CINXE.COM
What Is Information Security? | IBM
<!DOCTYPE HTML> <html lang="en"> <head> <meta charset="UTF-8"/> <meta name="languageCode" content="en"/> <meta name="countryCode" content="us"/> <meta name="searchTitle" content="What Is Information Security?"/> <meta name="focusArea" content="Security - All"/> <title>What Is Information Security? | IBM</title> <script defer="defer" type="text/javascript" src="https://rum.hlx.page/.rum/@adobe/helix-rum-js@%5E2/dist/rum-standalone.js" data-routing="program=131558,environment=1281329,tier=publish"></script> <link rel="icon" href="/content/dam/adobe-cms/default-images/favicon.svg"/> <meta name="keywords" content="Cybersecurity"/> <meta name="description" content="Information security (InfoSec) is the protection of important information against unauthorized access, disclosure, use, alteration or disruption."/> <meta name="template" content="article"/> <meta name="viewport" content="width=device-width, initial-scale=1"/> <meta name="robots" content="index, follow, max-image-preview:large"/> <meta name="ibm.com.search.appid" content="thinkhub"/> <meta name="ibm.com.search.scopes" content="thinkhub"/> <meta name="dcterms.date" content="2024-07-26T00:00:00.000"/> <meta name="ibm.search.facet.field_hierarchy_01" content="taxonomy : Topics / Cybersecurity"/> <meta name="ibm.search.facet.field_hierarchy_02"/> <meta name="ibm.search.facet.field_hierarchy_03" content="taxonomy : Content Format / Article"/> <meta name="ibm.search.facet.field_hierarchy_04" content="taxonomy : Content Type / Explainer"/> <meta name="ibm.search.facet.field_hierarchy_05"/> <meta name="ibm.search.facet.field_keyword_01" content="Cybersecurity"/> <meta name="ibm.search.facet.field_keyword_09" content="https://prod-cloud-publish.aem.ibm.net/content/dam/connectedassets-adobe-cms/worldwide-content/stock-assets/getty/image/photography/33/5b/vojin_00132.component.crop-thumbnail-16-by-9-retina.ts=0.jpg/content/adobe-cms/us/en/think/topics/information-security/jcr:content/root/leadspace_container/leadspace_article"/> <meta name="ibm.search.facet.field_keyword_14"/> <meta name="ibm.search.facet.field_text_01" content="26 July 2024"/> <meta name="ibm.search.facet.field_text_03" content="Explainer"/> <link rel="canonical" href="https://www.ibm.com/think/topics/information-security"/> <link rel="preload" href="/etc.clientlibs/adobe-cms/clientlibs/clientlib-masthead-container.lc-b26f958162efaa6f8eab64f9ba97ad45-lc.min.js" as="script"> <link rel="preload" href="/etc.clientlibs/adobe-cms/clientlibs/clientlib-leadspace.lc-2d50e2fcd68a57f32e42baf02c067083-lc.min.js" as="script"> <script type="text/javascript"> !function(e, a, n, t) { var i = e.head; if (i) { if (a) return; var o = e.createElement("style"); o.id = "alloy-prehiding", o.innerText = n, i.appendChild(o), setTimeout(function() { o.parentNode && o.parentNode.removeChild(o) }, t) } } (document, document.location.href.indexOf("adobe_authoring_enabled") !== -1, "body { opacity: 0 !important }", 900); </script> <script src="https://assets.adobedtm.com/0f2de1d5b89a/565c2aeb0d39/launch-560e54b3e83c.min.js" type="text/javascript" async="async"></script> <script type="text/javascript" async="async"> var adobeDataLayer = window.adobeDataLayer || []; </script> <script type="text/javascript"> window.searchKey = { templateName: 'article', taxonomylist: 'taxonomy : Topics \/ Cybersecurity', L0Tag: 'Topics,Brands,Industries,Geography,Compliance Entities,Products,Events,Computer Languages,Content Format,Series,Content Type,CMaaS Focus Areas,brands,Deployment Types,Product Types,Search Index,Unified Taxonomy', } </script> <link rel="alternate" hreflang="en-us" href="https://www.ibm.com/think/topics/information-security"/> <script type="text/javascript"> var languageCode = document.getElementsByName('languageCode')[0].content; var countryCode = document.getElementsByName('countryCode')[0].content; var focusArea = document.getElementsByName('focusArea')[0].content; /* Define digital data object based on _appInfo object */ window._ibmAnalytics = { settings: { name: "AEM Sites", tealiumProfileName: "aem-sites" }, }; window.digitalData = { page: { category: { primaryCategory: '', }, pageInfo: { language: languageCode + '-' + countryCode, ibm: { siteID: 'MarketingAEM', country: countryCode, messaging: { routing: { focusArea: focusArea, languageCode: languageCode, regionCode: countryCode }, translation: { languageCode: languageCode, regionCode: countryCode } }, sections: 0, patterns: 0, }, carbon: { '@carbon/web-components': 'v1.47.1', '@carbon/ibmdotcom-web-components': 'v1.51.1', 'carbon-for-aem': 'v0.19.0', }, }, }, }; </script> <script type="application/ld+json"> { "@context": "https://schema.org", "@type": "BlogPosting", "mainEntityOfPage": { "@type": "WebPage", "@id": "https://www.ibm.com/think/topics/information-security" }, "headline": "Information Security", "image": [ "https://www.ibm.com/content/dam/connectedassets-adobe-cms/worldwide-content/stock-assets/getty/image/photography/33/5b/vojin_00132.jpg" ], "datePublished": "", "dateModified": "2024-12-27T15:10:59.368Z", "author": {"@type": "Organization","name": "IBM","url": "https://www.ibm.com"} } </script> <!-- Instana script specific to Dev environment start --> <!-- <script> (function(s,t,a,n){s[t]||(s[t]=a,n=s[a]=function(){n.q.push(arguments)}, n.q=[],n.v=2,n.l=1*new Date)})(window,"InstanaEumObject","ineum"); ineum('reportingUrl', 'https://eum-orange-saas.instana.io'); ineum('key', 'mFJnYtpBSiCKl9zenWHXtg'); ineum('trackSessions'); </script> <script defer crossorigin="anonymous" src=https://eum.instana.io/1.7.2/eum.min.js integrity="sha384-cgeSlevgebehPauohUhsnAeBrpjXzaj94mSv3L2EXjCQH0RRb9xSQ2ErGOWkthIJ"></script>--> <!-- Instana script specific to Dev environment end --> <meta property="og:url" content="https://www.ibm.com/think/topics/information-security"/> <meta property="og:type" content="website"/> <meta property="og:title" content="What Is Information Security? | IBM"/> <meta property="og:description" content="Information security (InfoSec) is the protection of important information against unauthorized access, disclosure, use, alteration or disruption."/> <meta property="og:image" content="https://assets.ibm.com/is/image/ibm/ibm-8bar-logo-2560x2560?$original$"/> <script src="https://1.www.s81c.com/common/stats/ibm-common.js" type="text/javascript" async="async"></script> <link rel="preload" href="https://hybrid-cloud-widgets-production.s3.us.cloud-object-storage.appdomain.cloud/loader.js" as="script"/> <script src="https://hybrid-cloud-widgets-production.s3.us.cloud-object-storage.appdomain.cloud/loader.js" type="application/javascript"></script> <link rel="stylesheet" href="/etc.clientlibs/adobe-cms/clientlibs/clientlib-base.lc-30313e00669f877069f15dd099f23454-lc.min.css" type="text/css"> <link rel="stylesheet" href="/etc.clientlibs/adobe-cms/clientlibs/clientlib-idlStylesCarbon.lc-cb338454784b041f689bc70d1113fcc5-lc.min.css" type="text/css"> <link rel="stylesheet" href="/etc.clientlibs/adobe-cms/clientlibs/clientlib-idlStyles.lc-f50a659a9c41c9bb537184e18175e0f3-lc.min.css" type="text/css"> <link rel="stylesheet" href="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/tag/v1/latest/plex.css"/> <link rel="stylesheet" href="https://1.www.s81c.com/common/carbon/plex/sans.css"/> </head> <body class="content-page page basicpage publish" id="content-page-55c8dc3abc" data-fullwidthtemplate="false"> <c4d-video-cta-container> <div class="root container responsivegrid"> <div id="container-25343bfcda" class="cmp-container"> <div class="masthead"> <c4d-masthead-container data-endpoint="#" auth-method="profile-api" has-contact="true" has-profile has-search has-cart></c4d-masthead-container> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-masthead-container.lc-b26f958162efaa6f8eab64f9ba97ad45-lc.min.js"></script> <script> let l0Json = "{\x22profileMenu\x22:{\x22signedout\x22:[{\x22title\x22:\x22My IBM\x22,\x22url\x22:\x22https:\/\/myibm.ibm.com\/?lnk=mmi\x22},{\x22title\x22:\x22Log in\x22,\x22url\x22:\x22https:\/\/login.ibm.com\/oidc\/endpoint\/default\/authorize?redirect_uri=https%3A%2F%2Fmyibm.ibm.com%2FOIDCHandler.html\x26response_type=token\x26client_id=v18LoginProdCI\x26scope=openid\x26state=https%3A%2F%2Fwww.ibm.com\x26nonce=8675309\x22}],\x22signedin\x22:[{\x22title\x22:\x22My IBM\x22,\x22url\x22:\x22https:\/\/myibm.ibm.com\/?lnk=mmi\x22},{\x22title\x22:\x22Log in\x22,\x22url\x22:\x22https:\/\/login.ibm.com\/oidc\/endpoint\/default\/authorize?redirect_uri=https%3A%2F%2Fmyibm.ibm.com%2FOIDCHandler.html\x26response_type=token\x26client_id=v18LoginProdCI\x26scope=openid\x26state=https%3A%2F%2Fwww.ibm.com\x26nonce=8675309\x22}]},\x22mastheadNav\x22:{\x22links\x22:[{\x22title\x22:\x22AI\x22,\x22url\x22:\x22\x22,\x22submenu\x22:{\x22sections\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22Overview\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/artificial\u002Dintelligence\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Consulting\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/consulting\/artificial\u002Dintelligence\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22watsonx\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/watsonx\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Research\x22,\x22url\x22:\x22https:\/\/research.ibm.com\/artificial\u002Dintelligence\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Assistants\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/ai\u002Dassistants\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Ethics and governance\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/impact\/ai\u002Dethics\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Granite models\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/granite\x22,\x22description\x22:\x22\x22},\x22links\x22:[]}]}],\x22viewAll\x22:{\x22title\x22:\x22\x22,\x22url\x22:\x22\x22}}},{\x22title\x22:\x22Hybrid Cloud\x22,\x22url\x22:\x22\x22,\x22submenu\x22:{\x22sections\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22Overview\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/hybrid\u002Dcloud\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Quantum computing\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/quantum\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Cloud platform\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/cloud\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Research\x22,\x22url\x22:\x22https:\/\/research.ibm.com\/hybrid\u002Dcloud\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Consulting\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/consulting\/cloud\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[]}]}],\x22viewAll\x22:{\x22title\x22:\x22\x22,\x22url\x22:\x22\x22}}},{\x22title\x22:\x22Products\x22,\x22url\x22:\x22\x22,\x22submenu\x22:{\x22sections\x22:[{\x22heading\x22:{\x22title\x22:\x22Featured\x22,\x22description\x22:\x22\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22API Connect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/api\u002Dconnect?lnk=flatitem\x22,\x22description\x22:\x22Software to rapidly create, protect, socialize and manage APIs\x22},{\x22title\x22:\x22Concert\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/concert?lnk=flatitem\x22,\x22description\x22:\x22Software to simplify and optimize application management\x22},{\x22title\x22:\x22Environmental Intelligence\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/environmental\u002Dintelligence?lnk=flatitem\x22,\x22description\x22:\x22SaaS for predicting and responding to weather and climate events\x22},{\x22title\x22:\x22Envizi\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/envizi?lnk=flatitem\x22,\x22description\x22:\x22ESG data management, reporting and analysis SaaS\x22},{\x22title\x22:\x22FlashSystem\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/flashsystem?lnk=flatitem\x22,\x22description\x22:\x22Primary storage for performance and latency sensitive workloads\x22},{\x22title\x22:\x22Hybrid Cloud Mesh\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/hybrid\u002Dcloud\u002Dmesh?lnk=flatitem\x22,\x22description\x22:\x22SaaS for deploying and managing hybrid and multicloud networks\x22},{\x22title\x22:\x22IBM Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/cloud?lnk=flatitem\x22,\x22description\x22:\x22On\u002Ddemand cloud computing platform and APIs\x22},{\x22title\x22:\x22IBM Z\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/z?lnk=flatitem\x22,\x22description\x22:\x22Flagship mainframe with on\u002Dchip AI and quantum\u002Dsafe cryptography\x22},{\x22title\x22:\x22Instana\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/instana?lnk=flatitem\x22,\x22description\x22:\x22Software for application performance monitoring and automation\x22},{\x22title\x22:\x22MaaS360\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/maas360?lnk=flatitem\x22,\x22description\x22:\x22Unified endpoint management software for many device types\x22},{\x22title\x22:\x22Maximo\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/maximo?lnk=flatitem\x22,\x22description\x22:\x22Software for asset management and related workflows\x22},{\x22title\x22:\x22Planning Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/planning\u002Danalytics?lnk=flatitem\x22,\x22description\x22:\x22Software to automate financial and operational planning\x22},{\x22title\x22:\x22Robotic Process Automation (RPA)\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/robotic\u002Dprocess\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22Software to automate workflows and business processes\x22},{\x22title\x22:\x22Storage Defender\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Ddefender?lnk=flatitem\x22,\x22description\x22:\x22Data resiliency software for threat detection and data recovery\x22},{\x22title\x22:\x22Turbonomic\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/turbonomic?lnk=flatitem\x22,\x22description\x22:\x22Software to manage and optimize IT resource usage\x22},{\x22title\x22:\x22watsonx\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/watsonx?lnk=flatitem\x22,\x22description\x22:\x22AI and data platform\x22},{\x22title\x22:\x22watsonx Assistant\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dassistant?lnk=flatitem\x22,\x22description\x22:\x22Virtual agents customizable to any domain\x22},{\x22title\x22:\x22watsonx Orchestrate\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dorchestrate?lnk=flatitem\x22,\x22description\x22:\x22Personal\u002Dassistant software that automates repetitive tasks\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22AI \x26 machine learning\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/artificial\u002Dintelligence?lnk=flathl\x22,\x22description\x22:\x22Use IBM Watson’s AI or build your own machine learning models\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloud Pak for AIOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Daiops?lnk=flatitem\x22,\x22description\x22:\x22DevOps management tool with AI analysis and recommendations\x22},{\x22title\x22:\x22Cloud Pak for Data\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Ddata?lnk=flatitem\x22,\x22description\x22:\x22Tools for data analysis, organization and management\x22},{\x22title\x22:\x22Knowledge Catalog\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/knowledge\u002Dcatalog?lnk=flatitem\x22,\x22description\x22:\x22SaaS to catalog data, AI models, metadata, policies and more\x22},{\x22title\x22:\x22Watson Discovery\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watson\u002Ddiscovery?lnk=flatitem\x22,\x22description\x22:\x22AI to search in and answer questions about business documents\x22},{\x22title\x22:\x22Watson Natural Language Understanding\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/natural\u002Dlanguage\u002Dunderstanding?lnk=flatitem\x22,\x22description\x22:\x22API for text analysis and metadata extraction\x22},{\x22title\x22:\x22Watson Speech to Text\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/speech\u002Dto\u002Dtext?lnk=flatitem\x22,\x22description\x22:\x22API for real\u002Dtime speech recognition and transcription\x22},{\x22title\x22:\x22Watson Studio\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watson\u002Dstudio?lnk=flatitem\x22,\x22description\x22:\x22IDE to build, run and manage AI models\x22},{\x22title\x22:\x22Watson Text to Speech\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/text\u002Dto\u002Dspeech?lnk=flatitem\x22,\x22description\x22:\x22API for real\u002Dtime text to speech conversion\x22},{\x22title\x22:\x22Z Anomaly Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/z\u002Danomaly\u002Danalytics?lnk=flatitem\x22,\x22description\x22:\x22Operational anomaly detection software for mainframes\x22},{\x22title\x22:\x22watsonx\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/watsonx?lnk=flatitem\x22,\x22description\x22:\x22AI and data platform\x22},{\x22title\x22:\x22watsonx Assistant\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dassistant?lnk=flatitem\x22,\x22description\x22:\x22Virtual agents customizable to any domain\x22},{\x22title\x22:\x22watsonx Code Assistant\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dcode\u002Dassistant?lnk=flatitem\x22,\x22description\x22:\x22AI tool to generate code\x22},{\x22title\x22:\x22watsonx Orders\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dorders?lnk=flatitem\x22,\x22description\x22:\x22AI voice agent for taking restaurant orders\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/analytics?lnk=flathl\x22,\x22description\x22:\x22Aggregate and analyze large datasets\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Business Analytics Enterprise\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/business\u002Danalytics\u002Denterprise?lnk=flatitem\x22,\x22description\x22:\x22Software for business planning and analysis\x22},{\x22title\x22:\x22CPLEX\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ilog\u002Dcplex\u002Doptimization\u002Dstudio?lnk=flatitem\x22,\x22description\x22:\x22Software to build and solve complex optimization models\x22},{\x22title\x22:\x22Cloud Pak for Data\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Ddata?lnk=flatitem\x22,\x22description\x22:\x22Tools for data analysis, organization and management\x22},{\x22title\x22:\x22Cognos Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cognos\u002Danalytics?lnk=flatitem\x22,\x22description\x22:\x22Software for business intelligence and performance management\x22},{\x22title\x22:\x22Databand\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databand?lnk=flatitem\x22,\x22description\x22:\x22Data observability software for data engineers and DataOps teams\x22},{\x22title\x22:\x22InfoSphere Information Server\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/information\u002Dserver?lnk=flatitem\x22,\x22description\x22:\x22Data integration suite for ETL, governance and analysis\x22},{\x22title\x22:\x22Manta Data Lineage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/manta\u002Ddata\u002Dlineage?lnk=flatitem\x22,\x22description\x22:\x22Software to visualize the flow of data from origin to consumption\x22},{\x22title\x22:\x22Netezza\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/netezza?lnk=flatitem\x22,\x22description\x22:\x22Data warehousing and analytics system on custom hardware\x22},{\x22title\x22:\x22Optim\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/infosphere\u002Doptim?lnk=flatitem\x22,\x22description\x22:\x22Software to manage test, production, and archived data\x22},{\x22title\x22:\x22Planning Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/planning\u002Danalytics?lnk=flatitem\x22,\x22description\x22:\x22Software to automate financial and operational planning\x22},{\x22title\x22:\x22SPSS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/spss?lnk=flatitem\x22,\x22description\x22:\x22Software for statistical analysis and business intelligence\x22},{\x22title\x22:\x22Spectrum Computing\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/high\u002Dperformance\u002Dcomputing?lnk=flatitem\x22,\x22description\x22:\x22Software to optimize resources in complex computing clusters\x22},{\x22title\x22:\x22StreamSets\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/streamsets?lnk=flatitem\x22,\x22description\x22:\x22Graphical interface to build and manage streaming data pipelines\x22},{\x22title\x22:\x22Watson Discovery\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watson\u002Ddiscovery?lnk=flatitem\x22,\x22description\x22:\x22AI to search in and answer questions about business documents\x22},{\x22title\x22:\x22Watson Studio\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watson\u002Dstudio?lnk=flatitem\x22,\x22description\x22:\x22IDE to build, run and manage AI models\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Asset lifecycle management\x22,\x22description\x22:\x22Manage and maintain physical assets\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Environmental Intelligence\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/environmental\u002Dintelligence?lnk=flatitem\x22,\x22description\x22:\x22SaaS for predicting and responding to weather and climate events\x22},{\x22title\x22:\x22Envizi\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/envizi?lnk=flatitem\x22,\x22description\x22:\x22ESG data management, reporting and analysis SaaS\x22},{\x22title\x22:\x22Maximo\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/maximo?lnk=flatitem\x22,\x22description\x22:\x22Software for asset management and related workflows\x22},{\x22title\x22:\x22TRIRIGA\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/tririga?lnk=flatitem\x22,\x22description\x22:\x22Software for real estate and workplace management\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Business automation\x22,\x22description\x22:\x22Automate workflows and business processes\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Blueworks Live\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/blueworkslive?lnk=flatitem\x22,\x22description\x22:\x22SaaS for collaboratively modeling business processes\x22},{\x22title\x22:\x22Business Automation Manager Open Editions\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/business\u002Dautomation\u002Dmanager\u002Dopen\u002Deditions?lnk=flatitem\x22,\x22description\x22:\x22Workflow automation and decision management software\x22},{\x22title\x22:\x22Business Automation