Click here to close now.




















Welcome!

News Feed Item

IBM acquires CrossIdeas to Expand Security Offerings with Identity Intelligence

Business-driven Governance and Analytics Capabilities Bring Greater Control for Securing Enterprises

ARMONK, N.Y. and ROME, July 31, 2014 /PRNewswire/ -- IBM (NYSE: IBM) today announced it has acquired CrossIdeas, a privately held provider of security software that governs user access to applications and data across on-premise and cloud environments. Financial terms were not disclosed.

IBM Corporation logo.

Under the burden of more government regulations and increasing sophistication of security threats, business leaders are demanding that IT and security executives implement access governance policies and solutions that provide visibility into operational and IT risks. Based in Rome, Italy, CrossIdeas helps organizations seamlessly manage identities and application access by bridging the gap between compliance, business, and IT infrastructure to help reduce the risk of fraud, conflicts of duties, and human error in business processes. 

The acquisition of CrossIdeas extends IBM's leadership in delivering innovation, services and software for securing enterprises. IBM has now made more than a dozen acquisitions in security over the past decade and invested extensively in dedicated research and development in the security space. This blend of organic innovation and acquired technologies is helping IBM customers defend against advanced threats and manage risk in an era of unprecedented technology change.

"The addition of CrossIdeas extends IBM's market share leading[1] portfolio of identity and access management capabilities," said Brendan Hannigan, General Manager, IBM Security Systems. "IBM can now provide enterprises with enhanced governance capabilities and transparency into risk from the factory floor to the board room, giving leaders the insight they need to protect their brand and customers."

As part of IBM's Identity and Access Management portfolio, CrossIdeas will deliver next generation identity and access governance capabilities to help mitigate access risks and segregation of duty violations. The combined business-driven approach provides integrated governance and full lifecycle management of a user's time with an organization. 

For example, a stock trader working in a financial institution may be promoted and given access to approve trades in a new system while retaining access to enter trades in the previous system. This dual access may constitute a segregation of duties violation, which could expose the institution to failing a compliance requirement. With CrossIdeas' technology, auditors and managers could detect and remediate the segregation of duties violation before it becomes a security risk and audit exposure.

"CrossIdeas is very excited to become part of IBM through this acquisition," said Alberto Ocello, Chief Executive Officer at CrossIdeas. "The innovative technology of CrossIdeas' IDEAS solution strongly complements IBM's Identity and Access Management portfolio and we are proud to contribute to IBM's worldwide expansion in the IT security market."

CrossIdeas addresses the business requirements of auditors and risk and compliance managers with innovative role analytics, intuitive visualizations for better insight into user access, and alignment with compliance and access risk requirements. This Identity Intelligence is delivered via centralized compliance dashboards for auditors to evaluate access risk and activity-based segregation of duties across enterprise-wide applications.  These dashboards are populated using a broad array of identity and access repositories including IBM Security Identity Manager.

Integrating CrossIdeas' innovative business-driven governance capabilities with IBM's Security portfolio will be expedited by the two companies' existing relationship.  By its participation in the Ready for IBM Security Intelligence program, CrossIdeas already allows IBM customers to deploy integrated access governance and user lifecycle management technologies leveraging IBM's Security Identity Management (ISIM) portfolio. This integration will help ISIM customers rapidly introduce access governance capabilities with minimal changes to their existing environment.

About IBM Security
IBM's security portfolio provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. IBM operates one of the world's broadest security research and development, and delivery organizations. IBM monitors 15 billion security events per day in more than 130 countries and holds more than 3,000 security patents.

For more information, please visit www.ibm.com/security, follow @IBMSecurity on Twitter or visit the IBM Security Intelligence blog.

About CrossIdeas
Founded in 2011, CrossIdeas provides Identity and Access Governance solutions to help enable organizations achieve their compliance, audit and access risk management objectives. Leveraging CrossIdeas' innovative technology and flexible service model, organizations can strengthen their risk awareness and IT security. CrossIdeas is headquartered in Rome, Italy and can be reached at www.CrossIdeas.com.

