resources and simplify compliance\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloud AppID\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Did?lnk=flatitem\x22,\x22description\x22:\x22Authentication and user profiles as a service for mobile and web apps\x22},{\x22title\x22:\x22Cloud Security and Compliance Center\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/security\u002Dand\u002Dcompliance\u002Dcenter?lnk=flatitem\x22,\x22description\x22:\x22SaaS to define and audit the compliance posture of your cloud\x22},{\x22title\x22:\x22Data Security Broker\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/data\u002Dsecurity\u002Dbroker?lnk=flatitem\x22,\x22description\x22:\x22Administrative console to enable data encryption in the cloud\x22},{\x22title\x22:\x22Guardium\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/guardium?lnk=flatitem\x22,\x22description\x22:\x22Suite for data encryption, management and simplified compliance\x22},{\x22title\x22:\x22Key Protect for IBM Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/key\u002Dprotect?lnk=flatitem\x22,\x22description\x22:\x22Tool to provision and store keys for apps across IBM Cloud services\x22},{\x22title\x22:\x22MaaS360\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/maas360?lnk=flatitem\x22,\x22description\x22:\x22Unified endpoint management for mobile workforces\x22},{\x22title\x22:\x22QRadar EDR\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/qradar\u002Dedr?lnk=flatitem\x22,\x22description\x22:\x22Advanced AI threat detection and response for endpoints\x22},{\x22title\x22:\x22QRadar SIEM\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/qradar\u002Dsiem?lnk=flatitem\x22,\x22description\x22:\x22Threat detection and prioritization for real\u002Dtime visibility\x22},{\x22title\x22:\x22QRadar SOAR\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/qradar\u002Dsoar?lnk=flatitem\x22,\x22description\x22:\x22Automation and workflow management for security operations\x22},{\x22title\x22:\x22Trusteer\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/trusteer?lnk=flatitem\x22,\x22description\x22:\x22Software to authenticate customers, detect fraud and assess risk\x22},{\x22title\x22:\x22Verify\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/verify?lnk=flatitem\x22,\x22description\x22:\x22Identity, authentication, and access control software\x22},{\x22title\x22:\x22zSecure\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/zsecure?lnk=flatitem\x22,\x22description\x22:\x22Security, risk management and compliance tools for Z hardware\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Servers\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/servers?lnk=flathl\x22,\x22description\x22:\x22Run workloads on hybrid cloud infrastructure\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22IBM Cloud Bare Metal Servers\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/bare\u002Dmetal\u002Dservers?lnk=flatitem\x22,\x22description\x22:\x22Dedicated hardware for maximum performance\x22},{\x22title\x22:\x22IBM Cloud Virtual Servers for VPC\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/virtual\u002Dservers?lnk=flatitem\x22,\x22description\x22:\x22Virtual servers with Intel Xeon or IBM Z CPUs\x22},{\x22title\x22:\x22LinuxONE 4\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/linuxone\u002D4?lnk=flatitem\x22,\x22description\x22:\x22Physical and virtual servers for running Linux\x22},{\x22title\x22:\x22Power\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/power?lnk=flatitem\x22,\x22description\x22:\x22Physical and virtual servers with IBM Power CPUs\x22},{\x22title\x22:\x22z16\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/z16?lnk=flatitem\x22,\x22description\x22:\x22Flagship mainframe with on\u002Dchip AI and quantum\u002Dsafe cryptography\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/storage?lnk=flathl\x22,\x22description\x22:\x22Software, hardware and services for critical and operational workloads and data\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Ceph\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dceph?lnk=flatitem\x22,\x22description\x22:\x22Multi\u002Dprotocol software\u002Ddefined enterprise storage platform\x22},{\x22title\x22:\x22Cloud Block Storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/block\u002Dstorage?lnk=flatitem\x22,\x22description\x22:\x22Managed service optimized for low latency and high transfer rates\x22},{\x22title\x22:\x22Cloud File Storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/file\u002Dstorage?lnk=flatitem\x22,\x22description\x22:\x22Managed service for flash\u002Dbacked, durable, NFS\u002Dbased file storage\x22},{\x22title\x22:\x22Cloud Object Storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dobject\u002Dstorage?lnk=flatitem\x22,\x22description\x22:\x22Unstructured data storage accessible via cloud APIs\x22},{\x22title\x22:\x22DS8000\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ds8000?lnk=flatitem\x22,\x22description\x22:\x22High\u002Dcapacity, high\u002Davailability mainframe storage system\x22},{\x22title\x22:\x22Defender\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Ddefender?lnk=flatitem\x22,\x22description\x22:\x22Data resiliency software for threat detection and data recovery\x22},{\x22title\x22:\x22FlashSystem\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/flashsystem?lnk=flatitem\x22,\x22description\x22:\x22All\u002Dflash array with performance and capacity for any workload\x22},{\x22title\x22:\x22Fusion\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dfusion?lnk=flatitem\x22,\x22description\x22:\x22Container\u002Dnative storage and data orchestration for OpenShift\x22},{\x22title\x22:\x22Insights\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dinsights?lnk=flatitem\x22,\x22description\x22:\x22Storage AIOps for metrics\u002Dpowered analysis and decisions\x22},{\x22title\x22:\x22Protect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dprotect?lnk=flatitem\x22,\x22description\x22:\x22Data resiliency, backup and recovery delivered via SaaS\x22},{\x22title\x22:\x22Protect for Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dprotect\u002Dfor\u002Dcloud?lnk=flatitem\x22,\x22description\x22:\x22Backup and recovery SaaS for data in public cloud services\x22},{\x22title\x22:\x22SAN Switches\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/storage\u002Darea\u002Dnetwork?lnk=flatitem\x22,\x22description\x22:\x22Scalable and highly available storage area network solutions\x22},{\x22title\x22:\x22Scale\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dscale?lnk=flatitem\x22,\x22description\x22:\x22Software defined storage for AI and high performance workloads\x22},{\x22title\x22:\x22Scale System\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dscale\u002Dsystem?lnk=flatitem\x22,\x22description\x22:\x22All\u002Dflash or hybrid performant storage for cloud scale use\u002Dcases\x22},{\x22title\x22:\x22Tape Systems\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/tape\u002Dstorage?lnk=flatitem\x22,\x22description\x22:\x22Software and hardware for encrypted and air\u002Dgapped archives\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Supply chain\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/supply\u002Dchain?lnk=flathl\x22,\x22description\x22:\x22Manage the flow of goods and services\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Sterling Order and Fulfillment Suite\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/order\u002Dfulfillment\u002Dsuite?lnk=flatitem\x22,\x22description\x22:\x22Complete order management system with AI and machine learning\x22},{\x22title\x22:\x22Sterling Supply Chain Intelligence Suite\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/supply\u002Dchain\u002Dintelligence\u002Dsuite?lnk=flatitem\x22,\x22description\x22:\x22Software for supply chain optimization and automation\x22}]}]}],\x22viewAll\x22:{\x22title\x22:\x22View all products\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\x22}}},{\x22title\x22:\x22Solutions\x22,\x22url\x22:\x22\x22,\x22submenu\x22:{\x22sections\x22:[{\x22heading\x22:{\x22title\x22:\x22Automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/automation?lnk=flathl\x22,\x22description\x22:\x22Intelligent automation for business and IT operations\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22AIOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/aiops?lnk=flatitem\x22,\x22description\x22:\x22Enable proactive, continuous application performance management\x22},{\x22title\x22:\x22Application delivery\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/application\u002Ddelivery?lnk=flatitem\x22,\x22description\x22:\x22Modernize applications and deliver new cloud\u002Dnative applications\x22},{\x22title\x22:\x22Application performance management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/application\u002Dperformance\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22Bridge observability and automated resource management\x22},{\x22title\x22:\x22Business automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/business\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22Deliver intelligent automation solutions quickly with low\u002Dcode\x22},{\x22title\x22:\x22Cloud cost management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/cloud\u002Dcost\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22Optimize performance at the lowest cost and align business value\x22},{\x22title\x22:\x22Decision management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/decision\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22Model, manage and automate repeatable business processes\x22},{\x22title\x22:\x22DevOps automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/devops\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22Automate your software delivery process\x22},{\x22title\x22:\x22Enterprise content management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/enterprise\u002Dcontent\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22Accelerate information management and governance processes\x22},{\x22title\x22:\x22FinOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/finops?lnk=flatitem\x22,\x22description\x22:\x22Manage the variable economics of cloud infrastructure\x22},{\x22title\x22:\x22Integration\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/integration?lnk=flatitem\x22,\x22description\x22:\x22Connect applications and systems to unlock critical data\x22},{\x22title\x22:\x22License compliance\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/license\u002Dcompliance?lnk=flatitem\x22,\x22description\x22:\x22Reduce compliance risks with application resource management\x22},{\x22title\x22:\x22Networking\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/networking?lnk=flatitem\x22,\x22description\x22:\x22Automate network configuration, provisioning and troubleshooting\x22},{\x22title\x22:\x22Workflow\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/workflow?lnk=flatitem\x22,\x22description\x22:\x22Increase productivity by streamlining processes and tasks\x22},{\x22title\x22:\x22iPaaS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/ipaas?lnk=flatitem\x22,\x22description\x22:\x22Deliver connectivity across all your apps and data\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Data \x26 AI\x22,\x22description\x22:\x22Optimize your data strategy to support data\u002Ddriven decisions\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22AI\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/artificial\u002Dintelligence?lnk=flatitem\x22,\x22description\x22:\x22Artificial intelligence solutions built with industry expertise\x22},{\x22title\x22:\x22AI ethics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/impact\/ai\u002Dethics?lnk=flatitem\x22,\x22description\x22:\x22Trustworthy, transparent AI with a multidimensional approach\x22},{\x22title\x22:\x22Customer experience\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/ai\u002Dcustomer\u002Dservice?lnk=flatitem\x22,\x22description\x22:\x22Build a full\u002Dservice AI chatbot that integrates with your CRM\x22},{\x22title\x22:\x22Data fabric\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/data\u002Dfabric?lnk=flatitem\x22,\x22description\x22:\x22Automate data discovery, governance and consumption\x22},{\x22title\x22:\x22Data lake\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/data\u002Dlake?lnk=flatitem\x22,\x22description\x22:\x22Analyze structured, semi\u002Dstructured and unstructured