Workflow\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/business\u002Dautomation\u002Dworkflow?lnk=flatitem\x22,\x22description\x22:\x22Cloud Pak for Business Automation add\u002Don to automate workflows\x22},{\x22title\x22:\x22Cloud Pak for Business Automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Dbusiness\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22Operations management software with AI insights\x22},{\x22title\x22:\x22Datacap\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/data\u002Dcapture\u002Dand\u002Dimaging?lnk=flatitem\x22,\x22description\x22:\x22Document management for IBM Cloud Pak for Business Automation\x22},{\x22title\x22:\x22Event Automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/event\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22No\u002Dcode tool for building automated event driven workflows\x22},{\x22title\x22:\x22FileNet Content Manager\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/filenet\u002Dcontent\u002Dmanager?lnk=flatitem\x22,\x22description\x22:\x22Content management solution for Cloud Pak for Business Automation\x22},{\x22title\x22:\x22Operational Decision Manager\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/operational\u002Ddecision\u002Dmanager?lnk=flatitem\x22,\x22description\x22:\x22Cloud Pak for Business Automation addon for rule\u002Dbased decisions\x22},{\x22title\x22:\x22Process Mining\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/process\u002Dmining?lnk=flatitem\x22,\x22description\x22:\x22Software to extract process data from business applications\x22},{\x22title\x22:\x22Robotic Process Automation (RPA)\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/robotic\u002Dprocess\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22Software to automate workflows and business processes\x22},{\x22title\x22:\x22watsonx Orchestrate\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dorchestrate?lnk=flatitem\x22,\x22description\x22:\x22Personal\u002Dassistant software that automates repetitive tasks\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Containers\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/containers?lnk=flathl\x22,\x22description\x22:\x22Allocate compute infrastructure on demand\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloud Satellite\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/satellite?lnk=flatitem\x22,\x22description\x22:\x22Platform for running managed cloud services on any infrastructure\x22},{\x22title\x22:\x22Code Engine\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/code\u002Dengine?lnk=flatitem\x22,\x22description\x22:\x22Managed serverless runtime for containers, batch jobs, or code\x22},{\x22title\x22:\x22Container Registry\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/container\u002Dregistry?lnk=flatitem\x22,\x22description\x22:\x22Private SaaS registry for container storage and management\x22},{\x22title\x22:\x22Kubernetes Service\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/kubernetes\u002Dservice?lnk=flatitem\x22,\x22description\x22:\x22Managed Kubernetes for high availability container deployments\x22},{\x22title\x22:\x22Red Hat OpenShift on IBM Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/openshift?lnk=flatitem\x22,\x22description\x22:\x22Managed service with tools for security, management and monitoring\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Databases\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/database?lnk=flathl\x22,\x22description\x22:\x22Store, query and analyze structured data\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloudant\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloudant?lnk=flatitem\x22,\x22description\x22:\x22Managed PCI\u002Dcompliant JSON document store on Apache CouchDB\x22},{\x22title\x22:\x22Db2\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/db2\u002Ddatabase?lnk=flatitem\x22,\x22description\x22:\x22Data management software including IBM Db2 Database\x22},{\x22title\x22:\x22Db2 for z\/OS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/db2\u002Dfor\u002Dzos?lnk=flatitem\x22,\x22description\x22:\x22IBM Db2 Database for IBM Z mainframes\x22},{\x22title\x22:\x22IBM Cloud Databases for Elastic Search\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Delasticsearch?lnk=flatitem\x22,\x22description\x22:\x22JSON document store for full\u002Dtext search\x22},{\x22title\x22:\x22IBM Cloud Databases for EnterpriseDB\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Denterprisedb?lnk=flatitem\x22,\x22description\x22:\x22PostgreSQL with added performance, security and management features\x22},{\x22title\x22:\x22IBM Cloud Databases for MongoDB\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Dmongodb?lnk=flatitem\x22,\x22description\x22:\x22Managed NoSQL JSON document store\x22},{\x22title\x22:\x22IBM Cloud Databases for MySQL\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Dmysql?lnk=flatitem\x22,\x22description\x22:\x22Managed SQL database\x22},{\x22title\x22:\x22IBM Cloud Databases for PostgreSQL\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Dpostgresql?lnk=flatitem\x22,\x22description\x22:\x22Managed SQL database with advanced features\x22},{\x22title\x22:\x22IBM Cloud Databases for etcd\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Detcd?lnk=flatitem\x22,\x22description\x22:\x22Distributed key\u002Dvalue store\x22},{\x22title\x22:\x22Information Management System (IMS)\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ims?lnk=flatitem\x22,\x22description\x22:\x22Database and management system for high\u002Dvolume transactions\x22},{\x22title\x22:\x22Informix\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/informix?lnk=flatitem\x22,\x22description\x22:\x22Embeddable database for SQL, NoSQL, time\u002Dseries and spatial data\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22DevOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/devops?lnk=flathl\x22,\x22description\x22:\x22Manage infrastructure, environments and deployments\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Application Delivery Foundation for z\/OS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Ddelivery\u002Dfoundation\u002Dfor\u002Dzos?lnk=flatitem\x22,\x22description\x22:\x22Application development and DevOps tools for z\/OS\x22},{\x22title\x22:\x22Application Discovery and Delivery Intelligence\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Ddiscovery\u002Dand\u002Ddelivery\u002Dintelligence?lnk=flatitem\x22,\x22description\x22:\x22Analysis tool for visualizing applications, data and jobs on z\/OS\x22},{\x22title\x22:\x22Cloud Continuous Delivery\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/continuous\u002Ddelivery?lnk=flatitem\x22,\x22description\x22:\x22Toolchains to automate building and deploying applications\x22},{\x22title\x22:\x22Cloud Pak for AIOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Daiops?lnk=flatitem\x22,\x22description\x22:\x22DevOps management tool with AI analysis and recommendations\x22},{\x22title\x22:\x22DevOps Build\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/devops\u002Dbuild?lnk=flatitem\x22,\x22description\x22:\x22Management tool for configuring and running software builds\x22},{\x22title\x22:\x22DevOps Code ClearCase\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/devops\u002Dcode\u002Dclearcase?lnk=flatitem\x22,\x22description\x22:\x22Configuration management system for software asset access control\x22},{\x22title\x22:\x22DevOps Deploy\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/devops\u002Ddeploy?lnk=flatitem\x22,\x22description\x22:\x22Automation software for continuous delivery and deployment\x22},{\x22title\x22:\x22DevOps Test\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/devops\u002Dtest?lnk=flatitem\x22,\x22description\x22:\x22Continuous testing and virtualization platform\x22},{\x22title\x22:\x22DevOps Velocity\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/devops\u002Dvelocity?lnk=flatitem\x22,\x22description\x22:\x22Release management software for pipeline orchestration and analytics\x22},{\x22title\x22:\x22Engineering Lifecycle Management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/engineering\u002Dlifecycle\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22Software for product and application lifecycle management\x22},{\x22title\x22:\x22IBM i Modernization Engine\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ibm\u002Di\u002Dmerlin?lnk=flatitem\x22,\x22description\x22:\x22Development and modernization tools for IBM i applications\x22},{\x22title\x22:\x22Rational ClearQuest\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/rational\u002Dclearquest?lnk=flatitem\x22,\x22description\x22:\x22Change management software\x22},{\x22title\x22:\x22Rational Software Architect Designer\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/rational\u002Dsoftware\u002Darchitect\u002Ddesigner?lnk=flatitem\x22,\x22description\x22:\x22Tools to create, evaluate, and communicate software architecture\x22},{\x22title\x22:\x22Test Accelerator for Z\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/test\u002Daccelerator\u002Dz?lnk=flatitem\x22,\x22description\x22:\x22Test automation and test generation framework for z\/OS\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22IT automation\x22,\x22description\x22:\x22Automate IT infrastructure management\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Apptio\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/apptio?lnk=flatitem\x22,\x22description\x22:\x22Hybrid cloud financial management and planning software\x22},{\x22title\x22:\x22Cloud App Configuration\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Dconfiguration?lnk=flatitem\x22,\x22description\x22:\x22Feature management and configuration service for web and mobile apps\x22},{\x22title\x22:\x22Cloud App ID\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Did?lnk=flatitem\x22,\x22description\x22:\x22Authentication and user management service for web and mobile apps\x22},{\x22title\x22:\x22Cloud Monitoring\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dmonitoring?lnk=flatitem\x22,\x22description\x22:\x22Hosted monitoring tool for organization\u002Dwide system performance\x22},{\x22title\x22:\x22Cloud Pak for AIOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Daiops?lnk=flatitem\x22,\x22description\x22:\x22DevOps management tool with AI analysis and recommendations\x22},{\x22title\x22:\x22Cloud Schematics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/schematics?lnk=flatitem\x22,\x22description\x22:\x22Management and provisionining of cloud infrastructure with code\x22},{\x22title\x22:\x22Concert\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/concert?lnk=flatitem\x22,\x22description\x22:\x22Software to simplify and optimize application management\x22},{\x22title\x22:\x22Event Notifications\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/event\u002Dnotifications?lnk=flatitem\x22,\x22description\x22:\x22Notification and workflow automation service for IBM Cloud events\x22},{\x22title\x22:\x22Flexera One\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/flexera\u002Done?lnk=flatitem\x22,\x22description\x22:\x22IT asset management software\x22},{\x22title\x22:\x22IBM Cloud Logs\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dlogs?lnk=flatitem\x22,\x22description\x22:\x22Logging and observability service for applications and infrastructure\x22},{\x22title\x22:\x22Instana\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/instana?lnk=flatitem\x22,\x22description\x22:\x22Software for application performance monitoring and automation\x22},{\x22title\x22:\x22Turbonomic\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/turbonomic?lnk=flatitem\x22,\x22description\x22:\x22Software to manage and optimize IT resource usage\x22},{\x22title\x22:\x22Z IntelliMagic Vision for z\/OS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/z\u002Dintellimagic\u002Dvision\u002Dfor\u002Dzos?lnk=flatitem\x22,\x22description\x22:\x22Infrastructure performance management and monitoring software\x22},{\x22title\x22:\x22Z Service Management Suite\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/z\u002Dservice\u002Dmanagement\u002Dsuite?lnk=flatitem\x22,\x22description\x22:\x22Monitoring, control, and automation suite for Z\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Middleware\x22,\x22description\x22:\x22Connect your applications, data and events\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22API Connect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/api\u002Dconnect?lnk=flatitem\x22,\x22description\x22:\x22Software to rapidly create, protect, socialize and manage APIs\x22},{\x22title\x22:\x22App Connect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Dconnect?lnk=flatitem\x22,\x22description\x22:\x22Codeless connectors for your data, apps and APIs\x22},{\x22title\x22:\x22Aspera\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/aspera?lnk=flatitem\x22,\x22description\x22:\x22System to transfer, sync or stream huge data globally\x22},{\x22title\x22:\x22CICS Transaction Server for z\/OS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cics\u002Dtransaction\u002Dserver?lnk=flatitem\x22,\x22description\x22:\x22Application server for online transaction processing\x22},{\x22title\x22:\x22Cloud Pak for Applications\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Dapplications?lnk=flatitem\x22,\x22description\x22:\x22Kubernetes\u002Dbased platform for hybrid cloud applications\x22},{\x22title\x22:\x22Cloud Pak for Integration\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Dintegration?lnk=flatitem\x22,\x22description\x22:\x22Tools to connect all of your apps, data and events\x22},{\x22title\x22:\x22DataPower\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/datapower\u002Dgateway?lnk=flatitem\x22,\x22description\x22:\x22Physical or virtual multi\u002Dprotocol network gateway\x22},{\x22title\x22:\x22Event Streams\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/event\u002Dstreams?lnk=flatitem\x22,\x22description\x22:\x22PaaS stream processing based on Apache Kafka\x22},{\x22title\x22:\x22IBM Cloud Messages for RabbitMQ\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/messages\u002Dfor\u002Drabbitmq?lnk=flatitem\x22,\x22description\x22:\x22Managed open\u002Dsource message broker\x22},{\x22title\x22:\x22IBM webMethods\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/webmethods?lnk=flatitem\x22,\x22description\x22:\x22iPaaS capabilities including app integration, API management, B2B integration and managed file transfer\x22},{\x22title\x22:\x22Information Management System\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ims?lnk=flatitem\x22,\x22description\x22:\x22Hierarchical database and transaction processor for Z\x22},{\x22title\x22:\x22MQ\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/mq?lnk=flatitem\x22,\x22description\x22:\x22Software and hardware for messaging between distributed systems\x22},{\x22title\x22:\x22z\/OS Connect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/zos\u002Dconnect?lnk=flatitem\x22,\x22description\x22:\x22Software to build and serve RESTful APIs to z\/OS applications\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Network\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/networking?lnk=flathl\x22,\x22description\x22:\x22Run and manage public, private and virtual networks\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloud Pak for Network Automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Dnetwork\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22Management software for telco network operations\x22},{\x22title\x22:\x22Hybrid Cloud Mesh\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/hybrid\u002Dcloud\u002Dmesh?lnk=flatitem\x22,\x22description\x22:\x22SaaS for deploying and managing hybrid and multicloud networks\x22},{\x22title\x22:\x22NS1 Connect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ns1\u002Dconnect?lnk=flatitem\x22,\x22description\x22:\x22Authoritative DNS and traffic steering as a service\x22},{\x22title\x22:\x22Rapid Network Automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/rapid\u002Dnetwork\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22No\u002Dcode tool to build automation workflows across apps and APIs\x22},{\x22title\x22:\x22SevOne Network Performance Management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/sevone\u002Dnetwork\u002Dperformance\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22Software to collect and analyze network performance data\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Operating systems\x22,\x22description\x22:\x22Run critical workloads on specialized operating systems\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22AIX\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/aix?lnk=flatitem\x22,\x22description\x22:\x22UNIX operating system for Power servers\x22},{\x22title\x22:\x22IBM i\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ibm\u002Di?lnk=flatitem\x22,\x22description\x22:\x22Integrated operating system for Power servers\x22},{\x22title\x22:\x22Linux\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/linux?lnk=flatitem\x22,\x22description\x22:\x22Run Linux workloads on IBM servers\x22},{\x22title\x22:\x22z\/OS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/zos?lnk=flatitem\x22,\x22description\x22:\x22Flagship OS for continuous, high\u002Dvolume mainframe operation\x22},{\x22title\x22:\x22z\/TPF\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/z\u002Dtransaction\u002Dprocessing\u002Dfacility?lnk=flatitem\x22,\x22description\x22:\x22Real\u002Dtime operating system for mainframes\x22},{\x22title\x22:\x22z\/VM\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/zvm?lnk=flatitem\x22,\x22description\x22:\x22Hypervisor and virtualization software for IBM Z and LinuxONE\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Quantum\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/quantum?lnk=flathl\x22,\x22description\x22:\x22Run code on real quantum systems using a full\u002Dstack SDK\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Qiskit Runtime\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/quantum\/qiskit?lnk=flatitem\x22,\x22description\x22:\x22Cloud service for executing quantum workloads at scale\x22},{\x22title\x22:\x22Quantum Safe\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/quantum\/quantum\u002Dsafe?lnk=flatitem\x22,\x22description\x22:\x22Technology and consulting services for quantum\u002Dsafe cryptography\x22},{\x22title\x22:\x22Quantum Systems\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/quantum\/technology?lnk=flatitem\x22,\x22description\x22:\x22Quantum computing systems accessible on the cloud\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Security \x26 identity\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/security?lnk=flathl\x22,\x22description\x22:\x22Cloud\u002Dnative software to secure resources and simplify compliance\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloud AppID\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Did?lnk=flatitem\x22,\x22description\x22:\x22Authentication and user profiles as a service for mobile and web apps\x22},{\x22title\x22:\x22Cloud Security and Compliance Center\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/security\u002Dand\u002Dcompliance\u002Dcenter?lnk=flatitem\x22,\x22description\x22:\x22SaaS to define and audit the compliance posture of your cloud\x22},{\x22title\x22:\x22Data Security Broker\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/data\u002Dsecurity\u002Dbroker?lnk=flatitem\x22,\x22description\x22:\x22Administrative console to enable data encryption in the cloud\x22},{\x22title\x22:\x22Guardium\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/guardium?lnk=flatitem\x22,\x22description\x22:\x22Suite for data encryption, management and simplified compliance\x22},{\x22title\x22:\x22Key Protect for IBM Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/key\u002Dprotect?lnk=flatitem\x22,\x22description\x22:\x22Tool to provision and store keys for apps across IBM Cloud services\x22},{\x22title\x22:\x22MaaS360\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/maas360?lnk=flatitem\x22,\x22description\x22:\x22Unified endpoint management for mobile workforces\x22},{\x22title\x22:\x22QRadar EDR\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/qradar\u002Dedr?lnk=flatitem\x22,\x22description\x22:\x22Advanced AI threat detection and response for endpoints\x22},{\x22title\x22:\x22QRadar SIEM\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/qradar\u002Dsiem?lnk=flatitem\x22,\x22description\x22:\x22Threat detection and prioritization for real\u002Dtime visibility\x22},{\x22title\x22:\x22QRadar SOAR\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/qradar\u002Dsoar?lnk=flatitem\x22,\x22description\x22:\x22Automation and workflow management for security operations\x22},{\x22title\x22:\x22Trusteer\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/trusteer?lnk=flatitem\x22,\x22description\x22:\x22Software to authenticate customers, detect fraud and assess risk\x22},{\x22title\x22:\x22Verify\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/verify?lnk=flatitem\x22,\x22description\x22:\x22Identity, authentication, and access control software\x22},{\x22title\x22:\x22zSecure\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/zsecure?lnk=flatitem\x22,\x22description\x22:\x22Security, risk management and compliance tools for Z hardware\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Servers\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/servers?lnk=flathl\x22,\x22description\x22:\x22Run workloads on hybrid cloud infrastructure\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22IBM Cloud Bare Metal Servers\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/bare\u002Dmetal\u002Dservers?lnk=flatitem\x22,\x22description\x22:\x22Dedicated hardware for maximum performance\x22},{\x22title\x22:\x22IBM Cloud Virtual Servers for VPC\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/virtual\u002Dservers?lnk=flatitem\x22,\x22description\x22:\x22Virtual servers with Intel Xeon or IBM Z CPUs\x22},{\x22title\x22:\x22LinuxONE 4\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/linuxone\u002D4?lnk=flatitem\x22,\x22description\x22:\x22Physical and virtual servers for running Linux\x22},{\x22title\x22:\x22Power\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/power?lnk=flatitem\x22,\x22description\x22:\x22Physical and virtual servers with IBM Power CPUs\x22},{\x22title\x22:\x22z16\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/z16?lnk=flatitem\x22,\x22description\x22:\x22Flagship mainframe with on\u002Dchip AI and quantum\u002Dsafe cryptography\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/storage?lnk=flathl\x22,\x22description\x22:\x22Software, hardware and services for critical and operational workloads and data\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Ceph\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dceph?lnk=flatitem\x22,\x22description\x22:\x22Multi\u002Dprotocol software\u002Ddefined enterprise storage platform\x22},{\x22title\x22:\x22Cloud Block Storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/block\u002Dstorage?lnk=flatitem\x22,\x22description\x22:\x22Managed service optimized for low latency and high transfer rates\x22},{\x22title\x22:\x22Cloud File Storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/file\u002Dstorage?lnk=flatitem\x22,\x22description\x22:\x22Managed service for flash\u002Dbacked, durable, NFS\u002Dbased file storage\x22},{\x22title\x22:\x22Cloud Object Storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dobject\u002Dstorage?lnk=flatitem\x22,\x22description\x22:\x22Unstructured data storage accessible via cloud APIs\x22},{\x22title\x22:\x22DS8000\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ds8000?lnk=flatitem\x22,\x22description\x22:\x22High\u002Dcapacity, high\u002Davailability mainframe storage system\x22},{\x22title\x22:\x22Defender\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Ddefender?lnk=flatitem\x22,\x22description\x22:\x22Data resiliency software for threat detection and data recovery\x22},{\x22title\x22:\x22FlashSystem\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/flashsystem?lnk=flatitem\x22,\x22description\x22:\x22All\u002Dflash array with performance and capacity for any workload\x22},{\x22title\x22:\x22Fusion\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dfusion?lnk=flatitem\x22,\x22description\x22:\x22Container\u002Dnative storage and data orchestration for OpenShift\x22},{\x22title\x22:\x22Insights\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dinsights?lnk=flatitem\x22,\x22description\x22:\x22Storage AIOps for metrics\u002Dpowered analysis and decisions\x22},{\x22title\x22:\x22Protect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dprotect?lnk=flatitem\x22,\x22description\x22:\x22Data resiliency, backup and recovery delivered via SaaS\x22},{\x22title\x22:\x22Protect for Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dprotect\u002Dfor\u002Dcloud?lnk=flatitem\x22,\x22description\x22:\x22Backup and recovery SaaS for data in public cloud services\x22},{\x22title\x22:\x22SAN Switches\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/storage\u002Darea\u002Dnetwork?lnk=flatitem\x22,\x22description\x22:\x22Scalable and highly available storage area network solutions\x22},{\x22title\x22:\x22Scale\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dscale?lnk=flatitem\x22,\x22description\x22:\x22Software defined storage for AI and high performance workloads\x22},{\x22title\x22:\x22Scale System\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dscale\u002Dsystem?lnk=flatitem\x22,\x22description\x22:\x22All\u002Dflash or hybrid performant storage for cloud scale use\u002Dcases\x22},{\x22title\x22:\x22Tape Systems\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/tape\u002Dstorage?lnk=flatitem\x22,\x22description\x22:\x22Software and hardware for encrypted and air\u002Dgapped archives\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Supply chain\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/supply\u002Dchain?lnk=flathl\x22,\x22description\x22:\x22Manage the flow of goods and services\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22 IBM Envizi: Supply Chain Intelligence\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/envizi\/supply\u002Dchain\x22,\x22description\x22:\x22Capture and aggregate supplier and product\u002Dlevel transaction data for Scope 3 emissions and reporting\x22},{\x22title\x22:\x22Sterling Order and Fulfillment Suite\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/order\u002Dfulfillment\u002Dsuite?lnk=flatitem\x22,\x22description\x22:\x22Complete order management system with AI and machine learning\x22}]}]}],\x22viewAll\x22:{\x22title\x22:\x22View all products\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\x22}}},{\x22title\x22:\x22Consulting\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/consulting?lnk=L0G\x22},{\x22title\x22:\x22Support\x22,\x22url\x22:\x22\x22,\x22submenu\x22:{\x22sections\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22What\x27s New\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/new?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Community\x22,\x22url\x22:\x22https:\/\/community.ibm.com\/community\/user\/community?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Developer\x22,\x22url\x22:\x22https:\/\/developer.ibm.com\/?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Call for Code\x22,\x22url\x22:\x22https:\/\/developer.ibm.com\/callforcode\/?lnk=flatitem\x22},{\x22title\x22:\x22Generative AI\x22,\x22url\x22:\x22https:\/\/developer.ibm.com\/generative\u002Dai\u002Dfor\u002Ddevelopers\/?lnk=flatitem\x22},{\x22title\x22:\x22Open Source @ IBM\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/opensource\/?lnk=flatitem\x22},{\x22title\x22:\x22Products\x22,\x22url\x22:\x22https:\/\/developer.ibm.com\/components\/?lnk=flatitem\x22},{\x22title\x22:\x22Technologies\x22,\x22url\x22:\x22https:\/\/developer.ibm.com\/technologies\/?lnk=flatitem\x22}]},{\x22heading\x22:{\x22title\x22:\x22Documentation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/docs\/en?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22All product documentation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/docs\/en?lnk=flatitem\x22},{\x22title\x22:\x22IBM Cloud documentation\x22,\x22url\x22:\x22https:\/\/cloud.ibm.com\/docs?lnk=flatitem\x22},{\x22title\x22:\x22IBM Redbooks\x22,\x22url\x22:\x22https:\/\/www.redbooks.ibm.com\/?lnk=flatitem\x22}]},{\x22heading\x22:{\x22title\x22:\x22IBM Cloud platform support\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/cloud\/support?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Implementation\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Expert Labs\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/expertlabs?lnk=flatitem\x22}]},{\x22heading\x22:{\x22title\x22:\x22Support\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/mysupport\/s\/?language=en_US\x26lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Download fixes, updates \x26 drivers\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/support\/fixcentral?lnk=flatitem\x22},{\x22title\x22:\x22Download licensed software \u002D Passport Advantage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/software\/passportadvantage\/pao_customer.html?lnk=flatitem\x22},{\x22title\x22:\x22IBM Software Licensing\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/about\/software\u002Dlicensing\/?lnk=flatitem\x22},{\x22title\x22:\x22Open a case\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/mysupport\/s\/redirecttoopencasepage?lnk=flatitem\x22},{\x22title\x22:\x22View more\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/mysupport\/s\/?language=en_US\x26lnk=flatitem\x22},{\x22title\x22:\x22View support plans\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/support\/pages\/ibm\u002Dsupport\u002Dofferings?lnk=flatitem\x22},{\x22title\x22:\x22View your cases\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/mysupport\/s\/my\u002Dcases?lnk=flatitem\x22}]},{\x22heading\x22:{\x22title\x22:\x22Technology Lifecycle Services\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/services\/technology\u002Dlifecycle\u002Dservices?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Enterprise networking and security\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/services\/networking\u002Dsupport?lnk=flatitem\x22},{\x22title\x22:\x22Servers and storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/services\/systems\u002Dsupport?lnk=flatitem\x22},{\x22title\x22:\x22Software\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/services\/software\u002Dsupport?lnk=flatitem\x22}]},{\x22heading\x22:{\x22title\x22:\x22Training\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/training\/?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Courses\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/training\/search?q=course\x26lnk=flatitem\x22},{\x22title\x22:\x22Digital learning subscriptions\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/training\/subscriptions?lnk=flatitem\x22},{\x22title\x22:\x22Learning paths \x26 collections\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/training\/learning\u002Dpaths\u002Dand\u002Dcollections?lnk=flatitem\x22},{\x22title\x22:\x22Professional certifications\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/training\/credentials?lnk=flatitem\x22}]}]}],\x22viewAll\x22:{\x22title\x22:\x22\x22,\x22url\x22:\x22\x22}}},{\x22title\x22:\x22Think\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think?lnk=L0G\x22}]}}"; const searchPlaceholderText = "Search all of IBM"; const links = JSON.parse(l0Json).mastheadNav.links; const unAuthenticated = JSON.parse(l0Json).profileMenu.signedout; const authenticated = JSON.parse(l0Json).profileMenu.signedin; const mastheadContainerEl = document.querySelector('c4d-masthead-container'); mastheadContainerEl.navLinks = links; mastheadContainerEl.unauthenticatedProfileItems = unAuthenticated; mastheadContainerEl.authenticatedProfileItems = authenticated; const appendSearchPlaceholderText = () => { const typeheadEl = mastheadContainerEl.querySelector('c4d-search-with-typeahead'); if (typeheadEl) { typeheadEl.searchPlaceholder = searchPlaceholderText; observer.disconnect(); } } let observer = new MutationObserver(appendSearchPlaceholderText); observer.observe(mastheadContainerEl, {subtree: true, childList: true}); </script> <script> var json = "{\x22title\x22:\x22Think\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\x22,\x22menuItems\x22:[{\x22title\x22:\x22Artificial intelligence\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/artificial\u002Dintelligence\x22},{\x22title\x22:\x22Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/cloud\x22},{\x22title\x22:\x22Security\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/security\x22},{\x22title\x22:\x22Videos\x22,\x22submenu\x22:{\x22columns\x22:1,\x22menuSections\x22:[{\x22span\x22:1,\x22items\x22:[{\x22title\x22:\x22Overview\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/videos\x22},{\x22title\x22:\x22AI Academy\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/videos\/ai\u002Dacademy\x22},{\x22title\x22:\x22Rethink use cases\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/videos\/rethink\x22},{\x22title\x22:\x22Think 2024 on demand\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/videos\/think\u002Dkeynotes\x22}]}]}},{\x22title\x22:\x22Reports\x22,\x22submenu\x22:{\x22columns\x22:1,\x22menuSections\x22:[{\x22span\x22:1,\x22items\x22:[{\x22title\x22:\x22AI in Action 2024\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/reports\/ai\u002Din\u002Daction\x22},{\x22title\x22:\x22State of Sustainability Readiness Report 2024\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/reports\/sustainability\u002Dreadiness\x22},{\x22title\x22:\x22Cost of a Data Breach 2024\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/reports\/data\u002Dbreach\x22},{\x22title\x22:\x22IBM X\u002DForce Threat Intelligence Index 2024\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/reports\/threat\u002Dintelligence\x22},{\x22title\x22:\x22CEO’s Guide to Generative AI\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/thought\u002Dleadership\/institute\u002Dbusiness\u002Dvalue\/en\u002Dus\/report\/ceo\u002Dgenerative\u002Dai\x22},{\x22title\x22:\x22Hybrid by Design: The great tech reset\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/thought\u002Dleadership\/institute\u002Dbusiness\u002Dvalue\/en\u002Dus\/report\/hybrid\u002Dby\u002Ddesign\x22},{\x22title\x22:\x222024 CEO Study\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/thought\u002Dleadership\/institute\u002Dbusiness\u002Dvalue\/en\u002Dus\/c\u002Dsuite\u002Dstudy\/ceo\x22},{\x22title\x22:\x22View all IBV reports\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/thought\u002Dleadership\/institute\u002Dbusiness\u002Dvalue\x22}]}]}},{\x22title\x22:\x22Podcasts\x22,\x22submenu\x22:{\x22columns\x22:1,\x22menuSections\x22:[{\x22span\x22:1,\x22items\x22:[{\x22title\x22:\x22Overview\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/podcasts\x22},{\x22title\x22:\x22Mixture of Experts\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/podcasts\/mixture\u002Dof\u002Dexperts\x22},{\x22title\x22:\x22Transformers Podcast\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/podcasts\/transformers\u002Dpodcast\x22},{\x22title\x22:\x22AI in Action\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/podcasts\/ai\u002Din\u002Daction\x22},{\x22title\x22:\x22Smart Talks with IBM\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/podcasts\/smart\u002Dtalks\x22}]}]}},{\x22title\x22:\x22Events\x22,\x22submenu\x22:{\x22columns\x22:1,\x22menuSections\x22:[{\x22span\x22:1,\x22items\x22:[{\x22title\x22:\x22Think 2025\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/events\/think\x22},{\x22title\x22:\x22Think on Tour\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/events\/think\/on\u002Dtour\x22},{\x22title\x22:\x22TechXchange\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/community\/ibm\u002Dtechxchange\u002Dconference\/\x22}]}]}},{\x22title\x22:\x22More\x22,\x22submenu\x22:{\x22columns\x22:2,\x22footer\x22:{\x22title\x22:\x22View all\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/search\x22},\x22menuSections\x22:[{\x22span\x22:1,\x22heading\x22:{\x22headingLevel\x22:2,\x22title\x22:\x22Topics\x22},\x22items\x22:[{\x22title\x22:\x22Analytics\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/analytics\x22},{\x22title\x22:\x22Asset management\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/asset\u002Dmanagement\x22},{\x22title\x22:\x22Business automation\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/business\u002Dautomation\x22},{\x22title\x22:\x22Business operations\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/business\u002Doperations\x22},{\x22title\x22:\x22Compute and servers\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/compute\x22},{\x22title\x22:\x22DevOps\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/devops\x22},{\x22title\x22:\x22IT automation\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/it\u002Dautomation\x22},{\x22title\x22:\x22IT infrastructure\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/it\u002Dinfrastructure\x22},{\x22title\x22:\x22Middleware\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/middleware\x22},{\x22title\x22:\x22Network\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/network\x22},{\x22title\x22:\x22Quantum\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/quantum\x22},{\x22title\x22:\x22Storage\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/storage\x22},{\x22title\x22:\x22Sustainability\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/sustainability\x22}]},{\x22span\x22:1,\x22heading\x22:{\x22headingLevel\x22:2,\x22title\x22:\x22Content types\x22},\x22items\x22:[{\x22title\x22:\x22Explainers\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/topics\x22},{\x22title\x22:\x22Insights\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/insights\x22},{\x22title\x22:\x22News\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/news\x22},{\x22title\x22:\x22Newsletters\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/subscribe\x22},{\x22title\x22:\x22Reference architectures\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/architectures\x22}]},{\x22span\x22:1,\x22heading\x22:{\x22headingLevel\x22:2,\x22title\x22:\x22Industries\x22},\x22items\x22:[{\x22title\x22:\x22Automotive\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/automotive\x22},{\x22title\x22:\x22Banking\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/banking\u002Dfinancial\u002Dmarkets\x22},{\x22title\x22:\x22Consumer Goods\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/consumer\u002Dgoods\x22},{\x22title\x22:\x22Energy \x26 Utilities\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/energy\x22},{\x22title\x22:\x22Government\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/government\x22},{\x22title\x22:\x22Healthcare\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/healthcare\x22},{\x22title\x22:\x22Manufacturing\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/manufacturing\x22},{\x22title\x22:\x22Retail\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/retail\x22},{\x22title\x22:\x22Telecommunications\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/telecommunications\x22},{\x22title\x22:\x22Travel\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/travel\u002Dtransportation\x22}]}]}}],\x22actions\x22:{\x22login\x22:null,\x22cta\x22:{\x22title\x22:\x22Subscribe\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/account\/reg\/signup?formid=news\u002Durx\u002D52954\x22}},\x22linkOrContactModule\x22:false,\x22optinalCta\x22:true}"; document.querySelector('c4d-masthead-container').l1Data = JSON.parse(json); document.querySelector('.masthead').classList.add("hasNavigation"); document.documentElement.style.setProperty('--anker-navigation-spacing', '-6rem'); document.addEventListener('DOMContentLoaded', () => { document.querySelector('c4d-masthead-l1').overviewText = 'Overview'; }); </script> <script type="text/javascript"> if(window.location.href.includes("/careers")){ document.querySelector('c4d-masthead-container').setAttribute("has-search","false"); document.querySelector('c4d-masthead-container').setAttribute("has-profile","false"); } </script> </div> <div class="leadspace-container container responsivegrid" id="mbox-leadspace"> <div id="leadspace-container-e1cb6b2aa8" class="cmp-container"> <div class="leadspace-article"> <div class="cds--leadspace-article"> <section class="cds--leadspace-article__section"> <div class="cds--leadspace-article__container--left"> <div class="cds--leadspace-article__row"> <div class="cds--leadspace-article__title"> <h1 class="article-heading-title expressive-heading-05"> What is information security (InfoSec)? </h1> </div> </div> <div class="cds--leadspace-article__row"> <div class="image--responsive"> <c4d-image id="image--261243490" alt="Men text messaging with smart phone, working from home" slot="media" default-src="/content/dam/connectedassets-adobe-cms/worldwide-content/stock-assets/getty/image/photography/33/5b/vojin_00132.component.crop-2by1-xl.ts=1735590233101.jpg/content/adobe-cms/us/en/think/topics/information-security/jcr:content/root/leadspace_container/leadspace_article" class="" caption-alignment="left"> <c4d-image-item media="(min-width: 1312px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/stock-assets/getty/image/photography/33/5b/vojin_00132.component.crop-2by1-xl-retina.ts=1735590233101.jpg/content/adobe-cms/us/en/think/topics/information-security/jcr:content/root/leadspace_container/leadspace_article"></c4d-image-item> <c4d-image-item media="(min-width: 1312px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/stock-assets/getty/image/photography/33/5b/vojin_00132.component.crop-2by1-xl.ts=1735590233101.jpg/content/adobe-cms/us/en/think/topics/information-security/jcr:content/root/leadspace_container/leadspace_article"></c4d-image-item> <c4d-image-item media="(min-width: 1056px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/stock-assets/getty/image/photography/33/5b/vojin_00132.component.crop-2by1-l-retina.ts=1735590233101.jpg/content/adobe-cms/us/en/think/topics/information-security/jcr:content/root/leadspace_container/leadspace_article"></c4d-image-item> <c4d-image-item media="(min-width: 1056px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/stock-assets/getty/image/photography/33/5b/vojin_00132.component.crop-2by1-l.ts=1735590233101.jpg/content/adobe-cms/us/en/think/topics/information-security/jcr:content/root/leadspace_container/leadspace_article"></c4d-image-item> <c4d-image-item media="(min-width: 672px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/stock-assets/getty/image/photography/33/5b/vojin_00132.component.crop-2by1-m-retina.ts=1735590233101.jpg/content/adobe-cms/us/en/think/topics/information-security/jcr:content/root/leadspace_container/leadspace_article"></c4d-image-item> <c4d-image-item media="(min-width: 672px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/stock-assets/getty/image/photography/33/5b/vojin_00132.component.crop-2by1-m.ts=1735590233101.jpg/content/adobe-cms/us/en/think/topics/information-security/jcr:content/root/leadspace_container/leadspace_article"></c4d-image-item> <c4d-image-item media="(min-width: 481px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/stock-assets/getty/image/photography/33/5b/vojin_00132.component.crop-2by1-s-retina.ts=1735590233101.jpg/content/adobe-cms/us/en/think/topics/information-security/jcr:content/root/leadspace_container/leadspace_article"></c4d-image-item> <c4d-image-item media="(min-width: 481px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/stock-assets/getty/image/photography/33/5b/vojin_00132.component.crop-2by1-s.ts=1735590233101.jpg/content/adobe-cms/us/en/think/topics/information-security/jcr:content/root/leadspace_container/leadspace_article"></c4d-image-item> <c4d-image-item media="(max-width: 480px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/stock-assets/getty/image/photography/33/5b/vojin_00132.component.crop-2by1-xs-retina.ts=1735590233101.jpg/content/adobe-cms/us/en/think/topics/information-security/jcr:content/root/leadspace_container/leadspace_article"></c4d-image-item> <c4d-image-item media="(max-width: 