data\x22},{\x22title\x22:\x22Data management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/data\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22Consistent data access and delivery across apps and domains\x22},{\x22title\x22:\x22Data quality\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/data\u002Dquality?lnk=flatitem\x22,\x22description\x22:\x22Robust tools help identify, understand and correct data flaws\x22},{\x22title\x22:\x22Data science\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/data\u002Dscience?lnk=flatitem\x22,\x22description\x22:\x22Operationalize data science models on any cloud\x22},{\x22title\x22:\x22Data warehouse\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/data\u002Dwarehouse?lnk=flatitem\x22,\x22description\x22:\x22A flexible foundation optimized for data from disparate sources\x22},{\x22title\x22:\x22DataOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/dataops?lnk=flatitem\x22,\x22description\x22:\x22Develop a coordinated overview of the data acquisition journey\x22},{\x22title\x22:\x22Master data management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/master\u002Ddata\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22A trusted, 360\u002Ddegree view of master data across the enterprise\x22},{\x22title\x22:\x22Prescriptive analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/prescriptive\u002Danalytics?lnk=flatitem\x22,\x22description\x22:\x22Use optimization technology to solve complex decisions\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Industry\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries?lnk=flathl\x22,\x22description\x22:\x22Customized, end\u002Dto\u002Dend, AI\u002Dpowered solutions for your industry\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Automotive\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/automotive?lnk=flatitem\x22,\x22description\x22:\x22Shift focus to connected vehicles and digital services\x22},{\x22title\x22:\x22Banking\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/banking\u002Dfinancial\u002Dmarkets?lnk=flatitem\x22,\x22description\x22:\x22Create compliant, customer\u002Dcentric banking experiences\x22},{\x22title\x22:\x22Consumer goods\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/consumer\u002Dgoods?lnk=flatitem\x22,\x22description\x22:\x22Infuse agility and automation into operations and supply chains\x22},{\x22title\x22:\x22Energy \x26 utilities\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/energy?lnk=flatitem\x22,\x22description\x22:\x22Get your utility ready for the new, sustainable energy ecosystem\x22},{\x22title\x22:\x22Government\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/government?lnk=flatitem\x22,\x22description\x22:\x22Support citizens with greater speed and confidence\x22},{\x22title\x22:\x22Healthcare\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/healthcare?lnk=flatitem\x22,\x22description\x22:\x22Navigate a more interconnected, data\u002Drich healthcare ecosystem\x22},{\x22title\x22:\x22Insurance\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/insurance?lnk=flatitem\x22,\x22description\x22:\x22Improve operations and customer experiences at speed and scale\x22},{\x22title\x22:\x22Life Sciences\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/life\u002Dsciences?lnk=flatitem\x22,\x22description\x22:\x22Accelerate product innovation and drive patient centricity\x22},{\x22title\x22:\x22Manufacturing\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/manufacturing?lnk=flatitem\x22,\x22description\x22:\x22Digitally transform traditional manufacturing processes\x22},{\x22title\x22:\x22Retail\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/retail?lnk=flatitem\x22,\x22description\x22:\x22Meet changing consumer needs with new retail business models\x22},{\x22title\x22:\x22Telecommunications\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/telecommunications?lnk=flatitem\x22,\x22description\x22:\x22Achieve a more flexible, seamless network architecture\x22},{\x22title\x22:\x22Travel\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/industries\/travel\u002Dtransportation?lnk=flatitem\x22,\x22description\x22:\x22Restore traveler trust and increase operational efficiency\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Infrastructure\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/it\u002Dinfrastructure?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Backup \x26 recovery\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/backup\u002Drecovery?lnk=flatitem\x22,\x22description\x22:\x22Comprehensive data resilience for physical and virtual servers\x22},{\x22title\x22:\x22Edge computing\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/edge\u002Dcomputing?lnk=flatitem\x22,\x22description\x22:\x22Manage workloads from edge to core across any hybrid multicloud\x22},{\x22title\x22:\x22High performance computing (HPC)\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/high\u002Dperformance\u002Dcomputing?lnk=flatitem\x22,\x22description\x22:\x22HPC infrastructure for advanced and data\u002Dintensive workloads\x22},{\x22title\x22:\x22Hybrid cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/hybrid\u002Dcloud?lnk=flatitem\x22,\x22description\x22:\x22Use a common platform across cloud, on\u002Dprem and edge environments\x22},{\x22title\x22:\x22IT modernization\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/infrastructure\u002Dmodernization?lnk=flatitem\x22,\x22description\x22:\x22Modernize legacy IT in place with containerized microservices\x22},{\x22title\x22:\x22Mainframe application modernization\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/mainframe\u002Dapplication\u002Dmodernization?lnk=flatitem\x22,\x22description\x22:\x22Apply modern development and DevOps tools to mainframe applications\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Security\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/security?lnk=flathl\x22,\x22description\x22:\x22Enterprise cybersecurity for today’s hybrid cloud environments\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloud security\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/cloud\u002Dsecurity?lnk=flatitem\x22,\x22description\x22:\x22Trust IBM Cloud security for data protection and compliance\x22},{\x22title\x22:\x22Data security\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/data\u002Dsecurity?lnk=flatitem\x22,\x22description\x22:\x22Meet data privacy regulations and simplify operational complexity\x22},{\x22title\x22:\x22Insider threat\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/insider\u002Dthreat?lnk=flatitem\x22,\x22description\x22:\x22Protection from malicious or unintentional threats from insiders\x22},{\x22title\x22:\x22Ransomware\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/ransomware?lnk=flatitem\x22,\x22description\x22:\x22Proactively manage cyber risks to reduce the impact of attacks\x22},{\x22title\x22:\x22Threat detection and response\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/threat\u002Ddetection\u002Dresponse?lnk=flatitem\x22,\x22description\x22:\x22Accelerate and streamline responses across the attack lifecycle\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Sustainability\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/sustainability?lnk=flathl\x22,\x22description\x22:\x22Embed sustainability into your business transformation\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Asset lifecycle management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/maximo\/sustainability?lnk=flatitem\x22,\x22description\x22:\x22Optimize performance, extend asset lifecycles and reduce downtime\x22},{\x22title\x22:\x22ESG reporting\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/envizi?lnk=flatitem\x22,\x22description\x22:\x22Data foundation to streamline meeting ESG reporting requirements\x22},{\x22title\x22:\x22Facilities management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/tririga\/sustainability?lnk=flatitem\x22,\x22description\x22:\x22A single source of truth to manage your corporate real estate\x22},{\x22title\x22:\x22IT sustainability\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/turbonomic\/sustainability?lnk=flatitem\x22,\x22description\x22:\x22Software to estimate infrastructure resource consumption\x22},{\x22title\x22:\x22Supply chain\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/supply\u002Dchain?lnk=flatitem\x22,\x22description\x22:\x22Build supply chain resiliency with intelligent automation\x22},{\x22title\x22:\x22Weather Risk Management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/environmental\u002Dintelligence\u002Dsuite\/sustainability?lnk=flatitem\x22,\x22description\x22:\x22Manage the economic impact of weather and climate on your business\x22}]}]}],\x22viewAll\x22:{\x22title\x22:\x22\x22,\x22url\x22:\x22\x22}}},{\x22title\x22:\x22Consulting\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/consulting?lnk=L0G\x22},{\x22title\x22:\x22Support\x22,\x22url\x22:\x22\x22,\x22submenu\x22:{\x22sections\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22What\x27s New\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/new?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Community\x22,\x22url\x22:\x22https:\/\/community.ibm.com\/community\/user\/community?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Developer\x22,\x22url\x22:\x22https:\/\/developer.ibm.com\/?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Call for Code\x22,\x22url\x22:\x22https:\/\/developer.ibm.com\/callforcode\/?lnk=flatitem\x22},{\x22title\x22:\x22Generative AI\x22,\x22url\x22:\x22https:\/\/developer.ibm.com\/generative\u002Dai\u002Dfor\u002Ddevelopers\/?lnk=flatitem\x22},{\x22title\x22:\x22Open Source @ IBM\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/opensource\/?lnk=flatitem\x22},{\x22title\x22:\x22Products\x22,\x22url\x22:\x22https:\/\/developer.ibm.com\/components\/?lnk=flatitem\x22},{\x22title\x22:\x22Technologies\x22,\x22url\x22:\x22https:\/\/developer.ibm.com\/technologies\/?lnk=flatitem\x22}]},{\x22heading\x22:{\x22title\x22:\x22Documentation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/docs\/en?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22All product documentation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/docs\/en?lnk=flatitem\x22},{\x22title\x22:\x22IBM Cloud documentation\x22,\x22url\x22:\x22https:\/\/cloud.ibm.com\/docs?lnk=flatitem\x22},{\x22title\x22:\x22IBM Redbooks\x22,\x22url\x22:\x22https:\/\/www.redbooks.ibm.com\/?lnk=flatitem\x22}]},{\x22heading\x22:{\x22title\x22:\x22IBM Cloud platform support\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/cloud\/support?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Implementation\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Expert Labs\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/expertlabs?lnk=flatitem\x22}]},{\x22heading\x22:{\x22title\x22:\x22Support\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/mysupport\/s\/?language=en_US\x26lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Download fixes, updates \x26 drivers\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/support\/fixcentral?lnk=flatitem\x22},{\x22title\x22:\x22Download licensed software \u002D Passport Advantage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/software\/passportadvantage\/pao_customer.html?lnk=flatitem\x22},{\x22title\x22:\x22IBM Software Licensing\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/about\/software\u002Dlicensing\/?lnk=flatitem\x22},{\x22title\x22:\x22Open a case\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/mysupport\/s\/redirecttoopencasepage?lnk=flatitem\x22},{\x22title\x22:\x22View more\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/mysupport\/s\/?language=en_US\x26lnk=flatitem\x22},{\x22title\x22:\x22View support plans\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/support\/pages\/ibm\u002Dsupport\u002Dofferings?lnk=flatitem\x22},{\x22title\x22:\x22View your cases\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/mysupport\/s\/my\u002Dcases?lnk=flatitem\x22}]},{\x22heading\x22:{\x22title\x22:\x22Technology Lifecycle Services\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/services\/technology\u002Dlifecycle\u002Dservices?