480px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/stock-assets/getty/image/photography/33/5b/vojin_00132.component.crop-2by1-xs.ts=1735590233101.jpg/content/adobe-cms/us/en/think/topics/information-security/jcr:content/root/leadspace_container/leadspace_article"></c4d-image-item> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-image.lc-048b87a201e74013bc54445146fdadd0-lc.min.js"></script> </c4d-image> </div> </div> </div> <div class="cds--leadspace-article__container--right"> <div class="cds--leadspace-article__row cds--leadspace-article__row--border"> <div class="cds--leadspace-article__tags"> <div class="tag-group"> <a href="https://www.ibm.com/think/security"> <cds-tag> Security </cds-tag> </a> </div> </div> </div> <div class="cds--leadspace-article__row cds--leadspace-article__row--border"> <h4 class="article-heading productive-heading-02"> 26 July 2024 </h4> </div> <div class="cds--leadspace-article__row--border cds--leadspace-article__row--share"> <div class="cds-btn--share-module"> <div class="cds-btn--share-module__container"> <div class="cds-btn--share-module__copy-button"> <cds-button href="https://www.ibm.com/think/topics/information-security" kind="secondary"> <svg xmlns="http://www.w3.org/2000/svg" slot="icon" width="16" height="16" fill="currentColor" viewBox="0 0 32 32" aria-hidden="true"> <path d="M29.25,6.76a6,6,0,0,0-8.5,0l1.42,1.42a4,4,0,1,1,5.67,5.67l-8,8a4,4,0,1,1-5.67-5.66l1.41-1.42-1.41-1.42-1.42,1.42a6,6,0,0,0,0,8.5A6,6,0,0,0,17,25a6,6,0,0,0,4.27-1.76l8-8A6,6,0,0,0,29.25,6.76Z"/> <path d="M4.19,24.82a4,4,0,0,1,0-5.67l8-8a4,4,0,0,1,5.67,0A3.94,3.94,0,0,1,19,14a4,4,0,0,1-1.17,2.85L15.71,19l1.42,1.42,2.12-2.12a6,6,0,0,0-8.51-8.51l-8,8a6,6,0,0,0,0,8.51A6,6,0,0,0,7,28a6.07,6.07,0,0,0,4.28-1.76L9.86,24.82A4,4,0,0,1,4.19,24.82Z"/> </svg> </cds-button> <div class="cds-btn--share-module__tooltip hide"> Link copied </div> </div> <cds-button target="_blank" href="mailto:?subject=Information%20Security&body=https://www.ibm.com/think/topics/information-security" kind="secondary"> <svg xmlns="http://www.w3.org/2000/svg" slot="icon" width="16" height="16" fill="currentColor" viewBox="0 0 32 32" aria-hidden="true"> <path d="M28,6H4A2,2,0,0,0,2,8V24a2,2,0,0,0,2,2H28a2,2,0,0,0,2-2V8A2,2,0,0,0,28,6ZM25.8,8,16,14.78,6.2,8ZM4,24V8.91l11.43,7.91a1,1,0,0,0,1.14,0L28,8.91V24Z"/> </svg> </cds-button> <cds-button target="_blank" href="https://www.linkedin.com/shareArticle?url=https://www.ibm.com/think/topics/information-security&title=Information%20Security" kind="secondary"> <svg xmlns="http://www.w3.org/2000/svg" slot="icon" width="16" height="16" fill="currentColor" viewBox="0 0 32 32" aria-hidden="true"> <path d="M26.2,4H5.8C4.8,4,4,4.8,4,5.7v20.5c0,0.9,0.8,1.7,1.8,1.7h20.4c1,0,1.8-0.8,1.8-1.7V5.7C28,4.8,27.2,4,26.2,4z M11.1,24.4 H7.6V13h3.5V24.4z M9.4,11.4c-1.1,0-2.1-0.9-2.1-2.1c0-1.2,0.9-2.1,2.1-2.1c1.1,0,2.1,0.9,2.1,2.1S10.5,11.4,9.4,11.4z M24.5,24.3 H21v-5.6c0-1.3,0-3.1-1.9-3.1c-1.9,0-2.1,1.5-2.1,2.9v5.7h-3.5V13h3.3v1.5h0.1c0.5-0.9,1.7-1.9,3.4-1.9c3.6,0,4.3,2.4,4.3,5.5V24.3z"/> </svg> </cds-button> <cds-button target="_blank" href="https://www.facebook.com/share.php?u=https://www.ibm.com/think/topics/information-security" kind="secondary"> <svg xmlns="http://www.w3.org/2000/svg" slot="icon" width="16" height="16" fill="currentColor" viewBox="0 0 32 32" aria-hidden="true"> <path d="M26.67,4H5.33A1.34,1.34,0,0,0,4,5.33V26.67A1.34,1.34,0,0,0,5.33,28H16.82V18.72H13.7V15.09h3.12V12.42c0-3.1,1.89-4.79,4.67-4.79.93,0,1.86,0,2.79.14V11H22.37c-1.51,0-1.8.72-1.8,1.77v2.31h3.6l-.47,3.63H20.57V28h6.1A1.34,1.34,0,0,0,28,26.67V5.33A1.34,1.34,0,0,0,26.67,4Z" transform="translate(0 0)"/> </svg> </cds-button> <cds-button target="_blank" href="http://twitter.com/intent/tweet?text=Information%20Security&url=https://www.ibm.com/think/topics/information-security" kind="secondary"> <svg xmlns="http://www.w3.org/2000/svg" slot="icon" width="16" height="16" fill="currentColor" viewBox="0 0 32 32" aria-hidden="true"> <path d="m18.2342,14.1624l8.7424-10.1624h-2.0717l-7.591,8.8238-6.0629-8.8238h-6.9929l9.1684,13.3432-9.1684,10.6568h2.0718l8.0163-9.3183,6.4029,9.3183h6.9929l-9.5083-13.8376h.0005Zm-2.8376,3.2984l-.9289-1.3287L7.0763,5.5596h3.1822l5.9649,8.5323.9289,1.3287,7.7536,11.0907h-3.1822l-6.3272-9.05v-.0005Z"/> </svg> </cds-button> </div> </div> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-cweb-button.lc-7b18ea41f204cdf4af92bdf038d07d4e-lc.min.js"></script> </div> </div> </section> </div> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-leadspace.lc-2d50e2fcd68a57f32e42baf02c067083-lc.min.js"></script> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-cweb-tag.lc-110787fad411e9bb4388c3f3211925b3-lc.min.js"></script> </div> </div> </div> <div class="table-of-contents container responsivegrid"> <c4d-table-of-contents data-cmp-is="table-of-contents" data-autoid="c4d--tableofcontents" class="cmp-table-of-contents" stickyoffset="96"> <div id="table-of-contents-bddcff21bf" class="cmp-table-of-contents table-of-contents-article cds-row"> <div class="body-article-8 container responsivegrid cds--col"> <div id="body-article-8-ebe1776995" class="cmp-container"> <div class="author-signature"> <div class="cmp-author-signature "> <h2 class="productive-heading-02 author-signature__title"> Authors </h2> <div class="cds--author-signature"> <div class="cds--author-signature__author"> <div class="cds--author-signature__author--image"> <div class="cds--author-signature__author--image--default"> <svg id="icon" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32"> <path d="M16,8a5,5,0,1,0,5,5A5,5,0,0,0,16,8Zm0,8a3,3,0,1,1,3-3A3.0034,3.0034,0,0,1,16,16Z"/> <path d="M16,2A14,14,0,1,0,30,16,14.0158,14.0158,0,0,0,16,2ZM10,26.3765V25a3.0033,3.0033,0,0,1,3-3h6a3.0033,3.0033,0,0,1,3,3v1.3765a11.8989,11.8989,0,0,1-12,0Zm13.9925-1.4507A5.0016,5.0016,0,0,0,19,20H13a5.0016,5.0016,0,0,0-4.9925,4.9258,12,12,0,1,1,15.985,0Z"/> </svg> </div> </div> <div class="cds--author-signature__author--details"> <a href="https://www.ibm.com/think/author/jim-holdsworth"> <h4 class="productive-heading-02">Jim Holdsworth</h4> </a> <p class="auth-signature-paragraph body-short-02">Writer</p> </div> </div> <div class="cds--author-signature__author"> <div class="cds--author-signature__author--image"> <div class="cds--author-signature__author--image--default"> <svg id="icon" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32"> <path d="M16,8a5,5,0,1,0,5,5A5,5,0,0,0,16,8Zm0,8a3,3,0,1,1,3-3A3.0034,3.0034,0,0,1,16,16Z"/> <path d="M16,2A14,14,0,1,0,30,16,14.0158,14.0158,0,0,0,16,2ZM10,26.3765V25a3.0033,3.0033,0,0,1,3-3h6a3.0033,3.0033,0,0,1,3,3v1.3765a11.8989,11.8989,0,0,1-12,0Zm13.9925-1.4507A5.0016,5.0016,0,0,0,19,20H13a5.0016,5.0016,0,0,0-4.9925,4.9258,12,12,0,1,1,15.985,0Z"/> </svg> </div> </div> <div class="cds--author-signature__author--details"> <a href="https://www.ibm.com/think/author/matthew-kosinski"> <h4 class="productive-heading-02">Matthew Kosinski</h4> </a> <p class="auth-signature-paragraph body-short-02">Enterprise Technology Writer</p> </div> </div> </div> </div> </div> <div class="standalone-title enhanced-title text"> <h2 class="expressive-heading-05 "> What is information security? </h2> <a data-title="What is information security?" name="What+is+information+security%3F"></a> </div> <div class="rich-text text"><div class="cms-richtext lead-in" id="rich-text-898467c987" data-dynamic-inner-content="description"> <p>Information security (InfoSec) is the protection of important information against unauthorized access, disclosure, use, alteration or disruption. It helps ensure that sensitive organizational data is available to authorized users, remains confidential and maintains its integrity.</p> </div></div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-8f25e42dbd" data-dynamic-inner-content="description"> <p>We need to protect information assets, which might include financial, confidential, personal or sensitive data. These assets can take the form of digital files and data, paper documents, physical media and even human speech. Throughout the data lifecycle, InfoSec oversees functions such as infrastructure, software, testing, auditing and archiving.<br /> <br /> Grounded in decades-old principles, information security continually evolves to protect increasingly hybrid and multicloud environments in an ever-changing threat landscape. Given the evolving nature of these threats, multiple teams need to work together to update both the technology and processes used in this defense.<br /> <br /> Digital information security, also called <a href="https://www.ibm.com/think/topics/data-security" target="_self" rel="noopener noreferrer">data security</a>, receives the most attention from information security professionals today and is the focus of this article.</p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Types of security</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-62e33d72af" data-dynamic-inner-content="description"> <p>The terms <strong>information security</strong>, <strong>IT security</strong>, <strong>cybersecurity</strong> and<em> </em><strong>data security</strong> are often (and mistakenly) used interchangeably. While these fields overlap and inform one another, they differ primarily in scope.</p> <ul><li><p><strong>Information security</strong> is an umbrella term that covers an organization's efforts to protect information. It includes physical IT asset security, endpoint security, data <a href="https://www.ibm.com/topics/encryption" target="_self" rel="noopener noreferrer">encryption</a>, <a href="https://www.ibm.com/topics/network-security" target="_self" rel="noopener noreferrer">network security</a> and more.</p> </li></ul> <ul><li><p><a href="https://www.ibm.com/topics/it-security" target="_self" rel="noopener noreferrer"><strong>IT security</strong></a> is also concerned with protecting physical and digital IT assets and data centers but does not include protection for the storage of paper files and other media. It focuses on the technology assets rather than the information itself.</p> </li></ul> <ul><li><p><a href="https://www.ibm.com/topics/cybersecurity" target="_self" rel="noopener noreferrer"><strong>Cybersecurity</strong></a> focuses on securing digital information systems. The goal is to help protect digital data and assets from cyberthreats. While an enormous undertaking, cybersecurity has a narrow scope, as it is not concerned with protecting paper or analog data.</p> </li></ul> <ul><li><p><a href="https://www.ibm.com/think/topics/data-security" target="_self" rel="noopener noreferrer"><strong>Data security</strong></a> is the practice of protecting digital information from unauthorized access, corruption or theft throughout its entire lifecycle. It includes the physical security of hardware and storage devices, along with administrative and access controls. It also covers the logical security of software applications and organizational policies and procedures.</p> </li></ul> </div></div> <div class="experiencefragment"> <div id="experiencefragment-ff5b6e6839" class="cmp-experiencefragment cmp-experiencefragment--blueprint---think-ad---xf---do-not-modify"> <div class="xf-content-height"> <div class="root container responsivegrid"> <div id="container-7baab9eb21" class="cmp-container"> <div class="think-ad"><div class="cds--think-ad theme-white think-ad-theme--blue-cyan-gradient"> <div class="cds--think-ad__container" data-attribute1="think-ad"> <div class="cds--think-ad__media"> <div class="cds--image "> <picture> <source media="(min-width: 1312px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/pm/ul/g/cb/1c/23_11_p-028_1200x1200.component.think-ad-xl-retina.ts=1734532003827.jpeg/content/experience-fragments/adobe-cms/us/en/site-v2/think-hub/article/_8_column_general_ad/blueprint---think-ad---xf---do-not-modify/cybersecurity-thinkad-article-newsletter/jcr:content/root/think_ad_copy/image"/> <source media="(min-width: 1312px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/pm/ul/g/cb/1c/23_11_p-028_1200x1200.component.think-ad-xl.ts=1734532003827.jpeg/content/experience-fragments/adobe-cms/us/en/site-v2/think-hub/article/_8_column_general_ad/blueprint---think-ad---xf---do-not-modify/cybersecurity-thinkad-article-newsletter/jcr:content/root/think_ad_copy/image"/> <source media="(min-width: 1056px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/pm/ul/g/cb/1c/23_11_p-028_1200x1200.component.think-ad-l-retina.ts=1734532003827.jpeg/content/experience-fragments/adobe-cms/us/en/site-v2/think-hub/article/_8_column_general_ad/blueprint---think-ad---xf---do-not-modify/cybersecurity-thinkad-article-newsletter/jcr:content/root/think_ad_copy/image"/> <source media="(min-width: 1056px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/pm/ul/g/cb/1c/23_11_p-028_1200x1200.component.think-ad-l.ts=1734532003827.jpeg/content/experience-fragments/adobe-cms/us/en/site-v2/think-hub/article/_8_column_general_ad/blueprint---think-ad---xf---do-not-modify/cybersecurity-thinkad-article-newsletter/jcr:content/root/think_ad_copy/image"/> <source media="(min-width: 672px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/pm/ul/g/cb/1c/23_11_p-028_1200x1200.component.think-ad-m-retina.ts=1734532003827.jpeg/content/experience-fragments/adobe-cms/us/en/site-v2/think-hub/article/_8_column_general_ad/blueprint---think-ad---xf---do-not-modify/cybersecurity-thinkad-article-newsletter/jcr:content/root/think_ad_copy/image"/> <source media="(min-width: 672px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/pm/ul/g/cb/1c/23_11_p-028_1200x1200.component.think-ad-m.ts=1734532003827.jpeg/content/experience-fragments/adobe-cms/us/en/site-v2/think-hub/article/_8_column_general_ad/blueprint---think-ad---xf---do-not-modify/cybersecurity-thinkad-article-newsletter/jcr:content/root/think_ad_copy/image"/> <source media="(min-width: 481px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/pm/ul/g/cb/1c/23_11_p-028_1200x1200.component.think-ad-s-retina.ts=1734532003827.jpeg/content/experience-fragments/adobe-cms/us/en/site-v2/think-hub/article/_8_column_general_ad/blueprint---think-ad---xf---do-not-modify/cybersecurity-thinkad-article-newsletter/jcr:content/root/think_ad_copy/image"/> <source media="(min-width: 481px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/pm/ul/g/cb/1c/23_11_p-028_1200x1200.component.think-ad-s.ts=1734532003827.jpeg/content/experience-fragments/adobe-cms/us/en/site-v2/think-hub/article/_8_column_general_ad/blueprint---think-ad---xf---do-not-modify/cybersecurity-thinkad-article-newsletter/jcr:content/root/think_ad_copy/image"/> <source media="(max-width: 480px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/pm/ul/g/cb/1c/23_11_p-028_1200x1200.component.think-ad-xs-retina.ts=1734532003827.jpeg/content/experience-fragments/adobe-cms/us/en/site-v2/think-hub/article/_8_column_general_ad/blueprint---think-ad---xf---do-not-modify/cybersecurity-thinkad-article-newsletter/jcr:content/root/think_ad_copy/image"/> <source media="(max-width: 480px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/pm/ul/g/cb/1c/23_11_p-028_1200x1200.component.think-ad-xs.ts=1734532003827.jpeg/content/experience-fragments/adobe-cms/us/en/site-v2/think-hub/article/_8_column_general_ad/blueprint---think-ad---xf---do-not-modify/cybersecurity-thinkad-article-newsletter/jcr:content/root/think_ad_copy/image"/> <img id="image--176036134" class="aem--image__img" src="/content/dam/connectedassets-adobe-cms/worldwide-content/pm/ul/g/cb/1c/23_11_p-028_1200x1200.component.think-ad-xl.ts=1734532003827.jpeg/content/experience-fragments/adobe-cms/us/en/site-v2/think-hub/article/_8_column_general_ad/blueprint---think-ad---xf---do-not-modify/cybersecurity-thinkad-article-newsletter/_jcr_content/root/think_ad_copy/image" alt="Man looking at computer" loading="lazy"/> </picture> </div> </div> <div class="cds--think-ad__content"> <h3 class="cds--think-ad__heading expressive-heading-03"> Strengthen your security intelligence </h3> <p class="cds--think-ad__copy body-short-01"> Stay ahead of threats with news and insights on security, AI and more, weekly in the Think Newsletter. </p> <div class="cds--think-ad__buttons"> <div class="cds--buttongroup"> <a href="https://www.ibm.com/account/reg/signup?formid=news-urx-52954" target="_blank" kind="primary" class="cds--btn cds--btn--primary" data-link-type="local" cta-type="local"> <span data-link-text>Subscribe today</span> <!-- LTR - Left to Right version --> <svg xmlns="http://www.w3.org/2000/svg" class="cds--card__cta c4d-ce--cta__icon" width="20" height="20" focusable="false" fill="currentColor" viewBox="0 0 20 20" aria-hidden="true"> <path d="M11.8 2.8L10.8 3.8 16.2 9.3 1 9.3 1 10.7 16.2 10.7 10.8 16.2 11.8 17.2 19 10z"></path> </svg> <!-- RTL - Right to Left version --> </a> </div> </div> </div> </div> </div> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-caem-star-rating.lc-5b3b3916bf2ff9827060f96b08c2bba1-lc.min.js"></script> </div> </div> </div> </div> </div> </div> <div class="standalone-title enhanced-title text"> <h2 class="expressive-heading-05 "> Why InfoSec is important </h2> <a data-title="Why InfoSec is important" name="Why+InfoSec+is+important"></a> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-eababda62d" data-dynamic-inner-content="description"> <p>Data powers much of the world economy, and cybercriminals recognize its value. <a href="https://www.ibm.com/think/topics/cyber-attack" target="_self" rel="noopener noreferrer">Cyberattacks</a> that aim to steal sensitive information—or in the case of <a href="https://www.ibm.com/think/topics/ransomware" target="_self" rel="noopener noreferrer">ransomware</a>, hold data hostage—have become more common, damaging and costly. InfoSec practices and principles can help secure data in the face of these threats.</p> <p>According to IBM’s <a href="https://www.ibm.com/reports/data-breach" target="_self" rel="noopener noreferrer"><em>Cost of a Data Breach Report</em></a>, the average total cost of a data breach reached a new high of USD 4.45 million in 2023. That figure is up 15.3% from USD 3.86 million in the 2020 report.<br /> <br /> A data breach costs its victim in multiple ways. The unexpected downtime leads to lost business. A company often loses customers and suffers significant and sometimes irreparable damage to its reputation when customers' sensitive information is exposed. Stolen intellectual property can hurt a company's profitability and erode its competitive edge.<br /> <br /> A data breach victim might also face regulatory fines or legal penalties. Government regulations, such as the <a href="https://www.ibm.com/cloud/compliance/gdpr-eu" target="_self" rel="noopener noreferrer">General Data Protection Regulation</a> (GDPR), and industry regulations, such as the Health Insurance Portability and Accountability Act (HIPAA), require companies to protect their customers' sensitive information. Failure to do so can result in hefty fines.<br /> </p> <p>Companies are investing more than ever in information security technology and talent. According to the Cost of a Data Breach Report, 51% of organizations plan to increase security investments after a breach.</p> <p>The top areas identified for extra investments included incident response (IR) planning and testing, employee training and threat detection and response technologies. Organizations that made extensive <a href="https://www.ibm.com/think/topics/ai-security" target="_self" rel="noopener noreferrer">security AI</a> and automation investments reported USD 1.76 million lower data breach costs compared to organizations that had not used security AI and automation capabilities.</p> <p>Chief information security officers (CISOs) who oversee information security efforts have become a fixture of corporate C-suites.</p> <p>Demand is rising for information security analysts holding advanced information security certifications, such as the Certified Information Systems Security Professional (CISSP) certification from ISC2. The Bureau of Labor Statistics projects employment for information security analysts will grow 32% by 2032.<sup>1</sup></p> </div></div> <div class="experiencefragment"> <div id="experiencefragment-7bf68bc80f" class="cmp-experiencefragment cmp-experiencefragment--blueprint---media-player-ad-video---xf---do-not-edit"> <div class="xf-content-height"> <div class="root container responsivegrid"> <div id="container-fc224170e6" class="cmp-container"> <div class="media-player-ad-video"> <div class="media-player-ad-video__container theme-media-player-ad--image-bkg-light" data-theme="image-bkg-light" data-autoid=""> <div class="media-player-ad-video__content"> <div class="media-player-ad-video__top"> <div class="media-player-ad-video__eyebrow"> Mixture of Experts | 14 February, episode 42 </div> </div> <div class="media-player-ad-video__video"> <c4d-video-player-container video-id="1_5t0nxa01" aspect-ratio="16x9" playing-mode="inline" hide-caption> <script src="/etc.clientlibs/adobe-cms/components/content/atoms/video/clientlibs.lc-8675c49600f564093b2ef6979ea3ce64-lc.min.js"></script> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-video-player.lc-e330a027c5ad5af45d6b2121772be896-lc.min.js"></script> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-video-player-container.lc-55363444860a24db3d70e267bce0f5c1-lc.min.js"></script> </c4d-video-player-container> <div id="c4d-analytics-data" data-title-c4d="Information Security" data-last-modified-c4d="Fri Dec 27 15:10:59 UTC 2024" data-last-published-c4d="Fri Dec 27 15:10:59 UTC 2024" data-template-c4d="/conf/adobe-cms-editable/settings/wcm/templates/article" data-playing-mode-c4d="inline"> </div> </div> <h3 class="expressive-heading-03 media-player-ad-video__heading"> Decoding AI: Weekly News Roundup </h3> <div class="media-player-ad-video__text"> <span class=" normal cms-richtext"> <p>Join our world-class panel of engineers, researchers, product leaders and more as they cut through the AI noise to bring you the latest in AI news and insights.</p> </span> </div> <div class="media-player-ad-video__link"> <c4d-link-with-icon cta-type="local" href="https://www.ibm.com/think/podcasts/mixture-of-experts" icon-placement="right" target="_blank" data-link-type="local" data-dynamic-properties="{"ctaUrl":"href"}" data-video-modal-type="media-center"> <span class="cds--link-text" data-link-text data-dynamic-inner-content="ctaLabel">Watch the latest podcast episodes</span> <!-- LTR - Left to Right version --> <svg xmlns="http://www.w3.org/2000/svg" slot="icon" width="20" height="20" focusable="false" fill="currentColor" viewBox="0 0 20 20" aria-hidden="true"> <path d="M11.8 2.8L10.8 3.8 16.2 9.3 1 9.3 1 10.7 16.2 10.7 10.8 16.2 11.8 17.2 19 10z"></path> </svg> <!-- RTL - Right to Left version --> </c4d-link-with-icon> </div> </div> <div class="media-player-ad-video__wrapper"> <div class="media-player-ad-video__wrapper__background"></div> <div class="media-player-ad-video__wrapper__overlay"></div> </div> </div> </div> </div> </div> </div> </div> </div> <div class="standalone-title enhanced-title text"> <h2 class="expressive-heading-05 "> Principles of InfoSec </h2> <a data-title="Principles of InfoSec" name="Principles+of+InfoSec"></a> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-53af45a941" data-dynamic-inner-content="description"> <p>Information security practices are grounded in a set of decades-old, ever-evolving principles:</p> <ul><li><strong>The CIA triad</strong></li><li><strong>Information assurance</strong></li><li><strong>Nonrepudiation</strong></li></ul> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">The CIA triad</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-0734c7ae5a" data-dynamic-inner-content="description"> <p>First suggested by the National Institute of Standards and Technology (NIST) in 1977, the CIA triad is intended to guide organizations in choosing technologies, policies and practices to protect their information systems. The elements of the CIA triad include:</p> <ul><li><strong>Confidentiality</strong></li><li><strong>Integrity</strong></li><li><strong>Availability</strong></li></ul> <p><strong>Confidentiality</strong> means ensuring that parties cannot access data they're not authorized to access.</p> <p>Confidentiality defines a continuum of users, from privileged insiders with access to much of the company's data to outsiders authorized to view only information the public is permitted to view.</p> <p>Personal information should remain private. Sensitive data is sensitive. If an unauthorized person obtains a password to protected data, it would be a confidentiality breach.</p> <p><strong>Integrity</strong> means ensuring that all information contained within company databases is complete and accurate.</p> <p>Integrity efforts aim to stop people from tampering with data, such as by unauthorized additions, alterations or deletions. Data integrity applies to preventing both adversaries who intentionally alter data and well-intentioned users who alter data in unauthorized ways.</p> <p><strong>Availability</strong> means ensuring that users can access the information they're authorized to access when they need it.</p> <p>Availability dictates that information security measures and policies should not interfere with authorized data access. Much of availability is straightforward, such as working to ensure the robustness of hardware and software to prevent an organization’s sites going down.</p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Information assurance</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-7d83de8a69" data-dynamic-inner-content="description"> <p>The ongoing process of achieving confidentiality, integrity and availability of data within an information system is known as “information assurance.”</p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Nonrepudiation</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-ee56cfd6e5" data-dynamic-inner-content="description"> <p>Nonrepudiation means that a user cannot deny (that is, <em>repudiate</em>) having made a transaction—such as altering data or sending a message—because the user needed to pass <a href="https://www.ibm.com/think/topics/authentication" target="_self" rel="noopener noreferrer">authentication</a> to perform the transaction in the first place.</p> <p>While not technically part of the CIA triad, nonrepudiation does combine aspects of information confidentiality and integrity. Nonrepudiation involves ensuring that only authorized users work with data, and that they can only use or modify data in authorized ways.</p> </div></div> <div class="standalone-title enhanced-title text"> <h2 class="expressive-heading-05 "> Information security programs </h2> <a data-title="Information security programs" name="Information+security+programs"></a> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-755188111f" data-dynamic-inner-content="description"> <p>Information security professionals apply the principles of InfoSec to information systems by creating information security programs. These programs are collections of information security policies, protections and plans intended to enact information assurance.</p> <p>Core components of an information security program might include:</p> <ul><li><strong>Risk assessment</strong></li><li><strong>Identifying vulnerabilities</strong></li><li><strong>Identifying threats</strong></li><li><strong>Incident response planning</strong></li></ul> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Risk assessment</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-1b694964d7" data-dynamic-inner-content="description"> <p>An information security <a href="https://www.ibm.com/topics/risk-management" target="_self" rel="noopener noreferrer">risk assessment</a> audits every aspect of a company’s information system. The assessment helps information security professionals understand the exact risks that they face and choose the most appropriate <a href="https://www.ibm.com/topics/security-controls" target="_self" rel="noopener noreferrer">security measure</a>s and technologies to mitigate the risks.<a href="https://www.ibm.com/topics/risk-management" target="_self" rel="noopener noreferrer"></a><a href="https://www.ibm.com/topics/risk-management" target="_self" rel="noopener noreferrer"></a></p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Identifying vulnerabilities</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-fff5a6cf6f" data-dynamic-inner-content="description"> <p>A vulnerability is any weakness in the information technology (IT) infrastructure that adversaries might exploit to gain unauthorized access to data. For example, hackers can take advantage of bugs in a computer program to introduce malware or malicious code into an otherwise legitimate app or service.<br /> <br /> Human users can also constitute vulnerabilities in an information system. For example, cybercriminals might manipulate users into sharing sensitive information through social engineering attacks such as phishing.<br /> </p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Identifying threats</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-1c3714b78a" data-dynamic-inner-content="description"> <p>A threat is anything that can compromise the confidentiality, integrity or availability of an information system. <br /> <br /> A cyberthreat is a threat that exploits a digital vulnerability. For example, a denial of service (DoS) attack is a cyberthreat in which cybercriminals overwhelm part of a company's information system with traffic, causing it to crash. <br /> <br /> Threats can also be physical. Natural disasters, physical or armed assaults and even systemic hardware failures are considered threats to a company's information system.</p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Incident response planning</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-32a68b4d07" data-dynamic-inner-content="description"> <p style=" text-align: left; ">An <a href="https://www.ibm.com/think/topics/incident-response" target="_self" rel="noopener noreferrer">incident response plan</a> (IRP) typically guides an organization's efforts in responding to incidents.</p> <p style=" text-align: left; ">Computer security incident response teams (CSIRT) often create and execute IRPs with the participation of stakeholders from across the organization. Members of the CSIRT might include the chief information security officer (CISO), <a href="https://www.ibm.com/think/topics/chief-ai-officer" target="_self" rel="noopener noreferrer">chief AI officer (CAIO)</a>, security operations center (SOC), IT staff and representatives from legal, <a href="https://www.ibm.com/topics/cyber-risk-management" target="_self" rel="noopener noreferrer">risk management</a> and other nontechnical disciplines.</p> <p>IRPs detail the mitigation steps that an organization takes when a significant threat is detected. While IRPs vary based on the organizations that craft them and the threats they target, common steps include:</p> <ul><li>Assemble the security team, virtually or in person.<br /> <br /> </li><li>Verify the source of the threat.<br /> <br /> </li><li>Act to contain the threat and halt it as soon as possible.<br /> <br /> </li><li>Determine what, if any, damage has occurred.<br /> <br /> </li><li>Notify interested parties within the organization, stakeholders and strategic partners.</li></ul> </div></div> <div class="standalone-title enhanced-title text"> <h2 class="expressive-heading-05 "> InfoSec tools and techniques </h2> <a data-title="InfoSec tools and techniques" name="InfoSec+tools+and+techniques"></a> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-98f84f0a22" data-dynamic-inner-content="description"> <p>Information security programs use several different tools and techniques to address specific threats. Common InfoSec tools and techniques include:</p> <ul><li><strong>Cryptography</strong></li><li><strong>Data loss prevention (DLP)</strong></li><li><strong>Endpoint detection and response (EDR)</strong></li><li><strong>Firewalls</strong></li><li><strong>Intrusion detection (IDS) and intrusion prevention (IPS) systems</strong></li><li><strong>Information security management systems (ISMS)</strong></li><li><strong>Security information and event management (SIEM)</strong></li><li><strong>Security operations centers (SOC)</strong></li><li><strong>Strong authentication measures</strong></li><li><strong>Threat intelligence<br /> </strong></li><li><strong>User and entity behavior analytics (UEBA)</strong></li></ul> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Cryptography</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-c95e16a9ed" data-dynamic-inner-content="description"> <p><a href="https://www.ibm.com/topics/cryptography">Cryptography</a> uses algorithms to obscure information so that only people with the permission and ability to decrypt it can read it.</p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Data loss prevention (DLP)</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-8958080fa0" data-dynamic-inner-content="description"> <p><a href="https://www.ibm.com/think/topics/data-loss-prevention">DLP</a> strategies and tools track data use and movement throughout a network and enforce granular security policies to help prevent data leaks and losses.</p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Endpoint detection and response (EDR)</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-a75006bc06" data-dynamic-inner-content="description"> <p><a href="https://www.ibm.com/think/topics/edr" target="_self" rel="noopener noreferrer">EDR</a> solutions continuously monitor files and applications on each device, hunting for suspicious or malicious activity that indicates malware, ransomware or advanced threats.</p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Firewalls</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-788eb87089" data-dynamic-inner-content="description"> <p>A <a href="https://www.ibm.com/topics/network-security" style=" background-color: rgb(255,255,255); ">firewall</a> is software or hardware that stops suspicious traffic from entering or leaving a network while allowing legitimate traffic through. Firewalls can be deployed at the edges of a network or used internally to divide a larger network into smaller subnetworks. If one part of the network is compromised, hackers are blocked from accessing the rest.<br /> </p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Intrusion detection (IDS) and intrusion prevention (IPS) systems</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-dfed7edd80" data-dynamic-inner-content="description"> <p>An <a href="https://www.ibm.com/think/topics/intrusion-detection-system">IDS</a> is a network security tool that monitors incoming network traffic and devices for suspicious activity or security policy violations. An <a href="https://www.ibm.com/think/topics/intrusion-prevention-system">IPS</a> monitors network traffic for potential threats and automatically blocks them. Many organizations use a combined system called an <strong>intrusion detection and prevention system</strong> (IDPS).<br /> </p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Information security management system (ISMS)</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-493b1c0736" data-dynamic-inner-content="description"> <p>An ISMS includes guidelines and processes that help organizations protect their sensitive data and respond to a data breach. Having guidelines in place also helps with continuity if there is major staff turnover. <a href="https://www.ibm.com/cloud/compliance/iso-27001" target="_self" rel="noopener noreferrer">ISO/IEC 27001</a> is a widely-used ISMS.</p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Security information and event management (SIEM)</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-90a40d8d0f" data-dynamic-inner-content="description"> <p><a href="https://www.ibm.com/think/topics/siem" target="_self" rel="noopener noreferrer">SIEM</a> systems help detect user behavior anomalies and use <a href="https://www.ibm.com/think/topics/artificial-intelligence" target="_self" rel="noopener noreferrer">artificial intelligence</a> (AI) to automate many of the manual processes associated with threat detection and incident response.</p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Security operations center (SOC)</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-592085fc92" data-dynamic-inner-content="description"> <p>A <a href="https://www.ibm.com/topics/security-operations-center" target="_self" rel="noopener noreferrer">SOC</a> unifies and coordinates all cybersecurity technologies and operations under a team of IT security professionals dedicated to monitoring IT infrastructure security around the clock.</p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Strong authentication measures</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-59066ed8e8" data-dynamic-inner-content="description"> <p><a href="https://www.ibm.com/think/topics/2fa" target="_self" rel="noopener noreferrer">Two-factor authentication (2FA)</a> and <a href="https://www.ibm.com/think/topics/multi-factor-authentication" target="_self" rel="noopener noreferrer">multifactor authentication (MFA)</a> are identity verification methods in which users must supply multiple pieces of evidence to prove their identities and gain access to sensitive resources.</p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Threat intelligence</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-b7abd773db" data-dynamic-inner-content="description"> <p><a href="https://www.ibm.com/topics/threat-intelligence" target="_self" rel="noopener noreferrer">Threat intelligence</a> helps security teams be more proactive, enabling them to take effective, data-driven actions to prevent cyberattacks before they occur.</p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">User and entity behavior analytics (UEBA)</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-b3e8fcc46d" data-dynamic-inner-content="description"> <p><a href="https://www.ibm.com/topics/ueba" target="_self" rel="noopener noreferrer">UEBA</a> is a type of security software that uses behavioral analytics and <a href="https://www.ibm.com/think/topics/machine-learning-algorithms" target="_self" rel="noopener noreferrer">machine learning algorithms</a> to identify abnormal and potentially dangerous user and device behavior.</p> </div></div> <div class="standalone-title enhanced-title text"> <h2 class="expressive-heading-05 "> Information security threats </h2> <a data-title="Information security threats" name="Information+security+threats"></a> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-785345df8a" data-dynamic-inner-content="description"> <p>Organizations face a long list of potential threats to information security.</p> <ul><li><strong>Cyberattacks</strong></li><li><strong>Employee error</strong></li><li><strong>Ineffective endpoint security</strong></li><li><strong>Insider threats</strong></li><li><strong>Misconfigurations</strong></li><li><strong>Social engineering</strong></li></ul> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Cyberattacks</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-63551c0029" data-dynamic-inner-content="description"> <p>These attacks can attempt to compromise an organization’s data from any number of directions, including <a href="https://www.ibm.com/topics/cyber-hacking" target="_self" rel="noopener noreferrer">advanced persistent threat (APT)</a> attacks, botnets (robot networks), <a href="https://www.ibm.com/think/topics/ddos" target="_self" rel="noopener noreferrer">distributed denial-of-service (DDoS)</a>, “drive-by” download attacks (which download malicious code automatically), <a href="https://www.ibm.com/think/topics/malware" target="_self" rel="noopener noreferrer">malware</a>, <a href="https://www.ibm.com/think/topics/phishing" target="_self" rel="noopener noreferrer">phishing</a>, ransomware, viruses and worms.</p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Employee error</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-abdda05516" data-dynamic-inner-content="description"> <p>People can lose mobile equipment loaded with sensitive information, visit dangerous websites on company equipment or use easy-to-crack passwords.</p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Ineffective endpoint security</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-ccbfe88470" data-dynamic-inner-content="description"> <p>Any laptop, mobile device or PC can be an entrypoint into an organization’s IT system in the absence of adequate antivirus or <a href="https://www.ibm.com/topics/endpoint-security" target="_self" rel="noopener noreferrer">endpoint security</a> solutions.</p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Insider threats</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-a31cc05590" data-dynamic-inner-content="description"> <p>There are two types of <a href="https://www.ibm.com/topics/insider-threats" target="_self" rel="noopener noreferrer">insider threats</a>.</p> <ul><li>Malicious insiders are employees, partners or other authorized users who intentionally compromise an organization’s information for personal gain or for spite.<br /> <br /> </li><li>Negligent insiders are authorized users who unintentionally compromise security by not following security best practices.<br /> </li></ul> <p>According to the <a href="https://www.ibm.com/reports/threat-intelligence" target="_self" rel="noopener noreferrer"><em>X-Force Threat Intelligence Index </em></a><span style=" font-size: 16.0px; ">report, 32% of security incidents involve malicious use of legitimate tools. The incidents include credential theft, reconnaissance, remote access and data exfiltration.</span></p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Misconfigurations</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-73b88a84b9" data-dynamic-inner-content="description"> <p>Organizations rely on various IT platforms and tools, including cloud-based <a href="https://www.ibm.com/think/topics/data-storage" target="_self" rel="noopener noreferrer">data storage</a> options, <a href="https://www.ibm.com/think/topics/iaas" target="_self" rel="noopener noreferrer">infrastructure as a service (IaaS)</a>, <a href="https://www.ibm.com/think/topics/saas-integration" target="_self" rel="noopener noreferrer">software as a service (SaaS)</a> integrations and web applications from various providers. Improper configurations of any of these assets can pose security risks.</p> <p>Also, provider or internal changes can lead to “configuration drift,” where valid settings go out-of-date.<br /> <br /> The <em>X-Force Threat Intelligence Index</em> reported that during <a href="https://www.ibm.com/topics/penetration-testing" target="_self" rel="noopener noreferrer">penetration testing</a> engagements, the most observed web application risk across client environments was security misconfiguration, accounting for 30% of the total.</p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Social engineering</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-553f919cda" data-dynamic-inner-content="description"> <p><a href="https://www.ibm.com/topics/social-engineering" target="_self" rel="noopener noreferrer">Social engineering</a> attacks trick employees into divulging sensitive information or passwords that open the door to malicious acts.<br /> </p> <p>It can also happen that while trying to promote an organization through social media, employees might mistakenly divulge too much personal or business information that can be used by attackers.