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Enterprise networking and security\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/services\/networking\u002Dsupport?lnk=flatitem\x22},{\x22title\x22:\x22Servers and storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/services\/systems\u002Dsupport?lnk=flatitem\x22},{\x22title\x22:\x22Software\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/services\/software\u002Dsupport?lnk=flatitem\x22}]},{\x22heading\x22:{\x22title\x22:\x22Training\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/training\/?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Courses\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/training\/search?q=course\x26lnk=flatitem\x22},{\x22title\x22:\x22Digital learning subscriptions\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/training\/subscriptions?lnk=flatitem\x22},{\x22title\x22:\x22Learning paths \x26 collections\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/training\/learning\u002Dpaths\u002Dand\u002Dcollections?lnk=flatitem\x22},{\x22title\x22:\x22Professional certifications\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/training\/credentials?lnk=flatitem\x22}]}]}],\x22viewAll\x22:{\x22title\x22:\x22\x22,\x22url\x22:\x22\x22}}},{\x22title\x22:\x22Think\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think?lnk=L0G\x22}]}}"; const searchPlaceholderText = "Search all of IBM"; const links = JSON.parse(l0Json).mastheadNav.links; const unAuthenticated = JSON.parse(l0Json).profileMenu.signedout; const authenticated = JSON.parse(l0Json).profileMenu.signedin; const mastheadContainerEl = document.querySelector('c4d-masthead-container'); mastheadContainerEl.navLinks = links; mastheadContainerEl.unauthenticatedProfileItems = unAuthenticated; mastheadContainerEl.authenticatedProfileItems = authenticated; const appendSearchPlaceholderText = () => { const typeheadEl = mastheadContainerEl.querySelector('c4d-search-with-typeahead'); if (typeheadEl) { typeheadEl.searchPlaceholder = searchPlaceholderText; observer.disconnect(); } } let observer = new MutationObserver(appendSearchPlaceholderText); observer.observe(mastheadContainerEl, {subtree: true, childList: true}); </script> <script> var json = "{\x22title\x22:\x22Think\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\x22,\x22menuItems\x22:[{\x22title\x22:\x22Artificial intelligence\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/artificial\u002Dintelligence\x22},{\x22title\x22:\x22Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/cloud\x22},{\x22title\x22:\x22Security\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/security\x22},{\x22title\x22:\x22Sustainability\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/sustainability\x22},{\x22title\x22:\x22Blog\x22,\x22submenu\x22:{\x22columns\x22:2,\x22footer\x22:{\x22title\x22:\x22View all blog posts\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/\x22},\x22menuSections\x22:[{\x22span\x22:1,\x22heading\x22:{\x22headingLevel\x22:2,\x22title\x22:\x22Categories\x22},\x22items\x22:[{\x22title\x22:\x22Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/analytics\/\x22},{\x22title\x22:\x22Artificial intelligence\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/artificial\u002Dintelligence\/\x22},{\x22title\x22:\x22Automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/automation\/\x22},{\x22title\x22:\x22Business transformation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/business\u002Dtransformation\/\x22},{\x22title\x22:\x22Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/cloud\/\x22},{\x22title\x22:\x22Security\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/security\/\x22},{\x22title\x22:\x22Social impact\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/social\u002Dimpact\/\x22},{\x22title\x22:\x22Supply chain\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/supply\u002Dchain\/\x22},{\x22title\x22:\x22Sustainability\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/sustainability\/\x22}]},{\x22span\x22:1,\x22heading\x22:{\x22headingLevel\x22:2,\x22title\x22:\x22Industries\x22},\x22items\x22:[{\x22title\x22:\x22Energy and utilities\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/energy\u002Dand\u002Dutilities\/\x22},{\x22title\x22:\x22Financial services\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/financial\u002Dservices\/\x22},{\x22title\x22:\x22Government\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/government\/\x22},{\x22title\x22:\x22Healthcare\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/healthcare\/\x22},{\x22title\x22:\x22Manufacturing\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/manufacturing\/\x22},{\x22title\x22:\x22Media and entertainment\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/media\u002Dand\u002Dentertainment\/\x22},{\x22title\x22:\x22Mining and extraction\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/mining\u002Dand\u002Dextraction\/\x22},{\x22title\x22:\x22Technology\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/technology\/\x22},{\x22title\x22:\x22Telecommunications\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/telecommunications\/\x22},{\x22title\x22:\x22Transportation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/blog\/category\/transportation\/\x22}]}]}},{\x22title\x22:\x22Videos\x22,\x22submenu\x22:{\x22columns\x22:1,\x22menuSections\x22:[{\x22span\x22:1,\x22items\x22:[{\x22title\x22:\x22Overview\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/videos\x22},{\x22title\x22:\x22AI Academy\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/videos\/ai\u002Dacademy\x22},{\x22title\x22:\x22Rethink use cases\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/videos\/series\/rethink\x22},{\x22title\x22:\x22Think 2024 on demand\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/videos\/series\/think\u002Dkeynotes\x22}]}]}},{\x22title\x22:\x22Reports\x22,\x22submenu\x22:{\x22columns\x22:1,\x22menuSections\x22:[{\x22span\x22:1,\x22items\x22:[{\x22title\x22:\x22AI in Action 2024\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22http:\/\/www.ibm.com\/think\/reports\/ai\u002Din\u002Daction\x22},{\x22title\x22:\x22State of Sustainability Readiness Report 2024\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/reports\/sustainability\u002Dreadiness\x22},{\x22title\x22:\x22Cost of a Data Breach 2024\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/reports\/data\u002Dbreach\x22},{\x22title\x22:\x22IBM X\u002DForce Threat Intelligence Index 2024\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/reports\/threat\u002Dintelligence\x22},{\x22title\x22:\x22CEO’s Guide to Generative AI\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/thought\u002Dleadership\/institute\u002Dbusiness\u002Dvalue\/en\u002Dus\/report\/ceo\u002Dgenerative\u002Dai\x22},{\x22title\x22:\x22Hybrid by Design: The great tech reset\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/thought\u002Dleadership\/institute\u002Dbusiness\u002Dvalue\/en\u002Dus\/report\/hybrid\u002Dby\u002Ddesign\x22},{\x22title\x22:\x222024 CEO Study\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/thought\u002Dleadership\/institute\u002Dbusiness\u002Dvalue\/en\u002Dus\/c\u002Dsuite\u002Dstudy\/ceo\x22},{\x22title\x22:\x22View all IBV reports\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/thought\u002Dleadership\/institute\u002Dbusiness\u002Dvalue\x22}]}]}},{\x22title\x22:\x22Podcasts\x22,\x22submenu\x22:{\x22columns\x22:1,\x22menuSections\x22:[{\x22span\x22:1,\x22items\x22:[{\x22title\x22:\x22Overview\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/podcasts\x22},{\x22title\x22:\x22Mixture of Experts\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/podcasts\/mixture\u002Dof\u002Dexperts\x22},{\x22title\x22:\x22AI in Action\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/podcasts\/ai\u002Din\u002Daction\x22},{\x22title\x22:\x22Smart Talks with IBM\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/podcasts\/smart\u002Dtalks\x22}]}]}},{\x22title\x22:\x22Events\x22,\x22submenu\x22:{\x22columns\x22:1,\x22menuSections\x22:[{\x22span\x22:1,\x22items\x22:[{\x22title\x22:\x22Think 2024\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/events\/think\x22},{\x22title\x22:\x22Think on Tour\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/events\/think\/on\u002Dtour\x22},{\x22title\x22:\x22TechXchange\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/community\/ibm\u002Dtechxchange\u002Dconference\/\x22}]}]}},{\x22title\x22:\x22More\x22,\x22submenu\x22:{\x22columns\x22:2,\x22footer\x22:{\x22title\x22:\x22View all\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/search\x22},\x22menuSections\x22:[{\x22span\x22:1,\x22heading\x22:{\x22headingLevel\x22:2,\x22title\x22:\x22Topics\x22},\x22items\x22:[{\x22title\x22:\x22Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/analytics\x22},{\x22title\x22:\x22Asset management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/asset\u002Dmanagement\x22},{\x22title\x22:\x22Business automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/business\u002Dautomation\x22},{\x22title\x22:\x22Business operations\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/business\u002Doperations\x22},{\x22title\x22:\x22Compute and servers\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/compute\x22},{\x22title\x22:\x22DevOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/devops\x22},{\x22title\x22:\x22IT automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/it\u002Dautomation\x22},{\x22title\x22:\x22IT infrastructure\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/it\u002Dinfrastructure\x22},{\x22title\x22:\x22Middleware\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/middleware\x22},{\x22title\x22:\x22Network\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/network\x22},{\x22title\x22:\x22Quantum\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/quantum\x22},{\x22title\x22:\x22Storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/storage\x22}]},{\x22span\x22:1,\x22heading\x22:{\x22headingLevel\x22:2,\x22title\x22:\x22Content types\x22},\x22items\x22:[{\x22title\x22:\x22Explainers\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/topics\x22},{\x22title\x22:\x22News\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/news\x22},{\x22title\x22:\x22Newsletters\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/subscribe\x22},{\x22title\x22:\x22Reference architectures\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/architectures\x22}]}]}}],\x22actions\x22:{\x22login\x22:null,\x22cta\x22:{\x22title\x22:\x22Subscribe\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/account\/reg\/signup?formid=news\u002Durx\u002D52954\x22}},\x22linkOrContactModule\x22:false,\x22optinalCta\x22:true}"; document.querySelector('c4d-masthead-container').l1Data = JSON.parse(json); document.querySelector('.masthead').classList.add("hasNavigation"); document.documentElement.style.setProperty('--anker-navigation-spacing', '-6rem'); document.addEventListener('DOMContentLoaded', () => { document.querySelector('c4d-masthead-l1').overviewText = 'Overview'; }); </script> <script type="text/javascript"> if(window.location.href.includes("/careers")){ document.querySelector('c4d-masthead-container').setAttribute("has-search","false"); document.querySelector('c4d-masthead-container').setAttribute("has-profile","false"); } </script> </div> <div class="leadspace"> <div class="theme-g10 "> <div class="bx--grid bx--no-gutter "> <dds-leadspace type="left" size="medium" loadinganimation gradient-style-scheme> <bx-breadcrumb slot="navigation"> <bx-breadcrumb-item> <bx-breadcrumb-link href="/"> <caem-paragraph size="normal" type-style="body-short-01">Home</caem-paragraph> </bx-breadcrumb-link> </bx-breadcrumb-item> <bx-breadcrumb-item> <bx-breadcrumb-link href="/topics"> <caem-paragraph size="normal" type-style="body-short-01">Topics</caem-paragraph> </bx-breadcrumb-link> </bx-breadcrumb-item> <bx-breadcrumb-item class="no-trailing-slash"> <caem-paragraph size="normal" type-style="body-short-01">Ransomware</caem-paragraph> </bx-breadcrumb-item> </bx-breadcrumb> <dds-leadspace-heading id="leadspaceSimpleTitle"> What is ransomware? </dds-leadspace-heading> <div class="leadspace__copy "> </div> <dds-button-group slot="action"> <dds-button-cta href="https://www.ibm.com/ransomware" target="_self" kind="primary" aria-label="IBM Security X-Force for Ransomware (1:44)" cta-type="local" data-aem-autoid="aem--leadspace_cta-0"> <span>Explore IBM's ransomware solution</span> </dds-button-cta> <dds-button-cta href="https://www.ibm.com/account/reg/signup?formid=news-urx-52954" target="_blank" kind="tertiary" aria-label="Explore ransomware solutions" cta-type="local" data-aem-autoid="aem--leadspace_cta-1"> <span>Sign