</p> </div></div> <div class="standalone-title enhanced-title text"> <h2 class="expressive-heading-05 "> The benefits of InfoSec </h2> <a data-title="The benefits of InfoSec" name="The+benefits+of+InfoSec"></a> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-befe1ac3f0" data-dynamic-inner-content="description"> <p>The benefits of a strong InfoSec program can assist teams across entire organizations:</p> <ul><li>Business continuity</li><li>Compliance</li><li>Cost savings</li><li>Greater efficiency</li><li>Reputation protection</li><li>Risk reduction</li></ul> </div></div> <div class="pictogram-item"> <c4d-content-item horizontal> <svg fill="currentColor" slot="media" class="global--business--services cds--pictogram-item__pictogram" data-autoid="c4d--pictogram-item__pictogram" focusable="false" viewBox="0 0 80 80" height="80" width="80" role="img"> <use href="#global--business--services" height="80" width="80"></use> <defs> <linearGradient id="pictogram-color-gradient-180-blue-to-purple" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#8a3ffc"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-dark-to-light" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#78a9ff"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-to-teal" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#08bdba"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-to-magenta" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#ff7eb6"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-red-to-purple" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#fa4d56"/> <stop offset="100%" stop-color="#a56eff"/> </linearGradient> <linearGradient id="pictogram-color-blue-80"> <stop stop-color="#002d9c"/> </linearGradient> <linearGradient id="pictogram-color-blue-80"> <stop stop-color="#002d9c"/> </linearGradient> <linearGradient id="pictogram-color-blue-60"> <stop stop-color="#0f62fe"/> </linearGradient> <linearGradient id="pictogram-color-cyan-50"> <stop stop-color="#1192E8"/> </linearGradient> <linearGradient id="pictogram-color-purple-60"> <stop stop-color="#8A3FFC"/> </linearGradient> <linearGradient id="pictogram-color-green-50"> <stop stop-color="#24a148"/> </linearGradient> <linearGradient id="pictogram-color-teal-50"> <stop stop-color="#009d9a"/> </linearGradient> <linearGradient id="pictogram-color-magenta-50"> <stop stop-color="#EE5396"/> </linearGradient> <linearGradient id="pictogram-color-red-60"> <stop stop-color="#DA1E28"/> </linearGradient> </defs> </svg> <div class="pictogram-svg-source"> <svg xmlns="http://www.w3.org/2000/svg" id="global--business--services" viewBox="0 0 32 32"><path d="M19,28.36c-3.742,0-7.222-1.657-9.583-4.554C9.116,23.842,8.81,23.86,8.5,23.86 c-4.334,0-7.86-3.526-7.86-7.86S4.166,8.14,8.5,8.14c0.31,0,0.616,0.018,0.917,0.053C11.778,5.297,15.259,3.64,19,3.64 c4.546,0,8.526,2.467,10.674,6.132c0.023,0.03,0.043,0.063,0.057,0.099c1.036,1.807,1.63,3.9,1.63,6.128s-0.594,4.321-1.63,6.129 c-0.014,0.036-0.033,0.069-0.057,0.099C27.526,25.894,23.546,28.36,19,28.36z M19.36,22.36v5.256 c1.823-0.238,3.415-2.274,4.361-5.256H19.36z M14.289,22.36c0.975,3.032,2.607,5.013,4.351,5.255V22.36H14.289z M10.24,23.666 c1.652,1.89,3.83,3.172,6.235,3.701c-1.216-1.007-2.249-2.738-2.941-5.007h-0.42C12.267,22.976,11.293,23.427,10.24,23.666z M24.481,22.36c-0.673,2.22-1.694,3.973-2.928,4.997c2.996-0.673,5.559-2.505,7.191-4.997H24.481z M2.835,20.342 c1.306,1.7,3.36,2.798,5.665,2.798c3.937,0,7.14-3.203,7.14-7.14c0-1.743-0.627-3.342-1.669-4.583l-3.007,3.003 c-0.141,0.14-0.368,0.14-0.509,0l-2.417-2.414l-1.702,5.101c-0.049,0.147-0.187,0.246-0.341,0.246H4.332L2.835,20.342z M24.683,21.64h4.497c0.876-1.573,1.396-3.369,1.455-5.28h-5.277C25.331,18.269,25.091,20.058,24.683,21.64z M19.36,21.64h4.572 c0.424-1.573,0.677-3.369,0.705-5.28H19.36V21.64z M14.076,21.64h4.564v-5.28h-2.288c-0.092,2.025-0.954,3.853-2.299,5.198 C14.061,21.585,14.068,21.612,14.076,21.64z M8.5,8.86c-3.937,0-7.14,3.203-7.14,7.14c0,1.337,0.37,2.589,1.011,3.66l1.417-2.827 c0.061-0.122,0.186-0.199,0.322-0.199h1.626l1.804-5.407c0.039-0.119,0.137-0.208,0.258-0.237c0.124-0.029,0.249,0.008,0.337,0.096 l2.574,2.571l2.771-2.768C12.194,9.634,10.436,8.86,8.5,8.86z M25.357,15.64h5.277c-0.059-1.911-0.579-3.707-1.455-5.28h-4.497 C25.091,11.943,25.331,13.731,25.357,15.64z M19.36,15.64h5.277c-0.028-1.911-0.281-3.707-0.705-5.28H19.36V15.64z M16.352,15.64 h2.288v-5.28h-4.564c-0.007,0.027-0.015,0.055-0.022,0.083c0.055,0.055,0.109,0.111,0.162,0.167c0.01,0.008,0.02,0.017,0.029,0.026 c0.015,0.016,0.029,0.032,0.041,0.049C15.497,12.003,16.266,13.734,16.352,15.64z M24.481,9.64h4.264 c-1.633-2.493-4.195-4.325-7.191-4.998C22.787,5.667,23.809,7.42,24.481,9.64z M19.36,9.64h4.361 c-0.946-2.982-2.538-5.019-4.361-5.257V9.64z M14.289,9.64h4.351V4.385C16.896,4.626,15.264,6.607,14.289,9.64z M13.114,9.64h0.42 c0.693-2.269,1.726-4,2.941-5.007c-2.405,0.529-4.583,1.811-6.235,3.701C11.293,8.573,12.267,9.024,13.114,9.64z"/></svg> </div> <c4d-content-item-heading> Business continuity </c4d-content-item-heading> <c4d-content-item-paragraph> <div class="cms-richtext " id="rich-text-d2b5cdde56" data-dynamic-inner-content="description"> <p>Critical business information can be more effectively protected and stored to be available for a restart after a security incident.</p> </div> </c4d-content-item-paragraph> </c4d-content-item> </div> <div class="pictogram-item"> <c4d-content-item horizontal> <svg fill="currentColor" slot="media" class="college cds--pictogram-item__pictogram" data-autoid="c4d--pictogram-item__pictogram" focusable="false" viewBox="0 0 80 80" height="80" width="80" role="img"> <use href="#college" height="80" width="80"></use> <defs> <linearGradient id="pictogram-color-gradient-180-blue-to-purple" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#8a3ffc"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-dark-to-light" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#78a9ff"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-to-teal" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#08bdba"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-to-magenta" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#ff7eb6"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-red-to-purple" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#fa4d56"/> <stop offset="100%" stop-color="#a56eff"/> </linearGradient> <linearGradient id="pictogram-color-blue-80"> <stop stop-color="#002d9c"/> </linearGradient> <linearGradient id="pictogram-color-blue-80"> <stop stop-color="#002d9c"/> </linearGradient> <linearGradient id="pictogram-color-blue-60"> <stop stop-color="#0f62fe"/> </linearGradient> <linearGradient id="pictogram-color-cyan-50"> <stop stop-color="#1192E8"/> </linearGradient> <linearGradient id="pictogram-color-purple-60"> <stop stop-color="#8A3FFC"/> </linearGradient> <linearGradient id="pictogram-color-green-50"> <stop stop-color="#24a148"/> </linearGradient> <linearGradient id="pictogram-color-teal-50"> <stop stop-color="#009d9a"/> </linearGradient> <linearGradient id="pictogram-color-magenta-50"> <stop stop-color="#EE5396"/> </linearGradient> <linearGradient id="pictogram-color-red-60"> <stop stop-color="#DA1E28"/> </linearGradient> </defs> </svg> <div class="pictogram-svg-source"> <svg xmlns="http://www.w3.org/2000/svg" id="college" viewBox="0 0 32 32"><path d="M31,31.36H1c-0.199,0-0.36-0.161-0.36-0.36v-3c0-0.199,0.161-0.36,0.36-0.36h1.64V25 c0-0.199,0.161-0.36,0.36-0.36h0.64V13.36H1c-0.153,0-0.289-0.096-0.34-0.241c-0.05-0.144-0.004-0.305,0.115-0.4l15-12 c0.132-0.104,0.318-0.104,0.45,0l15,12c0.12,0.096,0.166,0.256,0.115,0.4c-0.051,0.145-0.187,0.241-0.34,0.241h-2.64v11.28H29 c0.199,0,0.36,0.161,0.36,0.36v2.64H31c0.199,0,0.36,0.161,0.36,0.36v3C31.36,31.199,31.199,31.36,31,31.36z M1.36,30.64h29.28 v-2.28H1.36V30.64z M3.36,27.64h25.28v-2.28H3.36V27.64z M22.36,24.64h5.279V13.36H22.36V24.64z M10.36,24.64h11.28V13.36H10.36 V24.64z M4.36,24.64h5.28V13.36H4.36V24.64z M28,12.64h1.974L16,1.461L2.026,12.64H28z M25.36,23h-0.72v-8h0.721L25.36,23L25.36,23z M7.36,23H6.64v-8h0.72C7.36,15,7.36,23,7.36,23z M16,10.86c-1.577,0-2.86-1.283-2.86-2.86S14.423,5.14,16,5.14S18.86,6.423,18.86,8 S17.577,10.86,16,10.86z M16,5.86c-1.18,0-2.14,0.96-2.14,2.14s0.96,2.14,2.14,2.14S18.14,9.18,18.14,8S17.18,5.86,16,5.86z"/></svg> </div> <c4d-content-item-heading> Compliance </c4d-content-item-heading> <c4d-content-item-paragraph> <div class="cms-richtext " id="rich-text-91a952a490" data-dynamic-inner-content="description"> <p><a href="https://www.ibm.com/think/topics/data-privacy" target="_self" rel="noopener noreferrer">Data privacy</a> and protection regulations such as HIPAA and <a href="https://www.ibm.com/cloud/compliance/pci" target="_self" rel="noopener noreferrer">PCI-DSS</a> often require the protection of sensitive information. Information security helps ensure compliance and reduce legal liability or the possibility of fines.</p> </div> </c4d-content-item-paragraph> </c4d-content-item> </div> <div class="pictogram-item"> <c4d-content-item horizontal> <svg fill="currentColor" slot="media" class="global--currency cds--pictogram-item__pictogram" data-autoid="c4d--pictogram-item__pictogram" focusable="false" viewBox="0 0 80 80" height="80" width="80" role="img"> <use href="#global--currency" height="80" width="80"></use> <defs> <linearGradient id="pictogram-color-gradient-180-blue-to-purple" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#8a3ffc"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-dark-to-light" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#78a9ff"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-to-teal" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#08bdba"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-to-magenta" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#ff7eb6"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-red-to-purple" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#fa4d56"/> <stop offset="100%" stop-color="#a56eff"/> </linearGradient> <linearGradient id="pictogram-color-blue-80"> <stop stop-color="#002d9c"/> </linearGradient> <linearGradient id="pictogram-color-blue-80"> <stop stop-color="#002d9c"/> </linearGradient> <linearGradient id="pictogram-color-blue-60"> <stop stop-color="#0f62fe"/> </linearGradient> <linearGradient id="pictogram-color-cyan-50"> <stop stop-color="#1192E8"/> </linearGradient> <linearGradient id="pictogram-color-purple-60"> <stop stop-color="#8A3FFC"/> </linearGradient> <linearGradient id="pictogram-color-green-50"> <stop stop-color="#24a148"/> </linearGradient> <linearGradient id="pictogram-color-teal-50"> <stop stop-color="#009d9a"/> </linearGradient> <linearGradient id="pictogram-color-magenta-50"> <stop stop-color="#EE5396"/> </linearGradient> <linearGradient id="pictogram-color-red-60"> <stop stop-color="#DA1E28"/> </linearGradient> </defs> </svg> <div class="pictogram-svg-source"> <svg xmlns="http://www.w3.org/2000/svg" id="global--currency" viewBox="0 0 32 32"><path d="M31,0.642H1c-0.199,0-0.36,0.161-0.36,0.36v16c0,0.199,0.161,0.36,0.36,0.36h30 c0.199,0,0.36-0.161,0.36-0.36v-16C31.36,0.803,31.199,0.642,31,0.642z M30.64,4.604c-1.715-0.172-3.07-1.527-3.243-3.242h3.243 V4.604z M30.64,5.323v7.353c-2.113,0.177-3.788,1.852-3.964,3.966H5.324c-0.175-2.114-1.85-3.789-3.964-3.966V5.323 c2.112-0.176,3.786-1.85,3.963-3.962h21.353C26.854,3.474,28.528,5.147,30.64,5.323z M4.604,1.362 C4.431,3.077,3.076,4.432,1.36,4.604V1.362H4.604z M1.36,13.396c1.717,0.172,3.073,1.529,3.244,3.246H1.36V13.396z M27.397,16.642 c0.171-1.717,1.527-3.074,3.243-3.246v3.246H27.397z M16,2.64c-3.507,0-6.36,2.853-6.36,6.36s2.853,6.36,6.36,6.36 s6.36-2.853,6.36-6.36S19.507,2.64,16,2.64z M20.519,5.64h-1.656c-0.254-0.784-0.592-1.452-0.997-1.956 C18.935,4.06,19.854,4.748,20.519,5.64z M10.378,9.36h2.271c0.023,0.814,0.122,1.582,0.286,2.28h-1.916 C10.653,10.952,10.43,10.179,10.378,9.36z M16.36,5.64V3.421c0.702,0.215,1.324,1.045,1.74,2.219C18.1,5.64,16.36,5.64,16.36,5.64z M18.321,6.36c0.177,0.691,0.284,1.466,0.31,2.28H16.36V6.36H18.321z M15.64,3.421V5.64H13.9C14.316,4.466,14.938,3.637,15.64,3.421 z M15.64,6.36v2.28h-2.271c0.026-0.814,0.133-1.589,0.31-2.28C13.679,6.36,15.64,6.36,15.64,6.36z M12.649,8.64h-2.271 c0.052-0.819,0.275-1.592,0.641-2.28h1.916C12.771,7.058,12.672,7.826,12.649,8.64z M13.369,9.36h2.271v2.28h-1.961 C13.502,10.949,13.394,10.174,13.369,9.36z M15.64,12.36v2.219c-0.702-0.215-1.324-1.044-1.741-2.219H15.64z M16.36,14.579V12.36 h1.74C17.683,13.534,17.062,14.363,16.36,14.579z M16.36,11.64V9.36h2.271c-0.026,0.814-0.133,1.589-0.31,2.28 C18.321,11.64,16.36,11.64,16.36,11.64z M19.351,9.36h2.27c-0.052,0.819-0.275,1.592-0.641,2.28h-1.916 C19.229,10.942,19.328,10.174,19.351,9.36z M19.351,8.64c-0.023-0.814-0.122-1.582-0.286-2.28h1.916 c0.366,0.688,0.589,1.461,0.641,2.28H19.351z M14.134,3.684c-0.405,0.504-0.744,1.172-0.997,1.956h-1.656 C12.146,4.748,13.065,4.06,14.134,3.684z M11.481,12.36h1.656c0.253,0.784,0.592,1.452,0.997,1.956 C13.065,13.94,12.146,13.252,11.481,12.36z M17.866,14.316c0.405-0.504,0.744-1.172,0.997-1.956h1.656 C19.854,13.252,18.935,13.94,17.866,14.316z M5.5,7.14C4.475,7.14,3.64,7.975,3.64,9s0.834,1.86,1.86,1.86S7.36,10.025,7.36,9 S6.525,7.14,5.5,7.14z M5.5,10.14c-0.628,0-1.14-0.512-1.14-1.14S4.872,7.86,5.5,7.86S6.64,8.372,6.64,9S6.128,10.14,5.5,10.14z M26.5,7.14c-1.025,0-1.86,0.834-1.86,1.86s0.835,1.86,1.86,1.86s1.86-0.834,1.86-1.86S27.525,7.14,26.5,7.14z M26.5,10.14 c-0.629,0-1.14-0.512-1.14-1.14s0.511-1.14,1.14-1.14S27.64,8.372,27.64,9S27.129,10.14,26.5,10.14z M26.841,20.161 c0.691,0.692,0.69,1.818,0,2.51l-6.066,6.101c-0.37,0.369-0.857,0.607-1.374,0.673l-7.233,0.897l-0.913,0.913l-0.509-0.51l1-1 c0.057-0.057,0.13-0.093,0.21-0.103l7.356-0.913c0.358-0.045,0.697-0.211,0.954-0.467l6.065-6.101c0.411-0.411,0.411-1.08,0-1.492 c-0.373-0.371-0.968-0.44-1.513,0.021l-6.286,5.135l-0.022-0.027C18.1,26.144,17.577,26.36,17,26.36h-5v-0.72h5 c0.904,0,1.64-0.735,1.64-1.64c0-0.353-0.287-0.64-0.64-0.64h-8c-2.559,0-4.64,2.081-4.64,4.64c0,0.096-0.038,0.188-0.105,0.255 l-3,3l-0.509-0.51l2.896-2.896C4.722,24.963,7.095,22.64,10,22.64h8c0.75,0,1.36,0.61,1.36,1.36c0,0.083-0.016,0.161-0.024,0.241 l5.022-4.103c0.267-0.226,0.7-0.498,1.228-0.498C26.059,19.64,26.504,19.825,26.841,20.161z"/></svg> </div> <c4d-content-item-heading> Cost savings </c4d-content-item-heading> <c4d-content-item-paragraph> <div class="cms-richtext " id="rich-text-3fbcde6f49" data-dynamic-inner-content="description"> <p>An enterprise-grade security system enables organizations to have appropriate measures for different levels of data, with the chance to avoid overspending on security for less sensitive data.</p> </div> </c4d-content-item-paragraph> </c4d-content-item> </div> <div class="pictogram-item"> <c4d-content-item horizontal> <svg fill="currentColor" slot="media" class="refresh cds--pictogram-item__pictogram" data-autoid="c4d--pictogram-item__pictogram" focusable="false" viewBox="0 0 80 80" height="80" width="80" role="img"> <use href="#refresh" height="80" width="80"></use> <defs> <linearGradient id="pictogram-color-gradient-180-blue-to-purple" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#8a3ffc"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-dark-to-light" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#78a9ff"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-to-teal" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#08bdba"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-to-magenta" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#ff7eb6"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-red-to-purple" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#fa4d56"/> <stop offset="100%" stop-color="#a56eff"/> </linearGradient> <linearGradient id="pictogram-color-blue-80"> <stop stop-color="#002d9c"/> </linearGradient> <linearGradient id="pictogram-color-blue-80"> <stop stop-color="#002d9c"/> </linearGradient> <linearGradient id="pictogram-color-blue-60"> <stop stop-color="#0f62fe"/> </linearGradient> <linearGradient id="pictogram-color-cyan-50"> <stop stop-color="#1192E8"/> </linearGradient> <linearGradient id="pictogram-color-purple-60"> <stop stop-color="#8A3FFC"/> </linearGradient> <linearGradient id="pictogram-color-green-50"> <stop stop-color="#24a148"/> </linearGradient> <linearGradient id="pictogram-color-teal-50"> <stop stop-color="#009d9a"/> </linearGradient> <linearGradient id="pictogram-color-magenta-50"> <stop stop-color="#EE5396"/> </linearGradient> <linearGradient id="pictogram-color-red-60"> <stop stop-color="#DA1E28"/> </linearGradient> </defs> </svg> <div class="pictogram-svg-source"> <svg xmlns="http://www.w3.org/2000/svg" id="refresh" viewBox="0 0 32 32"><path d="M28,31.36H4c-1.301,0-2.36-1.059-2.36-2.36V16h0.72v13c0,0.904,0.736,1.64,1.64,1.64h24 c0.904,0,1.64-0.735,1.64-1.64V9c0-0.904-0.735-1.64-1.64-1.64H7.869l5.385,5.386l-0.509,0.509L6.491,7l6.255-6.254l0.509,0.509 L7.869,6.64H28c1.302,0,2.36,1.059,2.36,2.36v20C30.36,30.302,29.302,31.36,28,31.36z"/></svg> </div> <c4d-content-item-heading> Greater efficiency </c4d-content-item-heading> <c4d-content-item-paragraph> <div class="cms-richtext " id="rich-text-1f5596622e" data-dynamic-inner-content="description"> <p>Employees are better able to handle information appropriately when the data is more clearly labeled for sensitivity and when safer processes are in place.</p> </div> </c4d-content-item-paragraph> </c4d-content-item> </div> <div class="pictogram-item"> <c4d-content-item horizontal> <svg fill="currentColor" slot="media" class="build--leadership--and--culture cds--pictogram-item__pictogram" data-autoid="c4d--pictogram-item__pictogram" focusable="false" viewBox="0 0 80 80" height="80" width="80" role="img"> <use href="#build--leadership--and--culture" height="80" width="80"></use> <defs> <linearGradient id="pictogram-color-gradient-180-blue-to-purple" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#8a3ffc"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-dark-to-light" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#78a9ff"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-to-teal" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#08bdba"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-to-magenta" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#ff7eb6"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-red-to-purple" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#fa4d56"/> <stop offset="100%" stop-color="#a56eff"/> </linearGradient> <linearGradient id="pictogram-color-blue-80"> <stop stop-color="#002d9c"/> </linearGradient> <linearGradient id="pictogram-color-blue-80"> <stop stop-color="#002d9c"/> </linearGradient> <linearGradient id="pictogram-color-blue-60"> <stop stop-color="#0f62fe"/> </linearGradient> <linearGradient id="pictogram-color-cyan-50"> <stop stop-color="#1192E8"/> </linearGradient> <linearGradient id="pictogram-color-purple-60"> <stop stop-color="#8A3FFC"/> </linearGradient> <linearGradient id="pictogram-color-green-50"> <stop stop-color="#24a148"/> </linearGradient> <linearGradient id="pictogram-color-teal-50"> <stop stop-color="#009d9a"/> </linearGradient> <linearGradient id="pictogram-color-magenta-50"> <stop stop-color="#EE5396"/> </linearGradient> <linearGradient id="pictogram-color-red-60"> <stop stop-color="#DA1E28"/> </linearGradient> </defs> </svg> <div class="pictogram-svg-source"> <svg xmlns="http://www.w3.org/2000/svg" id="build--leadership--and--culture" viewBox="0 0 32 32"><path d="M28,14.86c1.025,0,1.86-0.834,1.86-1.86s-0.835-1.86-1.86-1.86 s-1.86,0.834-1.86,1.86S26.975,14.86,28,14.86z M28,11.86c0.629,0,1.14,0.512,1.14,1.14s-0.511,1.14-1.14,1.14 s-1.14-0.512-1.14-1.14S27.371,11.86,28,11.86z M31.36,19v4c0,0.833,0,2.189-1,2.732V31h-0.72v-5.5c0-0.151,0.096-0.287,0.238-0.339 c0.703-0.253,0.762-1.206,0.762-2.161v-4c0-1.505-1.135-2.64-2.64-2.64s-2.64,1.135-2.64,2.64v4c0,0.955,0.059,1.908,0.762,2.161 c0.143,0.052,0.238,0.188,0.238,0.339V31h-0.72v-5.268c-1-0.543-1-1.899-1-2.732v-4c0-1.884,1.477-3.36,3.36-3.36 S31.36,17.116,31.36,19z M4,14.86c1.025,0,1.86-0.834,1.86-1.86S5.025,11.14,4,11.14S2.14,11.975,2.14,13S2.975,14.86,4,14.86z M4,11.86c0.628,0,1.14,0.512,1.14,1.14S4.628,14.14,4,14.14S2.86,13.628,2.86,13S3.372,11.86,4,11.86z M7.36,19v4 c0,0.778,0,2.182-1,2.731V31H5.64v-5.5c0-0.151,0.095-0.287,0.238-0.339C6.581,24.908,6.64,23.954,6.64,23v-4 c0-1.505-1.135-2.64-2.64-2.64S1.36,17.495,1.36,19v4c0,0.954,0.059,1.908,0.762,2.161C2.265,25.213,2.36,25.349,2.36,25.5V31H1.64 v-5.269c-1-0.55-1-1.953-1-2.731v-4c0-1.884,1.476-3.36,3.36-3.36S7.36,17.116,7.36,19z M16,6.36c1.577,0,2.86-1.283,2.86-2.86 S17.576,0.64,16,0.64c-1.577,0-2.86,1.283-2.86,2.86S14.422,6.36,16,6.36z M16,1.36c1.18,0,2.139,0.96,2.139,2.14 S17.18,5.64,16,5.64s-2.14-0.96-2.14-2.14S14.819,1.36,16,1.36z M21,27.64h-2.64v-7.396c1.24-0.555,2-1.774,2-3.243v-5 c0-2.526-1.834-4.36-4.361-4.36c-2.526,0-4.359,1.833-4.359,4.36v5c0,1.469,0.76,2.688,2,3.243v7.396H11 c-0.199,0-0.36,0.161-0.36,0.36v3h0.72v-2.64h9.28V31h0.721v-3C21.36,27.801,21.199,27.64,21,27.64z M14.123,19.661 C13.035,19.269,12.36,18.249,12.36,17v-5c0-2.109,1.531-3.64,3.64-3.64c2.11,0,3.64,1.531,3.64,3.64v5 c0,1.249-0.675,2.269-1.762,2.661C17.735,19.713,17.64,19.849,17.64,20v7.64h-3.28V20C14.36,19.849,14.265,19.713,14.123,19.661z"/></svg> </div> <c4d-content-item-heading> Reputation protection </c4d-content-item-heading> <c4d-content-item-paragraph> <div class="cms-richtext " id="rich-text-bdf73cdfec" data-dynamic-inner-content="description"> <p>Security breaches are bad for business. There might be an immediate cost of security incidents, but also a loss of public trust.</p> </div> </c4d-content-item-paragraph> </c4d-content-item> </div> <div class="pictogram-item"> <c4d-content-item horizontal> <svg fill="currentColor" slot="media" class="get--ahead--of--risk--and--compliance cds--pictogram-item__pictogram" data-autoid="c4d--pictogram-item__pictogram" focusable="false" viewBox="0 0 80 80" height="80" width="80" role="img"> <use href="#get--ahead--of--risk--and--compliance" height="80" width="80"></use> <defs> <linearGradient id="pictogram-color-gradient-180-blue-to-purple" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#8a3ffc"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-dark-to-light" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#78a9ff"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-to-teal" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#08bdba"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-to-magenta" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#ff7eb6"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-red-to-purple" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#fa4d56"/> <stop offset="100%" stop-color="#a56eff"/> </linearGradient> <linearGradient id="pictogram-color-blue-80"> <stop stop-color="#002d9c"/> </linearGradient> <linearGradient id="pictogram-color-blue-80"> <stop stop-color="#002d9c"/> </linearGradient> <linearGradient id="pictogram-color-blue-60"> <stop stop-color="#0f62fe"/> </linearGradient> <linearGradient id="pictogram-color-cyan-50"> <stop stop-color="#1192E8"/> </linearGradient> <linearGradient id="pictogram-color-purple-60"> <stop stop-color="#8A3FFC"/> </linearGradient> <linearGradient id="pictogram-color-green-50"> <stop stop-color="#24a148"/> </linearGradient> <linearGradient id="pictogram-color-teal-50"> <stop stop-color="#009d9a"/> </linearGradient> <linearGradient id="pictogram-color-magenta-50"> <stop stop-color="#EE5396"/> </linearGradient> <linearGradient id="pictogram-color-red-60"> <stop stop-color="#DA1E28"/> </linearGradient> </defs> </svg> <div class="pictogram-svg-source"> <svg xmlns="http://www.w3.org/2000/svg" id="get--ahead--of--risk--and--compliance" viewBox="0 0 32 32"><path d="M25,31.36H7v-0.72h5.657c0.157-1.615,1.367-2.825,2.983-2.982V12.333 c-1.131-0.174-2-1.154-2-2.333s0.869-2.159,2-2.333V4.334L6.876,6.838c2.012,0.595,3.484,2.46,3.484,4.662 c0,2.68-2.18,4.86-4.86,4.86s-4.86-2.18-4.86-4.86c0-2.479,1.866-4.531,4.267-4.824L4.901,6.654l20.999-6 c0.149-0.042,0.321,0.021,0.406,0.155l5,8c0.069,0.111,0.072,0.251,0.009,0.365C31.251,9.289,31.131,9.36,31,9.36H21 c-0.131,0-0.251-0.071-0.314-0.186c-0.063-0.114-0.061-0.254,0.009-0.365l4.504-7.206L16.36,4.129v3.539 c1.131,0.174,2,1.154,2,2.333s-0.869,2.159-2,2.333v15.325c1.616,0.157,2.826,1.367,2.983,2.982H25V31.36z M13.382,30.64h5.236 c-0.166-1.323-1.235-2.28-2.618-2.28C14.618,28.36,13.547,29.317,13.382,30.64z M5.5,7.36c-2.283,0-4.14,1.857-4.14,4.14 s1.857,4.14,4.14,4.14s4.14-1.857,4.14-4.14S7.783,7.36,5.5,7.36z M16,8.36c-0.904,0-1.64,0.736-1.64,1.64s0.736,1.64,1.64,1.64 c0.904,0,1.64-0.736,1.64-1.64S16.904,8.36,16,8.36z M21.649,8.64h8.701L26,1.679L21.649,8.64z"/></svg> </div> <c4d-content-item-heading> Risk reduction </c4d-content-item-heading> <c4d-content-item-paragraph> <div class="cms-richtext " id="rich-text-71ddbf3916" data-dynamic-inner-content="description"> <p>With incident response plans and a system in place, information security measures can help prevent security incidents and cyberattacks such as data breaches and denial of service (DoS) threats.</p> <p>Authentication measures can be enforced to help protect sensitive personal and organizational data, including finances and trade secrets. Disaster recovery plans can be at the ready for faster recovery from security incidents.</p> </div> </c4d-content-item-paragraph> </c4d-content-item> </div> <div class="standalone-title enhanced-title text"> <h2 class="expressive-heading-05 "> Challenges of InfoSec </h2> <a data-title="Challenges of InfoSec" name="Challenges+of+InfoSec"></a> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-58a4bf3198" data-dynamic-inner-content="description"> <p>In addition to direct information security threats, organizations face multiple challenges when building and managing a robust InfoSec strategy and system.</p> <ul><li><strong>Complacency</strong></li><li><strong>Complexity</strong></li><li><strong>Global connections</strong></li><li><strong>Inflexibility</strong></li><li><strong>Third-party integration</strong></li></ul> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Complacency</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-76e8f6eeca" data-dynamic-inner-content="description"> <p>With a new system in place, there might be a tendency to walk away, satisfied that the task is done. But hacking techniques are continually sharpened to keep pace with new security measures. Maintenance and the task of securing data are rarely complete, and constant improvements to security controls are needed.</p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Complexity</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-63fb9e232d" data-dynamic-inner-content="description"> <p>The ever-changing technological environment requires a sophisticated system and an IT team that is thoroughly up to date to manage those evermore complex systems. This includes safely exchanging information with the <a href="https://www.ibm.com/think/topics/internet-of-things" target="_self" rel="noopener noreferrer">Internet of Things (IoT)</a> and all mobile devices.</p> <p>Complexity can be a time drain: some IT teams find their primary effort is in continually reconfiguring and maintaining their security system.</p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Global connections</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-2b7baffc70" data-dynamic-inner-content="description"> <p>Businesses around the world might use different computer systems, have different levels of information security and work under different regulations. All of these make secure global data exchange increasingly difficult.</p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Inflexibility</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-f6f6fba3b3" data-dynamic-inner-content="description"> <p>Locking down all information might halt all business progress. The difficult balance is having a constructive data flow within an organization while keeping the data safe within the organization and using it appropriately.</p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Third-party integration</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-46626dbde1" data-dynamic-inner-content="description"> <p>Depending on their level of security, integrating information systems with a third-party vendor or other business partner might be difficult or create new security risks.</p> </div></div> <div class="footnotes"><div driverLocation="1-4"> <div data-autoid="c4d--content-block" class="cds--content-block"> <div class="cds--grid cds--no-gutter"> <div class="cds--row"> <div class="cds--col-lg-4"> <div data-autoid="c4d--content-block-segmented" class="cds--content-block-segmented"> <h5> Footnotes </h5> </div> </div> <div class="cds--col-lg-12"> <div data-autoid="c4d--content-block-segmented" class="cds--content-block-segmented"> <div class="cms-richtext " id="rich-text-9bbc15f276" data-dynamic-inner-content="description"> <p><sup>1</sup> <a href="https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm" target="_blank" rel="noopener noreferrer"><span class="ibm_icon_launch_external_after">Occupational Outlook Handbook: Information Security Analysts</span></a> , <em>US Bureau of Labor Statistics</em>,17 April 2024.</p> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> <div class="body-article-4 container responsivegrid cds--col"> <div id="body-article-4-201eff8c02" class="cmp-container"> <div class="experiencefragment"> <div id="experiencefragment-2d25be7c30" class="cmp-experiencefragment cmp-experiencefragment--blueprint-cardlistitem-xf"> <div class="xf-content-height"> <div class="root container responsivegrid"> <div id="container-c76e056e7f" class="cmp-container"> <div class="card-list-item card link button"> <c4d-card href="https://www.ibm.com/account/reg/signup?formid=urx-52913" target="_blank" pictogram-placement="top" cta-type="local" aria-label="alt text" data-video-modal-type="media-center" grid-mode="condensed" no-poster="true" data-attribute1="featuredasset"> <c4d-card-eyebrow slot="eyebrow" aria-hidden="true"> Report </c4d-card-eyebrow> <c4d-card-heading role="heading" aria-level="3" slot="heading"> Cost of a Data Breach Report 2024 </c4d-card-heading> <p>Data breach costs have hit a new high. Get essential insights to help your security and IT teams better manage risk and limit potential losses.</p> <c4d-card-footer icon-placement="right" cta-type="local" href="https://www.ibm.com/account/reg/signup?formid=urx-52913" target="_blank" data-video-modal-type="media-center" slot="footer" aria-hidden="true" class="cds--card__footer-icon-size"> <span>Read the report</span> </c4d-card-footer> <span slot="icon" class="ibm_icon_arrowright_local"></span></c4d-card-footer> </c4d-card> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-content-group.lc-b3d9c02d980e6d12bb41b5b3f2fcd5c9-lc.min.js"></script> </div> </div> </div> </div> </div> </div> <div class="article-content-slot"> </div> </div> </div> </div> </c4d-table-of-contents> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-table-of-contents.lc-27e8bdb50740d86329d753e2419f539c-lc.min.js"></script> </div> <div class="body-article-16 container responsivegrid cds--col"><div class="cds--grid"> <div class="cds--row"> <div class="cds--col-lg-16 cds--no-gutter"> <div class="cds--content-section"> <div id="container-02a6e3995d" class="cmp-container"> <div class="experiencefragment"> <div id="experiencefragment-6c16f877cb" class="cmp-experiencefragment cmp-experiencefragment--blueprint-carousel-xf"> <div class="xf-content-height"> <div class="root container responsivegrid"> <div id="container-5a37562383" class="cmp-container"> <div class="carousel"> <div class="cds--grid "> <div class="cds--row"> <div class="cds--col-lg-16 "> <div class="cds--content-block"> <div class="cds--full-width-intro-container"> <div class="intro-section--flex "> <div class="intro-section--heading-wrapper"> <h2 class="expressive-heading-05"> Resources </h2> </div> <div class="intro-section--content-wrapper"> <span> </span> <c4d-link-list type="vertical"> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-cibm-cta.lc-07b5c9e0985171611c73aee4a84443a6-lc.min.js"></script> </c4d-link-list> </div> </div> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-link-list.lc-ce5ae56ac1a30ed4a9ecb09831e0da3d-lc.min.js"></script> </div> <c4d-carousel class=" c4d--carousel--16-col" data-attribute1="resources"> <div class="carousel-item"> <c4d-card href="https://www.ibm.com/account/reg/signup?formid=urx-52506" target="_blank" pictogram-placement="top" cta-type="local" data-video-modal-type="media-center" grid-mode="condensed" no-poster="true"> <c4d-card-eyebrow slot="eyebrow" aria-hidden="true"> Report </c4d-card-eyebrow> <c4d-card-heading role="heading" aria-level="3" slot="heading"> Cybersecurity in the era of generative AI </c4d-card-heading> <p>Learn how to navigate the challenges and tap into the resilience of generative AI in cybersecurity. </p> <c4d-card-footer icon-placement="right" cta-type="local" href="https://www.ibm.com/account/reg/signup?formid=urx-52506" target="_blank" data-video-modal-type="media-center" slot="footer" aria-hidden="true" class="cds--card__footer-icon-size"> <span>Read the report</span> </c4d-card-footer> <span slot="icon" class="ibm_icon_arrowright_local"></span></c4d-card-footer> </c4d-card> </div> <div class="carousel-item"> <c4d-card href="https://www.ibm.com/account/reg/signup?formid=urx-53217" target="_blank" pictogram-placement="top" cta-type="local" data-video-modal-type="media-center" grid-mode="condensed" no-poster="true"> <c4d-card-eyebrow slot="eyebrow" aria-hidden="true"> Report </c4d-card-eyebrow> <c4d-card-heading role="heading" aria-level="3" slot="heading"> IBM® X-Force® Cloud Threat Landscape Report 2024 </c4d-card-heading> <p>Understand the latest threats and strengthen your cloud defenses with the IBM X-Force Cloud Threat Landscape Report.</p> <c4d-card-footer icon-placement="right" cta-type="local" href="https://www.ibm.com/account/reg/signup?formid=urx-53217" target="_blank" data-video-modal-type="media-center" slot="footer" aria-hidden="true" class="cds--card__footer-icon-size"> <span>Read the report</span> </c4d-card-footer> <span slot="icon" class="ibm_icon_arrowright_local"></span></c4d-card-footer> </c4d-card> </div> <div class="carousel-item"> <c4d-card href="https://www.ibm.com/think/topics/data-security" target="_self" pictogram-placement="top" cta-type="local" data-video-modal-type="media-center" grid-mode="condensed" no-poster="true"> <c4d-card-eyebrow slot="eyebrow" aria-hidden="true"> Explainer </c4d-card-eyebrow> <c4d-card-heading role="heading" aria-level="3" slot="heading"> What is data security? </c4d-card-heading> <p>Find out how data security helps protect digital information from unauthorized access, corruption or theft throughout its entire lifecycle.</p> <c4d-card-footer icon-placement="right" cta-type="local" href="https://www.ibm.com/think/topics/data-security" target="_self" data-video-modal-type="media-center" slot="footer" aria-hidden="true" class="cds--card__footer-icon-size"> <span>Read the article</span> </c4d-card-footer> <span slot="icon" class="ibm_icon_arrowright_local"></span></c4d-card-footer> </c4d-card> </div> <div class="carousel-item"> <c4d-card href="https://www.ibm.com/think/topics/cyber-attack" target="_self" pictogram-placement="top" cta-type="local" data-video-modal-type="media-center" grid-mode="condensed" no-poster="true"> <c4d-card-eyebrow slot="eyebrow" aria-hidden="true"> Explainer </c4d-card-eyebrow> <c4d-card-heading role="heading" aria-level="3" slot="heading"> What is a cyberattack? </c4d-card-heading> <p>A cyberattack is an intentional effort to steal, expose, alter, disable or destroy data, applications or other assets through unauthorized access.</p> <c4d-card-footer icon-placement="right" cta-type="local" href="https://www.ibm.com/think/topics/cyber-attack" target="_self" data-video-modal-type="media-center" slot="footer" aria-hidden="true" class="cds--card__footer-icon-size"> <span>Read the article</span> </c4d-card-footer> <span slot="icon" class="ibm_icon_arrowright_local"></span></c4d-card-footer> </c4d-card> </div> <div class="carousel-item"> <c4d-card href="https://www.ibm.com/account/reg/signup?formid=urx-52629" target="_blank" pictogram-placement="top" cta-type="local" data-video-modal-type="media-center" grid-mode="condensed" no-poster="true"> <c4d-card-eyebrow slot="eyebrow" aria-hidden="true"> Report </c4d-card-eyebrow> <c4d-card-heading role="heading" aria-level="3" slot="heading"> IBM X-Force Threat Intelligence Index 2024 </c4d-card-heading> <p>Gain insights to prepare and respond to cyberattacks with greater speed and effectiveness with the IBM X-Force Threat Intelligence Index.</p> <c4d-card-footer icon-placement="right" cta-type="local" href="https://www.ibm.com/account/reg/signup?formid=urx-52629" target="_blank" data-video-modal-type="media-center" slot="footer" aria-hidden="true" class="cds--card__footer-icon-size"> <span>Read the report</span> </c4d-card-footer> <span slot="icon" class="ibm_icon_arrowright_local"></span></c4d-card-footer> </c4d-card> </div> <div class="carousel-item"> <c4d-card href="https://securityintelligence.com/" target="_blank" pictogram-placement="top" cta-type="external" data-video-modal-type="media-center" grid-mode="condensed" no-poster="true"> <c4d-card-eyebrow slot="eyebrow" aria-hidden="true"> Insights </c4d-card-eyebrow> <c4d-card-heading role="heading" aria-level="3" slot="heading"> Security intelligence blog </c4d-card-heading> <p>Stay up to date with the latest trends and news about security.</p> <c4d-card-footer icon-placement="right" cta-type="external" href="https://securityintelligence.com/" target="_blank" data-video-modal-type="media-center" slot="footer" aria-hidden="true" class="cds--card__footer-icon-size"> <span>Read more</span> </c4d-card-footer> <span slot="icon" class="ibm_icon_launch_external"></span></c4d-card-footer> </c4d-card> </div> </c4d-carousel> </div> </div> </div> </div> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-carousel.lc-ea70ef705b7ae8a2f90ffbac22d6e0e9-lc.min.js"></script> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-content-block-cards.lc-092ce8027acac0a3695d25c1ceaaab88-lc.min.js"></script> </div> </div> </div> </div> </div> </div> <div class="experiencefragment"> <div id="experiencefragment-9551192006" class="cmp-experiencefragment cmp-experiencefragment--blueprint-cta-section-xf"> <div class="xf-content-height"> <div class="root container responsivegrid"> <div id="container-8b82872da3" class="cmp-container"> <div class="cta-section"> <a data-title="Related solutions" name="Related+solutions"></a> <c4d-cta-block class=" hide-divider-line title-plus-3-items-layout" data-attribute1="solutions" no-border> <c4d-content-block-heading class=""> Related solutions </c4d-content-block-heading> <c4d-cta-block-item-row no-border> <c4d-cta-block-item class="cds--cta-block-item__pictogram-styling" data-attribute3="1" data-attribute1="solutions"> <svg fill="currentColor" slot="media" class="global--security cds--pictogram-item__pictogram" data-autoid="c4d--pictogram-item__pictogram" focusable="false" viewBox="0 0 80 80" height="80" width="80" role="img"> <use href="#global--security" height="80" width="80"></use> <defs> <linearGradient id="pictogram-color-gradient-180-blue-to-purple" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#8a3ffc"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-dark-to-light" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#78a9ff"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-to-teal" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#08bdba"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-to-magenta" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#ff7eb6"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-red-to-purple" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#fa4d56"/> <stop offset="100%" stop-color="#a56eff"/> </linearGradient> <linearGradient id="pictogram-color-blue-80"> <stop stop-color="#002d9c"/> </linearGradient> <linearGradient id="pictogram-color-blue-80"> <stop stop-color="#002d9c"/> </linearGradient> <linearGradient id="pictogram-color-blue-60"> <stop stop-color="#0f62fe"/> </linearGradient> <linearGradient id="pictogram-color-cyan-50"> <stop stop-color="#1192E8"/> </linearGradient> <linearGradient id="pictogram-color-purple-60"> <stop stop-color="#8A3FFC"/> </linearGradient> <linearGradient id="pictogram-color-green-50"> <stop stop-color="#24a148"/> </linearGradient> <linearGradient id="pictogram-color-teal-50"> <stop stop-color="#009d9a"/> </linearGradient> <linearGradient id="pictogram-color-magenta-50"> <stop stop-color="#EE5396"/> </linearGradient> <linearGradient id="pictogram-color-red-60"> <stop stop-color="#DA1E28"/> </linearGradient> </defs> </svg> <div class="pictogram-svg-source"> <svg xmlns="http://www.w3.org/2000/svg" id="global--security" viewBox="0 0 32 32"><path d="M15.36,16.305c0.459-0.127,0.819-0.486,0.946-0.946H29c0.199,0,0.36-0.161,0.36-0.36 c0-7.918-6.442-14.36-14.36-14.36c-4.647,0-8.986,2.259-11.684,6.041C3.214,6.656,3.109,6.64,3,6.64C2.25,6.64,1.64,7.25,1.64,8 c0,0.361,0.144,0.688,0.374,0.931C1.111,10.855,0.64,12.893,0.64,15c0,7.918,6.442,14.36,14.36,14.36h2v-0.72h-1.64v-6.28H17v-0.72 h-1.64V16.305z M9.305,21.64c-0.153-0.553-0.643-0.963-1.237-0.993c-0.436-1.686-0.669-3.46-0.697-5.287h6.323 c0.127,0.459,0.486,0.819,0.946,0.946v5.334C14.64,21.64,9.305,21.64,9.305,21.64z M6.695,21.64H3.096 c-1.046-1.868-1.658-4.005-1.718-6.28h5.274c0.027,1.879,0.267,3.706,0.714,5.444C7.04,20.978,6.795,21.277,6.695,21.64z M22,8.64 c-0.353,0-0.64-0.287-0.64-0.64S21.647,7.36,22,7.36S22.64,7.647,22.64,8C22.64,8.353,22.353,8.64,22,8.64z M20.694,7.64H15.36 V1.399c2.283,0.196,4.409,2.227,5.784,5.553C20.929,7.128,20.77,7.365,20.694,7.64z M14.64,7.64H8.578 c1.299-3.601,3.519-6.035,6.063-6.248V7.64H14.64z M14.64,8.36v5.335c-0.459,0.127-0.819,0.486-0.946,0.946H7.37 c0.034-2.275,0.376-4.412,0.962-6.28h6.308V8.36z M8,21.36c0.353,0,0.64,0.287,0.64,0.64S8.353,22.64,8,22.64S7.36,22.353,7.36,22 S7.647,21.36,8,21.36z M15,15.64c-0.353,0-0.64-0.287-0.64-0.64s0.287-0.64,0.64-0.64s0.64,0.287,0.64,0.64S15.353,15.64,15,15.64z M15.36,13.695V8.36h5.334c0.153,0.553,0.644,0.963,1.237,0.993c0.436,1.688,0.669,3.462,0.697,5.287h-6.323 C16.178,14.181,15.819,13.822,15.36,13.695z M23.349,14.64c-0.027-1.878-0.268-3.705-0.714-5.445 c0.326-0.174,0.571-0.473,0.671-0.836h3.603c1.046,1.868,1.668,4.005,1.727,6.28h-5.287V14.64z M26.462,7.64h-3.156 c-0.159-0.575-0.681-1-1.306-1c-0.068,0-0.134,0.01-0.2,0.02c-0.916-2.207-2.159-3.885-3.58-4.9 C21.664,2.598,24.594,4.741,26.462,7.64z M11.781,1.75C10.128,2.94,8.75,5.024,7.835,7.64h-3.53 C4.241,7.407,4.121,7.197,3.953,7.032C5.877,4.37,8.656,2.511,11.781,1.75z M3,7.36c0.353,0,0.64,0.287,0.64,0.64S3.353,8.64,3,8.64 S2.36,8.353,2.36,8S2.647,7.36,3,7.36z M2.636,9.304C2.752,9.337,2.873,9.36,3,9.36c0.625,0,1.146-0.425,1.305-1h3.289 c-0.576,1.887-0.911,4.019-0.944,6.28H1.365C1.413,12.791,1.849,11.002,2.636,9.304z M3.534,22.36h3.161 c0.159,0.575,0.681,1,1.305,1c0.068,0,0.134-0.01,0.2-0.02c0.915,2.206,2.158,3.884,3.579,4.899 C8.335,27.401,5.402,25.26,3.534,22.36z M14.64,28.6c-2.283-0.196-4.409-2.227-5.784-5.552c0.214-0.176,0.373-0.413,0.449-0.688 h5.335C14.64,22.36,14.64,28.6,14.64,28.6z M31,22.64h-2.637v-2.637c0-1.854-1.509-3.363-3.363-3.363s-3.363,1.508-3.363,3.363 v2.637H19c-0.199,0-0.36,0.161-0.36,0.36v8c0,0.199,0.161,0.36,0.36,0.36h12c0.199,0,0.36-0.161,0.36-0.36v-8 C31.36,22.801,31.199,22.64,31,22.64z M22.357,20.003c0-1.457,1.186-2.643,2.643-2.643s2.643,1.186,2.643,2.643v2.637h-5.285 L22.357,20.003L22.357,20.003z M30.64,30.64H19.36v-7.28h11.28V30.64z"/></svg> </div> <c4d-content-item-heading> Enterprise security solutions </c4d-content-item-heading> <c4d-content-item-copy> <c4d-content-item-paragraph> <div class="cms-richtext " id="rich-text-c973d34e61" data-dynamic-inner-content="description"> <p>Transform your security program with solutions from the largest enterprise security provider.</p> </div> </c4d-content-item-paragraph> </c4d-content-item-copy> <c4d-text-cta cta-type="local" icon-placement="right" href="https://www.ibm.com/security" target="_self" data-dynamic-properties="{"ctaUrl":"href"}" data-dynamic-inner-content="ctaLabel" slot="footer" data-video-modal-type="media-center">Explore cybersecurity solutions </c4d-text-cta> </c4d-cta-block-item> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-cta-block.lc-e1ab5b8468841f4015cbbfcd7319eab5-lc.min.js"></script> <c4d-cta-block-item class="cds--cta-block-item__pictogram-styling" data-attribute3="2" data-attribute1="solutions"> <svg fill="currentColor" slot="media" class="security--as--a--service cds--pictogram-item__pictogram" data-autoid="c4d--pictogram-item__pictogram" focusable="false" viewBox="0 0 80 80" height="80" width="80" role="img"> <use href="#security--as--a--service" height="80" width="80"></use> <defs> <linearGradient id="pictogram-color-gradient-180-blue-to-purple" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#8a3ffc"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-dark-to-light" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#78a9ff"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-to-teal" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#08bdba"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-to-magenta" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#ff7eb6"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-red-to-purple" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#fa4d56"/> <stop offset="100%" stop-color="#a56eff"/> </linearGradient> <linearGradient id="pictogram-color-blue-80"> <stop stop-color="#002d9c"/> </linearGradient> <linearGradient id="pictogram-color-blue-80"> <stop stop-color="#002d9c"/> </linearGradient> <linearGradient id="pictogram-color-blue-60"> <stop stop-color="#0f62fe"/> </linearGradient> <linearGradient id="pictogram-color-cyan-50"> <stop stop-color="#1192E8"/> </linearGradient> <linearGradient id="pictogram-color-purple-60"> <stop stop-color="#8A3FFC"/> </linearGradient> <linearGradient id="pictogram-color-green-50"> <stop stop-color="#24a148"/> </linearGradient> <linearGradient id="pictogram-color-teal-50"> <stop stop-color="#009d9a"/> </linearGradient> <linearGradient id="pictogram-color-magenta-50"> <stop stop-color="#EE5396"/> </linearGradient> <linearGradient id="pictogram-color-red-60"> <stop stop-color="#DA1E28"/> </linearGradient> </defs> </svg> <div class="pictogram-svg-source"> <svg xmlns="http://www.w3.org/2000/svg" id="security--as--a--service" viewBox="0 0 32 32"><path d="M16,17.36c3.507,0,6.36-2.854,6.36-6.36V3.777L16,0.598l-6.36,3.18V11 C9.64,14.507,12.493,17.36,16,17.36z M10.36,4.223L16,1.402l5.64,2.82v2.195l-5.479-2.739l-0.322,0.644l5.801,2.9v2.195 l-5.479-2.739l-0.322,0.644l5.801,2.9V11c0,0.46-0.062,0.906-0.166,1.334l-5.312-2.656l-0.322,0.644l5.417,2.708 c-0.241,0.621-0.587,1.188-1.019,1.681l-4.076-2.033l-0.321,0.645l3.859,1.926c-0.993,0.863-2.284,1.391-3.7,1.391 c-3.11,0-5.64-2.53-5.64-5.64C10.36,11,10.36,4.223,10.36,4.223z M28.841,20.669l-6.102,6.102c-0.369,0.369-0.857,0.607-1.375,0.672 l-7.197,0.899l-1.913,1.913l-0.509-0.51l2.087-2.087l7.442-0.931c0.359-0.044,0.698-0.21,0.954-0.467l6.102-6.102 c0.411-0.41,0.411-1.079,0-1.491c-0.411-0.411-1.081-0.41-1.49,0.001l-6.344,5.156l-0.004-0.005c-0.406,0.332-0.918,0.54-1.482,0.54 h-5.001V23.64h5.001c0.903,0,1.638-0.734,1.638-1.638c0-0.354-0.287-0.642-0.64-0.642h-7.75c-2.614,0-4.759,2.043-4.885,4.651 L7.368,26.15l-4.114,4.104l-0.509-0.51l3.918-3.909c0.213-2.925,2.644-5.196,5.595-5.196h7.75c0.75,0,1.36,0.61,1.36,1.36 c0,0.071-0.015,0.138-0.021,0.207l5.011-4.072c0.663-0.666,1.79-0.667,2.48,0.024C29.532,18.852,29.531,19.978,28.841,20.669z"/></svg> </div> <c4d-content-item-heading> Cybersecurity services </c4d-content-item-heading> <c4d-content-item-copy> <c4d-content-item-paragraph> <div class="cms-richtext " id="rich-text-b504efe8f2" data-dynamic-inner-content="description"> <p>Transform your business and manage risk with cybersecurity consulting, cloud and managed security services.