up for security topic updates</span> </dds-button-cta> </dds-button-group> <dds-background-media mobile-position="bottom" opacity="100" gradient-hidden> <div class="bx--image "> <picture> <source media="(min-width: 1312px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/98/4d/content-hub-security-and-identity-page-leadspace-short.component.xl-retina.ts=1727788109986.png/content/adobe-cms/us/en/topics/ransomware/jcr:content/root/leadspace"/> <source media="(min-width: 1312px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/98/4d/content-hub-security-and-identity-page-leadspace-short.component.xl.ts=1727788109986.png/content/adobe-cms/us/en/topics/ransomware/jcr:content/root/leadspace"/> <source media="(min-width: 1056px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/98/4d/content-hub-security-and-identity-page-leadspace-short.component.l-retina.ts=1727788109986.png/content/adobe-cms/us/en/topics/ransomware/jcr:content/root/leadspace"/> <source media="(min-width: 1056px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/98/4d/content-hub-security-and-identity-page-leadspace-short.component.l.ts=1727788109986.png/content/adobe-cms/us/en/topics/ransomware/jcr:content/root/leadspace"/> <source media="(min-width: 672px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/98/4d/content-hub-security-and-identity-page-leadspace-short.component.m-retina.ts=1727788109986.png/content/adobe-cms/us/en/topics/ransomware/jcr:content/root/leadspace"/> <source media="(min-width: 672px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/98/4d/content-hub-security-and-identity-page-leadspace-short.component.m.ts=1727788109986.png/content/adobe-cms/us/en/topics/ransomware/jcr:content/root/leadspace"/> <source media="(min-width: 481px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/98/4d/content-hub-security-and-identity-page-leadspace-short.component.s-retina.ts=1727788109986.png/content/adobe-cms/us/en/topics/ransomware/jcr:content/root/leadspace"/> <source media="(min-width: 481px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/98/4d/content-hub-security-and-identity-page-leadspace-short.component.s.ts=1727788109986.png/content/adobe-cms/us/en/topics/ransomware/jcr:content/root/leadspace"/> <source media="(max-width: 480px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/98/4d/content-hub-security-and-identity-page-leadspace-short.component.xs-retina.ts=1727788109986.png/content/adobe-cms/us/en/topics/ransomware/jcr:content/root/leadspace"/> <source media="(max-width: 480px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/98/4d/content-hub-security-and-identity-page-leadspace-short.component.xs.ts=1727788109986.png/content/adobe-cms/us/en/topics/ransomware/jcr:content/root/leadspace"/> <img id="image-1105332704" class="bx--image__img" src="/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-migr/ul/g/98/4d/content-hub-security-and-identity-page-leadspace-short.component.xl.ts=1727788109986.png/content/adobe-cms/us/en/topics/ransomware/_jcr_content/root/leadspace" alt="Illustration with collage of pictograms of clouds, mobile phone, fingerprint and check mark"/> </picture> </div> </dds-background-media> </dds-leadspace> </div> </div> </div> <div class="table-of-contents container responsivegrid"> <dds-table-of-contents data-cmp-is="table-of-contents" data-autoid="dds--table-of-contents" class="cmp-table-of-contents" stickyoffset="96"> <div id="table-of-contents-e47b71d479" class="cmp-table-of-contents"> <div class="body container responsivegrid"> <div id="body-550a39eee9" class="cmp-container"> <div class="content-section-styled content-section container responsivegrid"> <div class="bx--grid"> <div class="bx--row"> <div class="bx--col-lg-16 bx--no-gutter"> <div class="bx--content-section"> <div id="container-47e299eec6" class="cmp-container"> <div class="modular-container container responsivegrid"> <div id="modular-container-ce89200e02" class="cmp-container"> <div class="standalone-text rich-text text"> <caem-paragraph size="normal"> <p><strong>Updated: </strong>4 June 2024</p> <p><strong>Contributor:</strong> Matthew Kosinski</p> </caem-paragraph> </div> </div> </div> <div class="complex-narrative"> <dds-content-block-segmented data-autoid="dds-content-block-segmented" no-image content-section-body> <div slot="heading"> <a data-title="What is ransomware?" name="What+is+ransomware%3F"></a> <dds-content-block-heading data-autoid="dds--content-block__heading" role="heading"> <a data-title="What is ransomware?" name="What+is+ransomware%3F"></a> What is ransomware? </dds-content-block-heading> </div> <dds-content-block-copy data-autoid="dds--content-block__copy" slot="copy"> <dds-content-block-paragraph> <div class="cms-richtext " id="rich-text-7c77cc792f" data-dynamic-inner-content="description"> <p>Ransomware is a type of <a href="https://www.ibm.com/topics/malware" target="_self" rel="noopener noreferrer">malware</a> that holds a victim’s sensitive data or device hostage, threatening to keep it locked—or worse—unless the victim pays a ransom to the attacker.</p> </div> </dds-content-block-paragraph> </dds-content-block-copy> <dds-content-block-segmented-item> <dds-content-item-copy> <div class="cms-richtext " id="rich-text-e38332069a" data-dynamic-inner-content="description"> <p>The earliest ransomware attacks simply demanded a ransom in exchange for the encryption key needed to regain access to the affected data or use of the infected device. By making regular or continuous <a href="https://www.ibm.com/topics/backup-and-restore" target="_self" rel="noopener noreferrer">data backups</a>, an organization could limit costs from these types of ransomware attacks and often avoid paying the ransom demand.</p> <p>In recent years, ransomware attacks have evolved to include double-extortion and triple-extortion tactics that raise the stakes considerably. Even victims who rigorously maintain data backups or pay the initial ransom demand are at risk. </p> <p>Double-extortion attacks add the threat of stealing the victim’s data and leaking it online. Triple-extortion attacks add the threat of using the stolen data to attack the victim’s customers or business partners.</p> </div> </dds-content-item-copy> </dds-content-block-segmented-item> <dds-content-block-segmented-item> <dds-content-group-heading> Why ransomware is a major cyberthreat </dds-content-group-heading> <dds-content-item-copy> <div class="cms-richtext " id="rich-text-c680fb8afa" data-dynamic-inner-content="description"> <p>Ransomware is one of the most common forms of malicious software, and ransomware attacks can cost affected organizations millions of dollars. </p> <p>20% of all <a href="https://www.ibm.com/topics/cyber-attack" target="_self" rel="noopener noreferrer">cyberattacks</a> recorded by the <a href="https://www.ibm.com/reports/threat-intelligence" target="_self" rel="noopener noreferrer">IBM® <em>X-Force® Threat Intelligence Index</em></a> in 2023 involved ransomware. And these attacks move quickly. When <a href="https://www.ibm.com/topics/cyber-hacking" target="_self" rel="noopener noreferrer">hackers</a> gain access to a network, it takes less than four days to deploy ransomware. This speed gives organizations little time to detect and thwart potential attacks.</p> <p>Ransomware victims and negotiators are reluctant to disclose ransom payments, but threat actors often demand seven-figure and eight-figure amounts. And ransom payments are only part of the total cost of a ransomware infection. According to the <a href="https://www.ibm.com/reports/data-breach" target="_self" rel="noopener noreferrer">IBM <em>Cost of a Data Breach</em></a> report, the average cost of a ransomware <a href="https://www.ibm.com/topics/data-breach" target="_self" rel="noopener noreferrer">breach</a> is USD 5.68 million, which does not include ransom payments. </p> <p>That said, <a href="https://www.ibm.com/topics/cybersecurity" target="_self" rel="noopener noreferrer">cybersecurity</a> teams are becoming more adept at combatting ransomware. The <em>X-Force Threat Intelligence Index</em> found that ransomware infections declined by 11.5% between 2022 and 2023, likely due to improvements in threat detection and prevention. </p> </div> </dds-content-item-copy> </dds-content-block-segmented-item> <dds-content-block-segmented-item> <dds-content-item-copy> </dds-content-item-copy> <dds-video-player-container video-id="1_s6hf7x9i" playing-mode="inline" slot="media"></dds-video-player-container> <div id="dds-analytics-data" data-title-dds="Ransomware" data-last-modified-dds="Tue Oct 01 13:08:39 UTC 2024" data-last-published-dds="Tue Oct 01 13:08:39 UTC 2024" data-template-dds="/conf/adobe-cms-editable/settings/wcm/templates/learn" data-playing-mode-dds="inline"> </div> <script src="/etc.clientlibs/adobe-cms/components/content/atoms/video/clientlibs.lc-660d2d9e622f158ce7161555a292ea97-lc.min.js"></script> </dds-content-block-segmented-item> <div slot="complementary"> <div class="aside-card"> <dds-card-cta href="https://www.ibm.com/account/reg/signup?formid=urx-52119" target="_blank" pictogram-placement="top" cta-type="local"> <dds-card-eyebrow slot="eyebrow" aria-hidden="true"> Guide </dds-card-eyebrow> <dds-card-heading role="heading" aria-level="3" slot="heading"> IBM Definitive Guide to Ransomware </dds-card-heading> <p>Boost your knowledge and rethink your incident response plan to strengthen your organization's defenses against ransomware. </p> <dds-card-cta-footer icon-placement="right" href="https://www.ibm.com/account/reg/signup?formid=urx-52119" target="_blank" slot="footer" aria-hidden="true"> </dds-card-cta-footer> </dds-card-cta> </div> <dds-link-list type="default"> <dds-link-list-heading role="heading" aria-level="4" slot="heading"> Related content </dds-link-list-heading> <dds-link-list-item-card cta-type="local" href="https://www.ibm.com/account/reg/signup?formid=urx-52913" target="_blank"> <p>Register for the Cost of a Data Breach report</p> <dds-card-cta-footer href="https://www.ibm.com/account/reg/signup?formid=urx-52913" target="_blank" cta-type="local"> </dds-card-cta-footer> </dds-link-list-item-card> <dds-link-list-item-card cta-type="blog" href="https://www.ibm.com/blog/x-force-cloud-threat-landscape/" target="_self"> <p>Get the X-Force Cloud Threat Landscape Report 2024</p> <dds-card-cta-footer href="https://www.ibm.com/blog/x-force-cloud-threat-landscape/" target="_self" cta-type="blog"> </dds-card-cta-footer> </dds-link-list-item-card> </dds-link-list> </div> </dds-content-block-segmented> <div horizontal-ruler> <dds-hr></dds-hr> </div> </div> <div class="mixed-series"> <div> <div class="bx--col-lg-12 bx--no-gutter"> <dds-content-block-mixed content-section-body> <div slot="heading"> <a data-title="Types of ransomware" name="Types+of+ransomware"></a> <dds-content-block-heading> <a data-title="Types of ransomware" name="Types+of+ransomware"></a> Types of ransomware </dds-content-block-heading> </div> <div id="mixed-series-container-10a63b7958" class="cmp-container"> <div class="simple-series"> <dds-content-group-simple> <dds-content-group-copy> <dds-content-group-paragraph> <div class="cms-richtext " id="rich-text-38a525ca6f" data-dynamic-inner-content="description"> <p>There are two general types of ransomware. The most common type, called encrypting ransomware or crypto ransomware, holds the victim’s data hostage by encrypting it. The attacker then demands a ransom in exchange for providing the encryption key needed to decrypt the data.</p> <p>The less common form of ransomware, called non-encrypting ransomware or screen-locking ransomware, locks the victim’s entire device, usually by blocking access to the operating system. Instead of starting up as usual, the device displays a screen that makes the ransom demand.</p> <p>These two general types fall into these subcategories:</p> </div> </dds-content-group-paragraph> </dds-content-group-copy> <div id="simple-series-items-container-14677e9cf8" class="cmp-container"> <div class="content-block-item"> <dds-content-item> <dds-content-item-heading> Leakware or doxware </dds-content-item-heading> <dds-content-item-copy> <dds-content-item-paragraph> <div class="cms-richtext " id="rich-text-79b191de7f" data-dynamic-inner-content="description"> <p>Leakware or doxware is ransomware that steals, or exfiltrates, sensitive data and threatens to publish it. While earlier forms of leakware or doxware often stole data without encrypting it, today’s variants usually do both.</p> </div> </dds-content-item-paragraph> </dds-content-item-copy> </dds-content-item> </div> <div class="content-block-item"> <dds-content-item> <dds-content-item-heading> Mobile ransomware </dds-content-item-heading> <dds-content-item-copy> <dds-content-item-paragraph> <div class="cms-richtext " id="rich-text-ac05dce8f3" data-dynamic-inner-content="description"> <p>Mobile ransomware includes all ransomware that affects mobile devices. Delivered through malicious apps or drive-by downloads, most mobile ransomware is non-encrypting ransomware. Hackers prefer screen-lockers for mobile attacks because automated cloud data backups, standard on many mobile devices, make it easy to reverse encryption attacks.</p> </div> </dds-content-item-paragraph> </dds-content-item-copy> </dds-content-item> </div> <div class="content-block-item"> <dds-content-item> <dds-content-item-heading> Wipers </dds-content-item-heading> <dds-content-item-copy> <dds-content-item-paragraph> <div class="cms-richtext " id="rich-text-92c5902160" data-dynamic-inner-content="description"> <p>Wipers, or destructive ransomware, threaten to destroy data if the victim does not pay the ransom. In some cases, the ransomware destroys the data even if the victim pays. This latter type of wiper is often deployed by nation-state actors or hacktivists rather than common cybercriminals. <br /> </p> </div> </dds-content-item-paragraph> </dds-content-item-copy> </dds-content-item> </div> <div class="content-block-item"> <dds-content-item> <dds-content-item-heading> Scareware </dds-content-item-heading> <dds-content-item-copy> <dds-content-item-paragraph> <div class="cms-richtext " id="rich-text-068fd27e1e" data-dynamic-inner-content="description"> <p><a href="https://www.ibm.com/topics/scareware" target="_self" style=" font-family: inherit; background-color: rgb(255,255,255); " rel="noopener noreferrer">Scareware</a><span style=""> is just what it sounds like—ransomware that tries to scare users into paying a ransom. Scareware might pose as a message from a law enforcement agency, accusing the victim of a crime and demanding a fine. Alternatively, it might spoof a legitimate virus infection alert, encouraging the victim to purchase ransomware disguised as antivirus software. </span><br /> </p> <p>Sometimes, the scareware is the ransomware, encrypting the data or locking the device. In other cases, it’s the ransomware vector, encrypting nothing but coercing the victim to download ransomware. </p> </div> </dds-content-item-paragraph> </dds-content-item-copy> </dds-content-item> </div> </div> </dds-content-group-simple> </div> </div> </dds-content-block-mixed> </div> </div> <div horizontal-ruler> <dds-hr></dds-hr> </div> </div> <div class="mixed-series"> <div> <div class="bx--col-lg-12 bx--no-gutter"> <dds-content-block-mixed content-section-body> <div slot="heading"> <a data-title="How ransomware infects a system or device " name="How+ransomware+infects+a+system+or+device%C2%A0%C2%A0"></a> <dds-content-block-heading> <a data-title="How ransomware infects a system or device " name="How+ransomware+infects+a+system+or+device%C2%A0%C2%A0"></a> How ransomware infects a system or device </dds-content-block-heading> </div> <div id="mixed-series-container-4d0866d73e" class="cmp-container"> <div class="simple-series"> <dds-content-group-simple> <dds-content-group-copy> <dds-content-group-paragraph> <div class="cms-richtext " id="rich-text-c4024c101e" data-dynamic-inner-content="description"> <p>Ransomware attacks can use several methods, or vectors, to infect a network or device. Some of the most prominent ransomware infection vectors include:</p> </div> </dds-content-group-paragraph> </dds-content-group-copy> <div id="simple-series-items-container-05841b8b72" class="cmp-container"> <div class="content-block-item"> <dds-content-item> <dds-content-item-heading> Phishing and other social engineering attacks </dds-content-item-heading> <dds-content-item-copy> <dds-content-item-paragraph> <div class="cms-richtext " id="rich-text-19a3f5491c" data-dynamic-inner-content="description"> <p><a href="https://www.ibm.com/topics/social-engineering" target="_self" rel="noopener noreferrer">Social engineering</a><span style=""> attacks trick victims into downloading and running executable files that turn out to be ransomware. For example, a </span><a href="https://www.ibm.com/topics/phishing" target="_self" rel="noopener noreferrer">phishing</a><span style=""> email might contain a malicious attachment disguised as a harmless-looking .pdf, Microsoft Word document, or other file. </span><br /> </p> <p>Social engineering attacks might also lure users into visiting a malicious website or scanning malicious QR codes that pass the ransomware through the user’s web browser.</p> </div> </dds-content-item-paragraph> </dds-content-item-copy> </dds-content-item> </div> <div class="content-block-item"> <dds-content-item> <dds-content-item-heading> Operating system and software vulnerabilities </dds-content-item-heading> <dds-content-item-copy> <dds-content-item-paragraph> <div class="cms-richtext " id="rich-text-280cb6bb33" data-dynamic-inner-content="description"> <p>Cybercriminals often exploit existing vulnerabilities to inject malicious code into a device or network. <br /> <br /> <a href="https://www.ibm.com/topics/zero-day" target="_self" rel="noopener noreferrer">Zero-day vulnerabilities</a>, which are vulnerabilities either unknown to the security community or identified but not yet patched, pose a particular threat. Some ransomware gangs buy information on zero-day flaws from other hackers to plan their attacks. Hackers have also effectively used patched vulnerabilities as attack vectors, as was the case in the 2017 WannaCry attack.</p> </div> </dds-content-item-paragraph> </dds-content-item-copy> </dds-content-item> </div> <div class="content-block-item"> <dds-content-item> <dds-content-item-heading> Credential theft </dds-content-item-heading> <dds-content-item-copy> <dds-content-item-paragraph> <div class="cms-richtext " id="rich-text-d1131e15a9" data-dynamic-inner-content="description"> <p>Cybercriminals can steal authorized users' credentials, buy them on the dark web, or crack them through brute-force attacks. They then use these credentials to log in to a network or computer and deploy ransomware directly. <br /> </p> <p>Remote desktop protocol (RDP), a proprietary Microsoft protocol that allows users to access a computer remotely, is a popular credential-theft target among ransomware attackers.</p> </div> </dds-content-item-paragraph> </dds-content-item-copy> </dds-content-item> </div> <div class="content-block-item"> <dds-content-item> <dds-content-item-heading> Other malware </dds-content-item-heading> <dds-content-item-copy> <dds-content-item-paragraph> <div class="cms-richtext " id="rich-text-de12efdddf" data-dynamic-inner-content="description"> <p>Hackers often use <a href="https://www.ibm.com/topics/malware" target="_self" rel="noopener noreferrer">malware</a><span style=""> developed for other attacks to deliver ransomware to a device. Threat actors used the Trickbot Trojan, originally designed to steal banking credentials, to spread the Conti ransomware variant throughout 2021.</span><br /> </p> </div> </dds-content-item-paragraph> </dds-content-item-copy> </dds-content-item> </div> <div class="content-block-item"> <dds-content-item> <dds-content-item-heading> Drive-by downloads </dds-content-item-heading> <dds-content-item-copy> <dds-content-item-paragraph> <div class="cms-richtext " id="rich-text-e28080752a" data-dynamic-inner-content="description"> <p>Hackers can use websites to pass ransomware to devices without the users’ knowledge. Exploit kits use compromised websites to scan visitors’ browsers for web application vulnerabilities they can use to inject ransomware onto a device. <br /> </p> <p>Malvertising—legitimate digital ads that hackers have compromised—can also pass ransomware to devices, even if the user doesn’t click the ad.</p> </div> </dds-content-item-paragraph> </dds-content-item-copy> </dds-content-item> </div> </div> </dds-content-group-simple> </div> <div class="simple-series"> <dds-content-group-simple> <dds-content-group-heading> Ransomware as a service </dds-content-group-heading> <dds-content-group-copy> <dds-content-group-paragraph> <div class="cms-richtext " id="rich-text-47337871dd" data-dynamic-inner-content="description"> <p>Cybercriminals don’t necessarily need to develop their own ransomware to exploit these vectors. Some ransomware developers share their malware code with cybercriminals through <a href="https://www.ibm.com/topics/ransomware-as-a-service" target="_self" rel="noopener noreferrer">ransomware as a service (RaaS)</a> arrangements. </p> <p>The cybercriminal, or “affiliate,” uses the code to carry out an attack and splits the ransom payment with the developer. It’s a mutually beneficial relationship. Affiliates can profit from extortion without having to develop their own malware, and developers can increase their profits without launching more cyberattacks.</p> <p>Ransomware distributors can sell ransomware through digital marketplaces on the dark web. They can also recruit affiliates directly through online forums or similar avenues. Large ransomware groups have invested significant sums of money in recruitment efforts to attract affiliates. </p> </div> </dds-content-group-paragraph> </dds-content-group-copy> <div id="simple-series-items-container-550f94109f" class="cmp-container"> </div> </dds-content-group-simple> </div> </div> </dds-content-block-mixed> </div> </div> <div horizontal-ruler> <dds-hr></dds-hr> </div> </div> <div class="mixed-series"> <div> <div class="bx--col-lg-12 bx--no-gutter"> <dds-content-block-mixed content-section-body> <div slot="heading"> <a data-title="Stages of a ransomware attack" name="Stages+of+a+ransomware+attack"></a> <dds-content-block-heading> <a data-title="Stages of a ransomware attack" name="Stages+of+a+ransomware+attack"></a> Stages of a ransomware attack </dds-content-block-heading> </div> <div id="mixed-series-container-ac54af7186" class="cmp-container"> <div class="pictogram-series"> <dds-content-group-pictograms> <dds-content-group-copy slot="copy"> <dds-content-group-paragraph> <div class="cms-richtext " id="rich-text-35589b290f" data-dynamic-inner-content="description"> <p>A ransomware attack typically proceeds through these stages.</p> </div> </dds-content-group-paragraph> </dds-content-group-copy> <div id="pictogram-items-container-93591a67e1" class="cmp-container"> <div class="pictogram-item"> <dds-pictogram-item> <i slot="pictogram" class="ibm_icon_door--handle bx--pictogram-item__pictogram" data-autoid="dds--pictogram-item__pictogram"></i> <dds-content-item-heading> Stage 1: Initial access </dds-content-item-heading> <dds-content-item-copy> <dds-content-item-paragraph> <div class="cms-richtext " id="rich-text-f2c626e15b" data-dynamic-inner-content="description"> <p>According to the IBM Security® <a href="https://www.ibm.com/account/reg/signup?formid=urx-52119" target="_blank" rel="noopener noreferrer"><em>Definitive Guide to Ransomware</em></a>, the most common vectors for ransomware attacks are phishing, vulnerability exploitation and compromising remote access protocols like RDP. </p> </div> </dds-content-item-paragraph> </dds-content-item-copy> </dds-pictogram-item> </div> <div class="pictogram-item"> <dds-pictogram-item> <i slot="pictogram" class="ibm_icon_bug--virus--malware bx--pictogram-item__pictogram" data-autoid="dds--pictogram-item__pictogram"></i> <dds-content-item-heading> Stage 2: Post-exploitation </dds-content-item-heading> <dds-content-item-copy> <dds-content-item-paragraph> <div class="cms-richtext " id="rich-text-b61a798672" data-dynamic-inner-content="description"> <p>Depending on the initial access vector, hackers might deploy an intermediary remote access tool (RAT) or other malware to help gain a foothold in the target system. </p> </div> </dds-content-item-paragraph> </dds-content-item-copy> </dds-pictogram-item> </div> <div class="pictogram-item"> <dds-pictogram-item> <i slot="pictogram" class="ibm_icon_expand--user bx--pictogram-item__pictogram" data-autoid="dds--pictogram-item__pictogram"></i> <dds-content-item-heading> Stage 3: Understand and expand </dds-content-item-heading> <dds-content-item-copy> <dds-content-item-paragraph> <div class="cms-richtext " id="rich-text-4dc7e2a7df" data-dynamic-inner-content="description"> <p>During this third stage, attackers focus on understanding the local system and domain that they can currently access. The attackers also work on gaining access to other systems and domains, a process called lateral movement.