</p> <ul></ul> </div> </c4d-content-item-paragraph> </c4d-content-item-copy> <c4d-text-cta cta-type="local" icon-placement="right" href="https://www.ibm.com/services/security" target="_self" data-dynamic-properties="{"ctaUrl":"href"}" data-dynamic-inner-content="ctaLabel" slot="footer" data-video-modal-type="media-center">Explore cybersecurity services </c4d-text-cta> </c4d-cta-block-item> <c4d-cta-block-item class="cds--cta-block-item__pictogram-styling" data-attribute3="3" data-attribute1="solutions"> <svg fill="currentColor" slot="media" class="machine--learning--05 cds--pictogram-item__pictogram" data-autoid="c4d--pictogram-item__pictogram" focusable="false" viewBox="0 0 80 80" height="80" width="80" role="img"> <use href="#machine--learning--05" height="80" width="80"></use> <defs> <linearGradient id="pictogram-color-gradient-180-blue-to-purple" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#8a3ffc"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-dark-to-light" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#78a9ff"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-to-teal" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#08bdba"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-to-magenta" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#ff7eb6"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-red-to-purple" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#fa4d56"/> <stop offset="100%" stop-color="#a56eff"/> </linearGradient> <linearGradient id="pictogram-color-blue-80"> <stop stop-color="#002d9c"/> </linearGradient> <linearGradient id="pictogram-color-blue-80"> <stop stop-color="#002d9c"/> </linearGradient> <linearGradient id="pictogram-color-blue-60"> <stop stop-color="#0f62fe"/> </linearGradient> <linearGradient id="pictogram-color-cyan-50"> <stop stop-color="#1192E8"/> </linearGradient> <linearGradient id="pictogram-color-purple-60"> <stop stop-color="#8A3FFC"/> </linearGradient> <linearGradient id="pictogram-color-green-50"> <stop stop-color="#24a148"/> </linearGradient> <linearGradient id="pictogram-color-teal-50"> <stop stop-color="#009d9a"/> </linearGradient> <linearGradient id="pictogram-color-magenta-50"> <stop stop-color="#EE5396"/> </linearGradient> <linearGradient id="pictogram-color-red-60"> <stop stop-color="#DA1E28"/> </linearGradient> </defs> </svg> <div class="pictogram-svg-source"> <svg xmlns="http://www.w3.org/2000/svg" id="machine--learning--05" viewBox="0 0 32 32"><path d="M16,23.36c4.059,0,7.36-3.302,7.36-7.36S20.058,8.64,16,8.64S8.64,11.942,8.64,16 C8.64,20.059,11.942,23.36,16,23.36z M12.36,21.547V20.5c0-1.595,1.034-2.985,2.573-3.461c0.139-0.042,0.238-0.165,0.252-0.309 c0.014-0.145-0.061-0.283-0.188-0.352c-0.701-0.376-1.137-1.096-1.137-1.878c0-1.18,0.96-2.14,2.14-2.14s2.14,0.96,2.14,2.14 c0,0.782-0.436,1.502-1.137,1.878c-0.128,0.069-0.202,0.208-0.188,0.352c0.014,0.145,0.113,0.267,0.252,0.309 c1.539,0.476,2.573,1.866,2.573,3.461v1.047c-1.046,0.689-2.296,1.093-3.64,1.093C14.656,22.64,13.406,22.236,12.36,21.547z M16,9.36c3.661,0,6.64,2.979,6.64,6.64c0,1.992-0.886,3.777-2.279,4.995V20.5c0-1.681-0.956-3.172-2.438-3.895 c0.591-0.535,0.938-1.294,0.938-2.105c0-1.577-1.283-2.86-2.86-2.86s-2.86,1.283-2.86,2.86c0,0.811,0.348,1.57,0.938,2.105 c-1.482,0.723-2.438,2.214-2.438,3.895v0.496C10.246,19.777,9.36,17.992,9.36,16C9.36,12.339,12.339,9.36,16,9.36z M29.5,18.14 c-0.902,0-1.655,0.647-1.824,1.5H25.36v-7.28h2.316c0.168,0.854,0.922,1.5,1.824,1.5c1.025,0,1.86-0.834,1.86-1.86 s-0.835-1.86-1.86-1.86c-0.902,0-1.656,0.646-1.824,1.5H25.36V7c0-0.199-0.161-0.36-0.36-0.36h-4.64V4.323 c0.853-0.168,1.5-0.921,1.5-1.823c0-1.025-0.835-1.86-1.86-1.86s-1.86,0.834-1.86,1.86c0,0.902,0.647,1.655,1.5,1.823V6.64h-7.28 V4.323c0.854-0.168,1.5-0.921,1.5-1.823c0-1.025-0.834-1.86-1.86-1.86s-1.86,0.834-1.86,1.86c0,0.902,0.646,1.655,1.5,1.823V6.64H7 C6.801,6.64,6.64,6.801,6.64,7v4.64H4.323c-0.168-0.854-0.921-1.5-1.823-1.5c-1.025,0-1.86,0.834-1.86,1.86s0.834,1.86,1.86,1.86 c0.902,0,1.655-0.646,1.823-1.5H6.64v7.28H4.323c-0.168-0.853-0.921-1.5-1.823-1.5c-1.025,0-1.86,0.835-1.86,1.86 s0.834,1.86,1.86,1.86c0.902,0,1.655-0.647,1.823-1.5H6.64V25c0,0.199,0.161,0.36,0.36,0.36h4.64v2.316 c-0.854,0.168-1.5,0.922-1.5,1.824c0,1.025,0.834,1.86,1.86,1.86s1.86-0.835,1.86-1.86c0-0.902-0.646-1.656-1.5-1.824V25.36h7.28 v2.316c-0.853,0.169-1.5,0.922-1.5,1.824c0,1.025,0.835,1.86,1.86,1.86s1.86-0.835,1.86-1.86c0-0.902-0.647-1.655-1.5-1.824V25.36 H25c0.199,0,0.36-0.161,0.36-0.36v-4.64h2.316c0.169,0.853,0.922,1.5,1.824,1.5c1.025,0,1.86-0.835,1.86-1.86 S30.525,18.14,29.5,18.14z M29.5,10.86c0.629,0,1.14,0.512,1.14,1.14s-0.511,1.14-1.14,1.14s-1.14-0.512-1.14-1.14 S28.871,10.86,29.5,10.86z M18.86,2.5c0-0.628,0.511-1.14,1.14-1.14s1.14,0.512,1.14,1.14S20.629,3.64,20,3.64 S18.86,3.128,18.86,2.5z M10.86,2.5c0-0.628,0.512-1.14,1.14-1.14s1.14,0.512,1.14,1.14S12.628,3.64,12,3.64S10.86,3.128,10.86,2.5z M2.5,13.14c-0.628,0-1.14-0.512-1.14-1.14s0.512-1.14,1.14-1.14S3.64,11.372,3.64,12S3.128,13.14,2.5,13.14z M2.5,21.14 c-0.628,0-1.14-0.511-1.14-1.14s0.512-1.14,1.14-1.14S3.64,19.371,3.64,20S3.128,21.14,2.5,21.14z M13.14,29.5 c0,0.629-0.512,1.14-1.14,1.14s-1.14-0.511-1.14-1.14s0.512-1.14,1.14-1.14S13.14,28.871,13.14,29.5z M21.14,29.5 c0,0.629-0.511,1.14-1.14,1.14s-1.14-0.511-1.14-1.14s0.511-1.14,1.14-1.14S21.14,28.871,21.14,29.5z M24.64,24.64H7.36V7.36h17.28 C24.64,7.36,24.64,24.64,24.64,24.64z M29.5,21.14c-0.629,0-1.14-0.511-1.14-1.14s0.511-1.14,1.14-1.14s1.14,0.511,1.14,1.14 S30.129,21.14,29.5,21.14z"/></svg> </div> <c4d-content-item-heading> Artificial intelligence (AI) cybersecurity </c4d-content-item-heading> <c4d-content-item-copy> <c4d-content-item-paragraph> <div class="cms-richtext " id="rich-text-b09ceb7637" data-dynamic-inner-content="description"> <p>Improve the speed, accuracy and productivity of security teams with AI-powered cybersecurity solutions.</p> </div> </c4d-content-item-paragraph> </c4d-content-item-copy> <c4d-text-cta cta-type="local" icon-placement="right" href="https://www.ibm.com/ai-cybersecurity" target="_self" data-dynamic-properties="{"ctaUrl":"href"}" data-dynamic-inner-content="ctaLabel" slot="footer" data-video-modal-type="media-center">Explore AI cybersecurity </c4d-text-cta> </c4d-cta-block-item> </c4d-cta-block-item-row> </c4d-cta-block> </div> </div> </div> </div> </div> </div> <div class="experiencefragment"> <div id="experiencefragment-1c000b4204" class="cmp-experiencefragment cmp-experiencefragment--blueprint-next-steps-xf"> <div class="xf-content-height"> <div class="root container responsivegrid"> <div id="container-5a43dd4a6a" class="cmp-container"> <div class="next-steps-container"> <div data-cmp-is="next-steps-container" class="cds--next-steps-container"> <div class="cds--cta-section--g10 cds--cta-section--theme" data-dynamic-content-type="ADOBE_TARGET" data-component-name="next-steps" data-component-identifier="next-steps"> <c4d-cta-block no-border class=" cta-block-section__container" data-attribute1="next-steps"> <div role="heading" data-autoid="c4d--content-block__heading" class="cds--content-block__heading" slot="heading"> <a data-title="Take the next step" name="Take+the+next+step"></a> <span class="enhanced-title ">Take the next step</span> </div> <c4d-content-block-copy size="sm"> <c4d-content-block-paragraph> <div class="cms-richtext " id="rich-text-40f43bc57e" data-dynamic-inner-content="description"> <p>Whether you need data security, endpoint management or identity and access management (IAM) solutions, our experts are ready to work with you to achieve a strong security posture. Transform your business and manage risk with a global industry leader in cybersecurity consulting, cloud and managed security services.</p> </div> </c4d-content-block-paragraph> </c4d-content-block-copy> <c4d-button-group slot="action"> <c4d-button-group-item href="https://www.ibm.com/security" target="_self" kind="primary" cta-type="local" data-video-modal-type="media-center" data-attribute1="next-steps" data-attribute3="1"> <span>Explore cybersecurity solutions</span> </c4d-button-group-item> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-button.lc-1ccc2c97318fe420b50ea01d3c14131b-lc.min.js"></script> <c4d-button-group-item href="https://www.ibm.com/services/security" target="_self" kind="tertiary" cta-type="local" data-video-modal-type="media-center" data-attribute1="next-steps" data-attribute3="2"> <span>Discover cybersecurity services</span> </c4d-button-group-item> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-button-group.lc-a07b371b9ce77ba4e90d41ec991c54f1-lc.min.js"></script> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-content-item.lc-dbe860c1c5c0fbefec2a0ef9a23b6898-lc.min.js"></script> </c4d-button-group> </c4d-cta-block> </div> </div> </div> </div> </div> </div> </div> </div> <div class="article-content-slot"> </div> </div> </div> </div> </div> </div></div> <div class="footer"> <c4d-footer-container data-cmp-is="footer" data-autoid="c4d--footer" class="cmp-footer" data-children-count="0" size="2"></c4d-footer-container> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-footer.lc-45bec0d59ca7dce5f95bf1b1d1cca838-lc.min.js"></script> </div> </div> </div> </c4d-video-cta-container> <div class="video-modal-overlay" aria-hidden="true"> <div class="video-modal-overlay__dialog"> <div class="video-modal-overlay__dialog--body"> <div class="video-modal-overlay__dialog--body__close-btn"> <svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"> <rect width="24" height="24" fill="white" fill-opacity="0.01" style="mix-blend-mode:multiply"/> <path id="Vector" d="M13.0606 12L19.5 5.56058L18.4394 4.5L12 10.9394L5.56072 4.5L4.5 5.56058L10.9394 12L4.5 18.4394L5.56072 19.5L12 13.0606L18.4394 19.5L19.5 18.4394L13.0606 12Z" fill="#161616"/> </svg> </div> <div class="video-modal-overlay__dialog--body-content"> <div class="video-modal-overlay__loading-container"> <cds-loading></cds-loading> </div> <div class="video-wms hide"> <iframe class="video-modal-content" data-original-src="https://video.ibm.com/embed/$[wmsChanneId]?volume=0&autoplay=true&controls=true" src="" webkitallowfullscreen allowfullscreen frameborder="no" referrerpolicy="no-referrer-when-downgrade"></iframe> </div> <div class="video-media-center hide"> <c4d-video-player-container video-id="" aspect-ratio="16x9" auto-play muted playing-mode="inline"></c4d-video-player-container> </div> </div> </div> </div> </div> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-cweb-loading.lc-ca618eb7785b83e9cfb87f1d1683e7cd-lc.min.js"></script> <c4d-lightbox-video-player-container></c4d-lightbox-video-player-container> <script src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-idlBundle.lc-f720c930f09453060e1c386a0ad5a4d8-lc.min.js"></script> <script src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-base.lc-18f193433bf96d7320eee136848e463b-lc.min.js"></script> <script src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-idlStyles.lc-dab35e76d7c2b5a874f52caeb87bf57c-lc.min.js"></script> <script src="/etc.clientlibs/adobe-cms/components/poc/ibm-image-dm/clientlibs/site.lc-96f41d35e09f648917c6d3f54d19b8c1-lc.min.js"></script> <script src="https://www.ibm.com/common/digitaladvisor/cm-app/latest/cm-app.min.js" defer async></script> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-cweb-code-snippet.lc-d1f19e3766d5ef4bb40f94c6a51b5bbf-lc.min.js"></script> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-pdfviewer.lc-e4412705ab74ab8b0e2e21371e0762c9-lc.min.js"></script> <!-- Added for Adobe analytics implementation ADCMS-5834 <script type="text/javascript"> adobeDataLayer.push({ "event": "linkClick", "web": { "webPageDetails": { "URL": document.URL, "name": "home" }, "webInteraction": { "linkClick":"event", "value":"1", "type": "other", "URL": document.URL, "name": "linkClick: " + document.URL } }, }) </script> !--> <!-- Added for Adobe analytics implementation ADCMS-5834 & ADCMS-6152 !--> <script type="text/javascript"> document.addEventListener("DOMContentLoaded", function() { var templatePath = "\/conf\/adobe\u002Dcms\u002Deditable\/settings\/wcm\/templates\/article"; var templateName = templatePath.split('/').pop(); const currentUrl = document.URL; const [baseUrl, queryString] = currentUrl.split('?'); const urlWithoutProtocolAndDomain = baseUrl.replace(/^https?:\/\/[^\/]+\//, ''); const segments = urlWithoutProtocolAndDomain.split('/').filter(segment => segment); const localePattern = /^[a-z]{2}-[a-z]{2}$/; const cleanedSegments = segments.filter(segment => !localePattern.test(segment)); const firstSegment = cleanedSegments[0] || ""; const secondSegment = cleanedSegments[1] || ""; const thirdSegment = cleanedSegments[2] || ""; if (currentUrl.includes("/products")) { callProductPageLoadEvent(); } function callProductPageLoadEvent(){ adobeDataLayer.push({ "event": "productPageLoad", "commerce": { "productViews": { "value": 1 } }, "productListItems": { "name": secondSegment, "productCategories": { "categoryName": thirdSegment } }, "web": { "webPageDetails": { "URL": document.URL, "name": "Information Security", "siteSection": firstSegment }, "webReferrer": { "URL": document.referrer } } }); } function getCookieByName(name) { const cookieArr = document.cookie.split(';'); for (let i = 0; i < cookieArr.length; i++) { const cookie = cookieArr[i].trim(); if (cookie.startsWith(name + "=")) { return cookie.substring(name.length + 1); } } return null; } function cleanUrl(url) { let modifiedUrl = url; if (modifiedUrl.startsWith("www")) { modifiedUrl = modifiedUrl.replace(/^www\.?/, ""); } return modifiedUrl; } function getVisitDepth() { let pageVisitCount = sessionStorage.getItem('pageVisitCount'); pageVisitCount = pageVisitCount ? parseInt(pageVisitCount, 10) : 0; pageVisitCount++; sessionStorage.setItem('pageVisitCount', pageVisitCount); return pageVisitCount; } function getAmPm() { const date = new Date(); const hours = date.getHours(); return hours >= 12 ? "PM" : "AM"; } function getCurrentDay() { const date = new Date(); return new Intl.DateTimeFormat('en-US', { weekday: 'long' }).format(date); } function getDayOfMonth() { const date = new Date(); return date.getDate(); } function getDayOfWeekAsInteger() { const date = new Date(); return date.getDay(); } function getDayOfYear() { const date = new Date(); const startOfYear = new Date(date.getFullYear(), 0, 1); const diffInMillis = date - startOfYear; const dayOfYear = Math.floor(diffInMillis / (1000 * 60 * 60 * 24)) + 1; return dayOfYear; } function getCurrentHour() { var currentHour = new Date().getHours(); var formattedHour = (currentHour === 0 ? 24 : currentHour); return formattedHour + ":00"; } function getCurrentHourInADay() { const date = new Date(); let hours = date.getHours(); const period = hours >= 12 ? "PM" : "AM"; hours = hours % 12 || 12; return hours +":00" +" " + period; } function getCurrentMinute() { const date = new Date(); return date.getMinutes(); } function getCurrentMonth() { const date = new Date(); return date.getMonth() + 1; } function printCurrentMonthName() { const months = ["January", "February", "March", "April", "May", "June", "July", "August", "September", "October", "November", "December"]; const date = new Date(); const monthName = months[date.getMonth()]; return monthName; } function getQuarter(date = new Date()) { var year = date.getFullYear(); var quarters = [ { start: "Jan", end: "Mar" }, { start: "Apr", end: "Jun" }, { start: "Jul", end: "Sep" }, { start: "Oct", end: "Dec" } ]; var quarterIndex = Math.floor(date.getMonth() / 3); var start = quarters[quarterIndex].start; var end = quarters[quarterIndex].end; return start + " " + year + " - " + end + " " + year; } function getCurrentQuarter() { const date = new Date(); const month = date.getMonth(); const quarter = Math.floor(month / 3) + 1; return quarter; } function getCurrentWeek() { const date = new Date(); const startOfYear = new Date(date.getFullYear(), 0, 1); const diff = date - startOfYear; const oneWeekInMillis = 1000 * 60 * 60 * 24 * 7; const weekNumber = Math.ceil(diff / oneWeekInMillis); return weekNumber; } function getDayType() { const date = new Date(); const dayOfWeek = date.getDay(); if (dayOfWeek === 0 || dayOfWeek === 6) { return "Weekend"; } else { return "Weekday"; } } function getCurrentYear() { const date = new Date(); return date.getFullYear(); } function generateUtCodesObject() { const utCodesMeta = document.querySelector('meta[name="ut-codes"]'); const utCodesIdMeta = document.querySelector('meta[name="ut-codes-id"]'); if (utCodesMeta && utCodesIdMeta) { const utCodesContent = utCodesMeta.getAttribute('content'); const utCodesIdContent = utCodesIdMeta.getAttribute('content'); const utCodesArray = utCodesContent.split(" > "); const utCodesIdArray = utCodesIdContent.split(" > "); let utCodes = {}; utCodesArray.forEach((code, index) => { const firstTwoLetters = code.substring(0, 2); let prefix = ''; switch (firstTwoLetters) { case '10': prefix = 'BusinessUnit'; break; case '15': prefix = 'LineOfBusiness'; break; case '17': prefix = 'Market'; break; case '20': prefix = 'OfferingPortfolio'; break; case '30': prefix = 'Offering'; break; default: prefix = 'Unknown'; } const codeKey = 'ut' + firstTwoLetters + prefix; const codeName = code + ':' + (utCodesIdArray[index] || ""); utCodes[codeKey] = codeName; }); return utCodes; } return {}; } function isFirstPageVisited() { const domainKey = 'firstPageVisited_' + window.location.hostname; if (!localStorage.getItem(domainKey)) { localStorage.setItem(domainKey, 'true'); return true; } return false; } window.addEventListener('unload', () => { localStorage.clear(); }); function getQueryParamWithKey(paramName) { const urlObj = new URL(window.location.href); const value = urlObj.searchParams.get(paramName); if (urlObj.searchParams.has(paramName)) { return paramName + '=' + value; } return ''; } const cisSessionId = getCookieByName("CISSESSIONIDP07A"); let loginStatus = cisSessionId ? "logged in" : "logged out"; const utCodes = generateUtCodesObject(); adobeDataLayer.push({ "event": "pageLoad", "_ibm": { "page": { utCodes: utCodes, "firstPageFlag": isFirstPageVisited(), "internalCampaign": getQueryParamWithKey("intcmp"), "siteSection2": secondSegment, "siteSection3": thirdSegment, "pageType": templateName, "domain": cleanUrl(window.location.host), "siteLanguage": "en", "pageName": cleanUrl(window.location.host) + " | " + templateName + " | Information Security", "siteCountry": "us" }, "user": { "userAgent": navigator.userAgent, "loginStatus": loginStatus }, "siteActivity": { "visitDepth": getVisitDepth() }, "timeParting": { "t_AmPM": getAmPm(), "t_Day": getCurrentDay(), "t_DayOfMonth": getDayOfMonth(), "t_DayOfWeek": getDayOfWeekAsInteger(), "t_DayOfYear": getDayOfYear(), "t_Hour": getCurrentHour(), "t_HourOfDay": getCurrentHourInADay(), "t_Minute": getCurrentMinute(), "t_Month": getCurrentMonth(), "t_MonthOfYear": printCurrentMonthName(), "t_Quarter": getQuarter(date = new Date()), "t_QuarterOfYear": getCurrentQuarter(), "t_Week": getCurrentWeek(), "t_Weekday_Weekend": getDayType(), "t_Year": getCurrentYear() } }, "web": { "webPageDetails": { "pageViews": { "value": 1 }, "URL": document.URL, "name": "Information Security", "siteSection": firstSegment }, "webReferrer": { "URL": document.referrer } } }); document.addEventListener('click', function(event) { if (event.target.closest('.WACLauncher__ButtonContainer')) { handleClick(event); } }); function handleClick(event) { adobeDataLayer.push({ "event": "contactLoad", "_ibm": { "contact": { "contactBotClick": { "value": 1 }, "contactExperienceType": "Support or Sales", "contactLanguage": "en", "contactCountry": "us" }, "click": { "linkTileNumber": 1 } }, "web": { "webPageDetails": { "URL": document.URL, "name": "Information Security" }, "webInteraction": { "name": "contactLoad", "URL": document.URL, "type": "other" } } }); } const legalNavItems = document.getElementsByTagName('c4d-legal-nav-item'); for (let item of legalNavItems) { const hrefValue = item.getAttribute('href'); if (hrefValue && hrefValue.includes('/contact')) { item.addEventListener('click', function(event) { handleClick(event); }); } } const mastheadItems = document.getElementsByTagName('c4d-masthead-contact'); for (let item of mastheadItems) { if (item.getAttribute('data-ibm-contact') === 'contact-link') { item.addEventListener('click', function(event) { handleClick(event); }); } } }); </script> <script type="text/javascript" src="/_PmBm/B/SB/vOol/MPkgtmUd/5rmOQhSJmhbrpi/PVQiZgE/c0tVa3hx/OjMB"></script><link rel="stylesheet" type="text/css" href="/_PmBm/B/SB/vOol/MPkgtmUd/D2mO/Q0x8ZQE/PhQrFy87/KhpZ"><script src="/_PmBm/B/SB/vOol/MPkgtmUd/D2mO/Q0x8ZQE/MQtZDyZk/B0cp" async defer></script><div id="sec-overlay" style="display:none;"><div id="sec-container"></div></div></body> </html>