</p> </div> </dds-content-item-paragraph> </dds-content-item-copy> </dds-pictogram-item> </div> <div class="pictogram-item"> <dds-pictogram-item> <i slot="pictogram" class="ibm_icon_download--01 bx--pictogram-item__pictogram" data-autoid="dds--pictogram-item__pictogram"></i> <dds-content-item-heading> Stage 4: Data collection and exfiltration </dds-content-item-heading> <dds-content-item-copy> <dds-content-item-paragraph> <div class="cms-richtext " id="rich-text-adf6d8e64a" data-dynamic-inner-content="description"> <p>Here the ransomware operators switch focus to identifying valuable data and exfiltrating (stealing) it, usually by downloading or exporting a copy for themselves. </p> <p>While attackers might exfiltrate any data that they can access, they usually focus on especially valuable data—login credentials, customers’ personal information, intellectual property—that they can use for double-extortion.</p> </div> </dds-content-item-paragraph> </dds-content-item-copy> </dds-pictogram-item> </div> <div class="pictogram-item"> <dds-pictogram-item> <i slot="pictogram" class="ibm_icon_locked--network--02 bx--pictogram-item__pictogram" data-autoid="dds--pictogram-item__pictogram"></i> <dds-content-item-heading> Stage 5: Deployment and sending the note </dds-content-item-heading> <dds-content-item-copy> <dds-content-item-paragraph> <div class="cms-richtext " id="rich-text-1059a2fe62" data-dynamic-inner-content="description"> <p>Crypto ransomware begins identifying and encrypting files. Some crypto ransomware also disables system restore features or deletes or encrypts backups on the victim's computer or network to increase the pressure to pay for the decryption key. </p> <p>Non-encrypting ransomware locks the device screen, floods the device with pop-ups or otherwise prevents the victim from using the device.</p> <p>After the files have been encrypted or the device has been made unusable, the ransomware alerts the victim to the infection. This notification often comes through a .txt file deposited on the computer's desktop or through a pop-up window. </p> <p>The ransom note contains instructions on how to pay the ransom, usually in cryptocurrency or a similarly untraceable method. Payment is in exchange for a decryption key or restoration of standard operations.</p> </div> </dds-content-item-paragraph> </dds-content-item-copy> </dds-pictogram-item> </div> </div> </dds-content-group-pictograms> </div> </div> </dds-content-block-mixed> </div> </div> <div horizontal-ruler> <dds-hr></dds-hr> </div> </div> <div class="simple-narrative"> <dds-content-block-simple data-autoid="dds--content-block-simple" class=" " no-aside content-section-body> <div slot="heading"> <a data-title="Notable ransomware variants" name="Notable+ransomware+variants"></a> <dds-content-block-heading data-autoid="dds--content-block__heading" role="heading"> <a data-title="Notable ransomware variants" name="Notable+ransomware+variants"></a> Notable ransomware variants </dds-content-block-heading> </div> <dds-content-block-copy data-autoid="dds--content-block__copy" slot="copy" size="sm"> <div class="cms-richtext " id="rich-text-dace13cd23" data-dynamic-inner-content="description"> <p>To date, cybersecurity researchers have identified thousands of distinct ransomware variants, or “families”—unique strains with their own code signatures and functions. </p> <p>Several ransomware strains are especially notable for the extent of their destruction, how they influenced the development of ransomware or the threats they pose today. </p> <h3>CryptoLocker</h3> <p><br /> First appearing in September 2013, CryptoLocker is widely credited with kick-starting the modern age of ransomware. <br /> </p> <p>Spread through a botnet (a network of hijacked computers), CryptoLocker was one of the first ransomware families to strongly encrypt users' files. It extorted an estimated USD 3 million before an international law enforcement effort shut it down in 2014. </p> <p>CryptoLocker's success spawned numerous copycats and paved the way for variants like WannaCry, Ryuk and Petya.</p> <h3>WannaCry</h3> <p><br /> The first high-profile cryptoworm—ransomware that can spread itself to other devices on a network—WannaCry attacked over 200,000 computers in 150 countries. The affected computers were vulnerable because administrators had neglected to patch the EternalBlue Microsoft Windows vulnerability. </p> <p>In addition to encrypting sensitive data, WannaCry ransomware threatened to wipe files if victims did not send payment within seven days. It remains one of the largest ransomware attacks to date, with estimated costs as high as USD 4 billion.</p> <h3>Petya and NotPetya</h3> <p><br /> Unlike other crypto ransomware, Petya encrypts the file system table rather than individual files, rendering the infected computer unable to boot Windows. </p> <p>A heavily modified version, NotPetya, was used to carry out a large-scale cyberattack, primarily against Ukraine, in 2017. NotPetya was a wiper incapable of unlocking systems even after victims paid.</p> <h3>Ryuk</h3> <p><br /> First seen in 2018, Ryuk popularized ‘big-game ransomware’ attacks against specific high-value targets, with ransom demands averaging over USD 1 million. Ryuk can locate and disable backup files and system restore features. A new strain with cryptoworm capabilities appeared in 2021.</p> <h3>DarkSide</h3> <p><br /> Run by a group suspected to be operating out of Russia, DarkSide is the ransomware variant that attacked the Colonial Pipeline on 7 May 2021. In what many consider to be the worst cyberattack on critical US infrastructure to date, DarkSide temporarily shut down the pipeline supplying 45% of the East Coast's fuel.</p> <p>In addition to conducting direct attacks, the DarkSide group also licenses its ransomware to affiliates through RaaS arrangements.</p> <h3>Locky</h3> <p><br /> Locky is an encrypting ransomware with a distinct method of infection—it uses macros hidden in email attachments (Microsoft Word files) disguised as legitimate invoices. When a user downloads and opens the Microsoft Word document, malicious macros secretly download the ransomware payload to the user's device.</p> <h3>REvil</h3> <p><br /> REvil, also known as Sodin or Sodinokibi, helped popularize the RaaS approach to ransomware distribution. </p> <p>Known for use in big-game hunting and double-extortion attacks, REvil was behind the 2021 attacks against JBS USA and Kaseya Limited. JBS paid a USD 11 million ransom after the hackers disrupted its entire US beef processing operation. Significant downtime impacted more than 1,000 of Kaseya’s software customers.</p> <p>The Russian Federal Security Service reported it dismantled REvil and charged several of its members in early 2022.</p> <h3>Conti</h3> <p><br /> First observed in 2020, the Conti gang operated an extensive RaaS scheme in which it paid hackers a regular wage to use its ransomware. Conti used a unique form of double-extortion where the gang threatened to sell access to a victim’s network to other hackers if the victim did not pay up.</p> <p>Conti disbanded after the gang’s internal chat logs leaked in 2022, but many former members are still active in the cybercrime world. According to the <a href="https://www.ibm.com/reports/threat-intelligence" target="_self" rel="noopener noreferrer"><em>X-Force Threat Intelligence Index</em></a>, one-time Conti associates have been linked to some of the most widespread ransomware variants today, include BlackBasta, Royal and Zeon. </p> <h3>LockBit</h3> <p><br /> One of the most common ransomware variants in 2023 according to the<em> X-Force Threat Intelligence Index</em>, LockBit is notable for the businesslike behavior of its developers. The LockBit group has been known to acquire other malware strains in much the same way that legitimate businesses acquire other companies. </p> <p>While law enforcement seized some of LockBit’s websites in February 2024 and the US government imposed sanctions on one of the gang’s senior leaders, LockBit continues to attack victims. </p> </div> </dds-content-block-copy> </dds-content-block-simple> <div horizontal-ruler> <dds-hr></dds-hr> </div> </div> <div class="simple-narrative"> <dds-content-block-simple data-autoid="dds--content-block-simple" class=" " no-aside content-section-body> <div slot="heading"> <a data-title="Ransom payments" name="Ransom+payments"></a> <dds-content-block-heading data-autoid="dds--content-block__heading" role="heading"> <a data-title="Ransom payments" name="Ransom+payments"></a> Ransom payments </dds-content-block-heading> </div> <dds-content-block-copy data-autoid="dds--content-block__copy" slot="copy" size="sm"> <div class="cms-richtext " id="rich-text-1c6a36a1b1" data-dynamic-inner-content="description"> <p>Ransom demands vary widely, and many victims choose not to publicize how much they paid, so it is difficult to determine an average ransom payment amount. That said, most estimates put it in the high six-figure to low seven-figure range. Attackers have demanded ransom payments as high as USD 80 million according to the IBM <em><a href="https://www.ibm.com/account/reg/signup?formid=urx-52119" target="_blank" rel="noopener noreferrer">Definitive Guide to Ransomware</a>.</em></p> <p>Importantly, the proportion of victims who pay any ransom at all has fallen sharply in recent years. According to cyber extortion incident response firm Coveware, only 37% of victims paid a ransom in 2023, compared to 70% in 2020.<sup>1</sup></p> <p>Experts point to better cybercrime preparedness—including increased investment in data backups, incident response plans and threat prevention and detection technology—as a potential driver behind this reversal.</p> <h3>Law enforcement guidance</h3> <p><br /> US federal law enforcement agencies unanimously discourage ransomware victims from paying ransom demands. According to the National Cyber Investigative Joint Task Force (NCIJTF), a coalition of 20 partnering US federal agencies charged with investigating cyberthreats:</p> <p style=" margin-left: 40.0px; "><em>“The FBI does not encourage paying a ransom to criminal actors. Paying a ransom may embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Paying the ransom also does not guarantee that a victim's files will be recovered.”</em></p> <p>Law enforcement agencies recommend that ransomware victims report attacks to the appropriate authorities, like the FBI's Internet Crime Complaint Center (IC3), before paying a ransom. </p> <p>Some victims of ransomware attacks have a legal obligation to report ransomware infections regardless of whether they pay a ransom. For example, HIPAA compliance generally requires healthcare entities to report any data breach, including ransomware attacks, to the Department of Health and Human Services.</p> <p>Under certain conditions, paying a ransom can be illegal. </p> <p>The US Office of Foreign Assets Control (OFAC) has stated that paying a ransom to attackers from countries under US economic sanctions—such as North Korea or Iran—violates OFAC regulations. Violators can face civil penalties, fines or criminal charges. </p> <p>Some US states, such as Florida and North Carolina, have made it illegal for state government agencies to pay a ransom.</p> </div> </dds-content-block-copy> </dds-content-block-simple> <div horizontal-ruler> <dds-hr></dds-hr> </div> </div> <div class="simple-narrative"> <dds-content-block-simple data-autoid="dds--content-block-simple" class=" " no-aside content-section-body> <div slot="heading"> <a data-title="Ransomware protection and response" name="Ransomware+protection+and+response"></a> <dds-content-block-heading data-autoid="dds--content-block__heading" role="heading"> <a data-title="Ransomware protection and response" name="Ransomware+protection+and+response"></a> Ransomware protection and response </dds-content-block-heading> </div> <dds-content-block-copy data-autoid="dds--content-block__copy" slot="copy" size="sm"> <div class="cms-richtext " id="rich-text-a4acb4e7fc" data-dynamic-inner-content="description"> <p>Cybersecurity experts and federal agencies like the Cybersecurity and Infrastructure Security Agency (CISA) and the US Secret Service recommend that organizations take precautionary measures to defend against ransomware threats. These measures can include:</p> <ul><li><strong>Maintaining backups </strong>of sensitive data and system images, ideally on hard drives or other devices that the IT team can disconnect from the network in the event of a ransomware attack. <br /> <br /> </li><li><strong>Applying patches</strong> regularly to help thwart ransomware attacks that exploit software and operating system vulnerabilities. <br /> <br /> </li><li><strong>Cybersecurity tools</strong> such as antimalware software, <a href="https://www.ibm.com/topics/network-monitoring" target="_self" rel="noopener noreferrer">network monitoring</a> tools, <a href="https://www.ibm.com/topics/edr" target="_self" rel="noopener noreferrer">endpoint detection and response (EDR)</a> platforms and <a href="https://www.ibm.com/topics/siem" target="_self" rel="noopener noreferrer">security information and event management (SIEM)</a> systems can help security teams intercept ransomware in real-time.<br /> <br /> </li><li><strong>Employee cybersecurity</strong> training can help users recognize and avoid phishing, social engineering and other tactics that can lead to ransomware infections.<br /> <br /> </li><li><strong>Implementing access control policies</strong> including <a href="https://www.ibm.com/topics/multi-factor-authentication" target="_self" rel="noopener noreferrer">multifactor authentication</a>, network segmentation and similar measures can prevent ransomware from reaching sensitive data<a href="https://www.ibm.com/topics/identity-access-management" target="_self" rel="noopener noreferrer">. Identity and access management</a> (IAM) controls can also keep cryptoworms from spreading to other devices on the network.<br /> <br /> </li><li><strong>Formal incident response</strong> plans enable security teams to intercept and remediate breaches in less time. The <a href="https://www.ibm.com/reports/data-breach" target="_self" rel="noopener noreferrer"><em>Cost of a Data Breach</em></a> report found that organizations with formal plans and dedicated <a href="https://www.ibm.com/topics/incident-response" target="_self" rel="noopener noreferrer">incident response</a> teams identify breaches 54 days faster than organizations that have neither. This speedier detection time lowers remediation costs, saving organizations an average of nearly USD 1 million. </li></ul> <p>While decryptor tools for some ransomware variants are publicly available through projects like No More Ransom<sup>2</sup>, remediation of an active ransomware infection often requires a multifaceted approach. </p> <p>See the IBM Security <a href="https://www.ibm.com/account/reg/signup?formid=urx-52119" target="_blank" rel="noopener noreferrer"><em>Definitive Guide to Ransomware</em></a> for an example of a ransomware incident response plan modeled after the National Institute of Standards and Technology (NIST) incident response lifecycle. </p> </div> </dds-content-block-copy> </dds-content-block-simple> <div horizontal-ruler> <dds-hr></dds-hr> </div> </div> <div class="simple-narrative"> <dds-content-block-simple data-autoid="dds--content-block-simple" class=" " no-aside content-section-body> <div slot="heading"> <a data-title="A brief ransomware timeline" name="A+brief+ransomware+timeline"></a> <dds-content-block-heading data-autoid="dds--content-block__heading" role="heading"> <a data-title="A brief ransomware timeline" name="A+brief+ransomware+timeline"></a> A brief ransomware timeline </dds-content-block-heading> </div> <dds-content-block-copy data-autoid="dds--content-block__copy" slot="copy" size="sm"> <div class="cms-richtext " id="rich-text-f84152e287" data-dynamic-inner-content="description"> <p><strong>1989</strong>: The first documented ransomware, known as the “AIDS Trojan” or "P.C. Cyborg” attack, is distributed through floppy disks. It hides file directories on the victim's computer and demands USD 189 to unhide them. Because this malware works by encrypting file names rather than the files themselves, it is easy for users to reverse the damage without paying a ransom.</p> <p><strong>1996</strong>: While analyzing the AIDS Trojan, computer scientists Adam L. Young and Moti Yung warn of future forms of malware that could use more sophisticated cryptography to hold sensitive data hostage. </p> <p><strong>2005</strong>: After relatively few ransomware attacks through the early 2000s, an uptick of infections begins, centered in Russia and Eastern Europe. The first variants to use asymmetric encryption appear. As new ransomware offers more effective ways to extort money, more cybercriminals begin spreading ransomware worldwide.</p> <p><strong>2009</strong>: The introduction of cryptocurrency, particularly Bitcoin, gives cybercriminals a way to receive untraceable ransom payments, driving the next surge in ransomware activity. </p> <p><strong>2013</strong>: The modern era of ransomware begins with CryptoLocker inaugurating the current wave of highly sophisticated encryption-based ransomware attacks soliciting payment in cryptocurrency.</p> <p><strong>2015</strong>: The Tox ransomware variant introduces the ransomware as a service (RaaS) model.</p> <p><strong>2017</strong>: WannaCry, the first widely used self-replicating cryptoworm, appears.</p> <p><strong>2018</strong>: Ryuk popularizes big game ransomware hunting. </p> <p><strong>2019</strong>: Double-extortion and triple-extortion ransomware attacks become more popular. Almost every ransomware incident that the IBM Security® X-Force® Incident Response team has responded to since 2019 has involved double extortion.</p> <p><strong>2022</strong>: Thread hijacking—in which cybercriminals insert themselves into targets’ legitimate online conversations to spread malware—emerges as a prominent ransomware vector.</p> <p><strong>2023</strong>: As defenses against ransomware improve, many ransomware gangs begin to expand their arsenals and supplement their ransomware with new extortion tactics. In particular, gangs like LockBit and some remnants of Conti begin using infostealer malware that allows them to steal sensitive data and hold it hostage without needing to lock down victims’ systems.</p> </div> </dds-content-block-copy> </dds-content-block-simple> <div horizontal-ruler> <dds-hr></dds-hr> </div> </div> <div class="offering-group"> <a data-title="Related solutions" name="Related+solutions"></a> <dds-content-block-horizontal border content-section-body> <dds-content-block-heading role="heading" aria-level="2" data-autoid="dds--content-block__heading" slot="heading"> Related solutions </dds-content-block-heading> <div id="offering-group-items-container-b35fb07fbc" class="cmp-container"> <div class="offering-item"> <dds-content-item-horizontal> <dds-content-item-heading> Ransomware protection solutions </dds-content-item-heading> <dds-content-item-horizontal-copy> <caem-paragraph size="normal"> <div class="cms-richtext " id="rich-text-8f939834e1" data-dynamic-inner-content="description"> <p>Stop ransomware from interrupting business continuity and recover quickly when attacks occur to minimize the impact of ransomware threats. </p> </div> </caem-paragraph> </dds-content-item-horizontal-copy> <dds-link-list slot="footer" type="vertical"> <dds-link-list-item-cta aria-label="Explore ransomware solutions" cta-type="local" href="https://www.ibm.com/ransomware" icon-placement="right" role="listitem" target="_self"> Explore ransomware protection solutions </dds-link-list-item-cta> </dds-link-list> </dds-content-item-horizontal> </div> <div class="offering-item"> <dds-content-item-horizontal> <dds-content-item-heading> IBM Storage FlashSystem® </dds-content-item-heading> <dds-content-item-horizontal-copy> <caem-paragraph size="normal"> <div class="cms-richtext " id="rich-text-d4bba7b5a2" data-dynamic-inner-content="description"> <p>Next generation FlashCore Module 4 (FCM4) provides resilient data storage in the event of a cyberattack. Continuously monitor statistics gathered from every single I/O using machine learning models to detect anomalies like ransomware in less than a minute.</p> </div> </caem-paragraph> </dds-content-item-horizontal-copy> <dds-link-list slot="footer" type="vertical"> <dds-link-list-item-cta cta-type="local" href="https://www.ibm.com/flashsystem" icon-placement="right" role="listitem" target="_self"> Explore IBM Storage FlashSystem </dds-link-list-item-cta> </dds-link-list> </dds-content-item-horizontal> </div> <div class="offering-item"> <dds-content-item-horizontal> <dds-content-item-heading> IBM® Storage Defender </dds-content-item-heading> <dds-content-item-horizontal-copy> <caem-paragraph size="normal"> <div class="cms-richtext " id="rich-text-0f96e37b29" data-dynamic-inner-content="description"> <p>Proactively protect your organization’s primary and secondary storage systems against ransomware, human error, natural disasters, sabotage, hardware failures and other data loss risks.</p> </div> </caem-paragraph> </dds-content-item-horizontal-copy> <dds-link-list slot="footer" type="vertical"> <dds-link-list-item-cta cta-type="local" href="https://www.ibm.com/products/storage-defender" icon-placement="right" role="listitem" target="_self"> Explore IBM Storage Defender </dds-link-list-item-cta> </dds-link-list> </dds-content-item-horizontal> </div> </div> </dds-content-block-horizontal> </div> <div class="block-card-container container responsivegrid"> <dds-content-block-cards data-autoid="dds--content-block-cards" content-section-body> <a data-title="Resources" name="Resources" slot="heading"></a> <dds-content-block-heading slot="heading" data-autoid="dds--content-block__heading" role="heading"> <a data-title="Resources" name="Resources"></a> Resources </dds-content-block-heading> <dds-card-group cards-per-row="3" grid-mode="border"> <dds-card-group-item href="https://ibm.webcasts.com/starthere.jsp?ei=1670641&tp_key=3e25a3e268" target="_blank" pictogram-placement="top" cta-type="external" no-poster="true"> <dds-card-eyebrow slot="eyebrow" aria-hidden="true" class="bx--card__eyebrow"> Webinar </dds-card-eyebrow> <dds-card-heading role="heading" aria-level="3" slot="heading" class="bx--card__heading"> Fighting ransomware with IBM Storage Defender and IBM Storage FlashSystem </dds-card-heading> <p>Register for the webinar to learn how you can combine the power of IBM Storage Defender and IBM FlashSystem to fight ransomware.</p> <dds-card-cta-footer icon-placement="right" cta-type="external" href="https://ibm.webcasts.com/starthere.jsp?ei=1670641&tp_key=3e25a3e268" slot="footer" aria-hidden="true" target="_blank" class="bx--card__footer-icon-size"> </dds-card-cta-footer> </dds-card-group-item> <dds-card-group-item href="https://ibm.webcasts.com/starthere.jsp?ei=1664795&tp_key=1d5e11d846" target="_blank" pictogram-placement="top" cta-type="external" no-poster="true"> <dds-card-eyebrow slot="eyebrow" aria-hidden="true" class="bx--card__eyebrow"> Webinar </dds-card-eyebrow> <dds-card-heading role="heading" aria-level="3" slot="heading" class="bx--card__heading"> Backup is not enough—it's time to move to data resilience </dds-card-heading> <p>Watch the on-demand recording to learn practical steps you can take to build a more resilient operation and secure your data.</p> <dds-card-cta-footer icon-placement="right" cta-type="external" href="https://ibm.webcasts.com/starthere.jsp?ei=1664795&tp_key=1d5e11d846" slot="footer" aria-hidden="true" target="_blank" class="bx--card__footer-icon-size"> </dds-card-cta-footer> </dds-card-group-item> <dds-card-group-item href="https://www.ibm.com/reports/threat-intelligence" target="_self" pictogram-placement="top" cta-type="local" aria-label="Register for the threat intelligence report" no-poster="true"> <dds-card-eyebrow slot="eyebrow" aria-hidden="true" class="bx--card__eyebrow"> Report </dds-card-eyebrow> <dds-card-heading role="heading" aria-level="3" slot="heading" class="bx--card__heading"> X-Force Threat Intelligence Index </dds-card-heading> <p>Get actionable insights that help you understand how threat actors are waging attacks and how you can proactively protect your organization.</p> <dds-card-cta-footer icon-placement="right" cta-type="local" href="https://www.ibm.com/reports/threat-intelligence" slot="footer" aria-hidden="true" target="_self" class="bx--card__footer-icon-size"> <span>Download the report</span> </dds-card-cta-footer> </dds-card-group-item> <dds-card-group-item href="https://www.ibm.com/account/reg/signup?formid=urx-52913" target="_self" pictogram-placement="top" cta-type="local" no-poster="true"> <dds-card-eyebrow slot="eyebrow" aria-hidden="true" class="bx--card__eyebrow"> Report </dds-card-eyebrow> <dds-card-heading role="heading" aria-level="3" slot="heading" class="bx--card__heading"> Cost of a Data Breach Report </dds-card-heading> <p>Data breach costs have hit a new high. Get insights on how to reduce these costs from the experiences of 604 organizations and 3,556 cybersecurity and business leaders.</p> <dds-card-cta-footer icon-placement="right" cta-type="local" href="https://www.ibm.com/account/reg/signup?formid=urx-52913" slot="footer" aria-hidden="true" target="_self" class="bx--card__footer-icon-size"> <span>Read the report</span> </dds-card-cta-footer> </dds-card-group-item> <dds-card-group-item href="https://www.ibm.com/account/reg/signup?formid=urx-53217" target="_self" pictogram-placement="top" cta-type="local" no-poster="true"> <dds-card-eyebrow slot="eyebrow" aria-hidden="true" class="bx--card__eyebrow"> Report </dds-card-eyebrow> <dds-card-heading role="heading" aria-level="3" slot="heading" class="bx--card__heading"> X-Force Cloud Threat Landscape Report </dds-card-heading> <p>Get key insights and practical strategies for securing your cloud with the latest threat intelligence.</p> <dds-card-cta-footer icon-placement="right" cta-type="local" href="https://www.ibm.com/account/reg/signup?formid=urx-53217" slot="footer" aria-hidden="true" target="_self" class="bx--card__footer-icon-size"> <span>Read the report</span> </dds-card-cta-footer> </dds-card-group-item> </dds-card-group> </dds-content-block-cards> <div horizontal-ruler> <dds-hr></dds-hr> </div> </div> </div> </div> </div> </div> </div> </div> <div class="experiencefragment"> <div id="experiencefragment-a6281958ea" class="cmp-experiencefragment cmp-experiencefragment--security-services"> <div class="xf-content-height"> <div class="root container responsivegrid"> <div id="container-379a8aca03" class="cmp-container"> <div class="next-steps container responsivegrid"> <div id="next-steps-75a20dae1c" class="cmp-container"> <div class="next-steps-container"> <div data-cmp-is="next-steps-container" class="bx--next-steps-container"> <div class="bx--cta-section--g10 bx--cta-section--theme" data-dynamic-content-type="ADOBE_TARGET" data-component-name="next-steps" data-component-identifier="next-steps"> <dds-cta-block no-border class=" cta-block-section__container"> <div role="heading" data-autoid="dds--content-block__heading" class="bx--content-block__heading" slot="heading"> <a data-title="Take the next step" name="Take+the+next+step"></a> <span class="enhanced-title ">Take the next step</span> </div> <dds-content-block-copy size="sm"> <dds-content-block-paragraph> <div class="cms-richtext " id="rich-text-69139df1db" data-dynamic-inner-content="description"> <p>IBM cybersecurity services deliver advisory, integration and managed security services and offensive and defensive capabilities. We combine a global team of experts with proprietary and partner technology to co-create tailored security programs that manage risk.</p> </div> </dds-content-block-paragraph> </dds-content-block-copy> <dds-button-group slot="action"> <dds-button-cta href="https://www.ibm.com/services/security" target="_self" kind="primary" cta-type="local"> <span>Explore cybersecurity services</span> </dds-button-cta> <dds-button-cta href="https://www.ibm.com/account/reg/signup?formid=news-urx-52954" target="_blank" kind="tertiary" cta-type="local"> <span>Subscribe to the Think Newsletter</span> </dds-button-cta> </dds-button-group> </dds-cta-block> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </dds-table-of-contents> </div> <div class="container responsivegrid"> <div id="container-4e57584f1c" class="cmp-container"> <div class="footnotes"><div> <div data-autoid="dds--content-block" class="bx--content-block"> <div class="bx--grid"> <div class="bx--row"> <div class="bx--col-lg-4"> <div data-autoid="dds--content-block-segmented" class="bx--content-block-segmented"> <h5> Footnotes </h5> </div> </div> <div class="bx--col-lg-12"> <div data-autoid="dds--content-block-segmented" class="bx--content-block-segmented"> <div class="cms-richtext " id="rich-text-c8f6bcb29b" data-dynamic-inner-content="description"> <p><em>All links reside outside ibm.com</em></p> <p><sup>1</sup> <a href="https://www.coveware.com/blog/2024/1/25/new-ransomware-reporting-requirements-kick-in-as-victims-increasingly-avoid-paying" target="_blank" rel="noopener noreferrer">New Ransomware Reporting Requirements Kick in as Victims Increasingly Avoid Paying</a>. <em>Coveware</em>. 26 January 2024.</p> <p><sup>2</sup> <a href="https://www.nomoreransom.org/en/decryption-tools.html" target="_blank" rel="noopener noreferrer">Decryption tools</a>. <em>No More Ransom</em>.</p> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> <div class="footer"> <dds-footer-container data-cmp-is="footer" data-autoid="dds--footer" class="cmp-footer" data-children-count="0" size="tall"></dds-footer-container> </div> </div> </div> </dds-video-cta-container> <div class="video-modal-overlay" aria-hidden="true"> <div class="video-modal-overlay__dialog"> <div class="video-modal-overlay__dialog--body"> <div class="video-modal-overlay__dialog--body__close-btn"> <svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"> <rect width="24" height="24" fill="white" fill-opacity="0.01" style="mix-blend-mode:multiply"/> <path id="Vector" d="M13.0606 12L19.5 5.56058L18.4394 4.5L12 10.9394L5.56072 4.5L4.5 5.56058L10.9394 12L4.5 18.4394L5.56072 19.5L12 13.0606L18.4394 19.5L19.5 18.4394L13.0606 12Z" fill="#161616"/> </svg> </div> <div class="video-modal-overlay__dialog--body-content"> <div class="video-modal-overlay__loading-container"> <bx-loading></bx-loading> </div> <div class="video-wms hide"> <iframe class="video-modal-content" data-original-src="https://video.ibm.com/embed/$[wmsChanneId]?volume=0&autoplay=true&controls=true" src="" webkitallowfullscreen allowfullscreen frameborder="no" referrerpolicy="no-referrer-when-downgrade"></iframe> </div> <div class="video-media-center hide"> <dds-video-player-container video-id="" aspect-ratio="16x9" auto-play muted playing-mode="inline"></dds-video-player-container> </div> </div> </div> </div> </div> <dds-lightbox-video-player-container></dds-lightbox-video-player-container> <script src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-idlBundle.lc-184f1369edfafb914817c747b0b7778e-lc.min.js"></script> <script src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-target-antiflicker.lc-36a1efb28e947b5873f4a28c2cf9d5eb-lc.min.js"></script> <script src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-idlStyles.lc-f5a7744980f951b41a897229a7802b6f-lc.min.js"></script> <script src="https://www.ibm.com/common/digitaladvisor/cm-app/latest/cm-app.min.js" defer async></script> <script type="module" src="https://1.www.s81c.com/common/carbon/web-components/version/v1.47.1/tag.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon/web-components/version/v1.47.1/code-snippet.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon/web-components/version/v1.47.1/loading.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/leadspace.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-block-horizontal.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-group-pictograms.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-item-horizontal.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/table-of-contents.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/tag-group.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-section.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-group-heading.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-block-simple.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-block-cards.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/cta-block.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-group.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/background-media.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-block-mixed.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/footer.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-group-simple.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/card-group.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/text-cta.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-block.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/pictogram-item.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/link-list.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/link-list-item-cta.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/video-player.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/button-group.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/card-cta-footer.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-item.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/button-cta.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/content-block-segmented.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/horizontal-rule.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/lightbox-video-player.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.51.1/video-cta-container.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon/carbon-for-aem/version/v0.19.0/paragraph.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon/carbon-for-aem/version/v0.19.0/breadcrumb.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon/carbon-for-aem/version/v0.19.0/star-rating.min.js"></script> <script type="module" id="anti-flicker-script"> document.getElementById('anti-flicker-style').remove(); document.getElementById('anti-flicker-script').remove(); </script> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-pdfviewer.lc-e4412705ab74ab8b0e2e21371e0762c9-lc.min.js"></script> <!-- Added for Adobe analytics implementation ADCMS-5834 <script type="text/javascript"> adobeDataLayer.push({ "event": "linkClick", "web": { "webPageDetails": { "URL": document.URL, "name": "home" }, "webInteraction": { "linkClick":"event", "value":"1", "type": "other", "URL": document.URL, "name": "linkClick: " + document.URL } }, }) </script> !--> <!-- Added for Adobe analytics implementation ADCMS-5834 & ADCMS-6152 !--> <script type="text/javascript"> document.addEventListener("DOMContentLoaded", function() { var templatePath = "\/conf\/adobe\u002Dcms\u002Deditable\/settings\/wcm\/templates\/learn"; var templateName = templatePath.split('/').pop(); const currentUrl = document.URL; const parts = currentUrl.split("/"); const sectionOne = parts.length > 3 ? parts[3].split("?")[0] : ""; const sectionTwo = parts.length > 4 ? parts[4].split("?")[0] : ""; const sectionThree = parts.length > 5 ? parts[5].split("?")[0] : ""; function getCookieByName(name) { const cookieArr = document.cookie.split(';'); for (let i = 0; i < cookieArr.length; i++) { const cookie = cookieArr[i].trim(); if (cookie.startsWith(name + "=")) { return cookie.substring(name.length + 1); } } return null; } function cleanUrl(url) { let modifiedUrl = url; if (modifiedUrl.startsWith("www")) { modifiedUrl = modifiedUrl.replace(/^www\.?/, ""); } return modifiedUrl; } const cisSessionId = getCookieByName("CISSESSIONIDP07A"); let loginStatus = cisSessionId ? "logged in" : "logged out"; adobeDataLayer.push({ "event": "pageLoad", "_ibm": { "page": { "siteSection2": sectionTwo, "siteSection3": sectionThree, "pageType": templateName, "domain": cleanUrl(window.location.host), "siteLanguage": "en", "pageName": cleanUrl(window.location.host) + " | " + templateName + " | Ransomware", "siteCountry": "us" }, "user": { "userAgent": navigator.userAgent, "loginStatus": loginStatus } }, "web": { "webPageDetails": { "pageViews": { "value": 1 }, "URL": document.URL, "name": "Ransomware", "siteSection": sectionOne }, "webReferrer": { "URL": document.referrer } } }); document.addEventListener('click', function(event) { if (event.target.closest('.WACLauncher__ButtonContainer')) { handleClick(event); } }); function handleClick(event) { adobeDataLayer.push({ "event": "chatInitialized", "_ibm": { "chat": { "chatBotClick": { "value": 1 }, "liveChatType": "Support or Sales", "chatLanguage": "en", "chatCountry": "us" }, "click": { "linkTileNumber": 1 } }, "web": { "webPageDetails": { "URL": document.URL, "name": "Ransomware" }, "webInteraction": { "name": "chatInitialized", "URL": document.URL, "type": "other" } } }); } }); </script> <script type="text/javascript" src="/ydIe7e/T7X1mp/5/lcO/2X3sCiA_/3hh9Vfc6NVtk/YEZIU28/SwgeG/kdUXyM"></script><link rel="stylesheet" type="text/css" href="/ydIe7e/T7X1mp/5/lcO/2X3sCiA_/0m/cg02U28/fgxNf/HJ7VzNX"> <script src="/ydIe7e/T7X1mp/5/lcO/2X3sCiA_/0m/cg02U28/M09lC/hU7IC0p" async defer></script> <div id="sec-overlay" style="display:none;"> <div id="sec-container"> </div> </div></body> </html>