Contact

Michael Rowinski
IBM Media Relations
1 (720) 395-8497
[email protected]

Alessandro Ferrari
External Relations Manger, IBM Italy 
+39-0259624690 
[email protected]

[1] IDC: W o r l d w i d e  I d e n t i t y  a n d  A c c e s s  M a n a g e m e n t  2 0 1 2
V e n d o r S h a r e s; June 2013, IDC #241382, Volume: 1

Logo - http://photos.prnewswire.com/prnh/20090416/IBMLOGO

SOURCE IBM

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
In their Live Hack” presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, will provide the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems. This “Live Hack” uses open source attack tools that are free and available for download by anybody. Attendees will learn where to find and how to operate these tools for the purpose of testing their own IT infrastructu...
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
It’s been proven time and time again that in tech, diversity drives greater innovation, better team productivity and greater profits and market share. So what can we do in our DevOps teams to embrace diversity and help transform the culture of development and operations into a true “DevOps” team? In her session at DevOps Summit, Stefana Muller, Director, Product Management – Continuous Delivery at CA Technologies, answered that question citing examples, showing how to create opportunities for ...
Whether you like it or not, DevOps is on track for a remarkable alliance with security. The SEC didn’t approve the merger. And your boss hasn’t heard anything about it. Yet, this unruly triumvirate will soon dominate and deliver DevSecOps faster, cheaper, better, and on an unprecedented scale. In his session at DevOps Summit, Frank Bunger, VP of Customer Success at ScriptRock, will discuss how this cathartic moment will propel the DevOps movement from such stuff as dreams are made on to a prac...
SYS-CON Events announced today that IceWarp will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. IceWarp, the leader of cloud and on-premise messaging, delivers secured email, chat, documents, conferencing and collaboration to today's mobile workforce, all in one unified interface
With the proliferation of connected devices underpinning new Internet of Things systems, Brandon Schulz, Director of Luxoft IoT – Retail, will be looking at the transformation of the retail customer experience in brick and mortar stores in his session at @ThingsExpo. Questions he will address include: Will beacons drop to the wayside like QR codes, or be a proximity-based profit driver? How will the customer experience change in stores of all types when everything can be instrumented and a...
Red Hat is investing in Tesora, the number one contributor to OpenStack Trove Database as a Service (DBaaS) also ranked among the top 20 companies contributing to OpenStack overall. Tesora, the company bringing OpenStack Trove Database as a Service (DBaaS) to the enterprise, has announced that Red Hat and others have invested in the company as a part of Tesora's latest funding round. The funding agreement expands on the ongoing collaboration between Tesora and Red Hat, which dates back to Febr...
The Internet of Things (IoT) is about the digitization of physical assets including sensors, devices, machines, gateways, and the network. It creates possibilities for significant value creation and new revenue generating business models via data democratization and ubiquitous analytics across IoT networks. The explosion of data in all forms in IoT requires a more robust and broader lens in order to enable smarter timely actions and better outcomes. Business operations become the key driver of I...
SYS-CON Events announced today that DataClear Inc. will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The DataClear ‘BlackBox’ is the only solution that moves your PC, browsing and data out of the United States and away from prying (and spying) eyes. Its solution automatically builds you a clean, on-demand, virus free, new virtual cloud based PC outside of the United States, and wipes it clean...
Culture is the most important ingredient of DevOps. The challenge for most organizations is defining and communicating a vision of beneficial DevOps culture for their organizations, and then facilitating the changes needed to achieve that. Often this comes down to an ability to provide true leadership. As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership ab...
A producer of the first smartphones and tablets, presenter Lee M. Williams will talk about how he is now applying his experience in mobile technology to the design and development of the next generation of Environmental and Sustainability Services at ETwater. In his session at @ThingsExpo, Lee Williams, COO of ETwater, will talk about how he is now applying his experience in mobile technology to the design and development of the next generation of Environmental and Sustainability Services at ET...
Cloud and datacenter migration innovator AppZero has joined the Microsoft Enterprise Cloud Alliance Program. AppZero is a fast, flexible way to move Windows Server applications from any source machine – physical or virtual – to any destination server, in any cloud or datacenter, using its patented container technology. AppZero’s container is also called a Virtual Application Appliance (VAA). To facilitate Microsoft Azure onboarding, AppZero has two purpose-built offerings: AppZero SP for Azure,...
WSM International, the pioneer and leader in server migration services, has announced an agreement with WHOA.com, a leader in providing secure public, private and hybrid cloud computing services. Under terms of the agreement, WSM will provide migration services to WHOA.com customers to relocate some or all of their applications, digital assets, and other computing workloads to WHOA.com enterprise-class, secure cloud infrastructure. The migration services include detailed evaluation and planning...
This Enterprise Strategy Group lab validation report of the NEC Express5800/R320 server with Intel® Xeon® processor presents the benefits of 99.999% uptime NEC fault-tolerant servers that lower overall virtualized server total cost of ownership. This report also includes survey data on the significant costs associated with system outages impacting enterprise and web applications. Click Here to Download Report Now!
IBM’s Blue Box Cloud, powered by OpenStack, is now available in any of IBM’s globally integrated cloud data centers running SoftLayer infrastructure. Less than 90 days after its acquisition of Blue Box, IBM has integrated its Blue Box Cloud Dedicated private-cloud-as-a-service into its broader portfolio of OpenStack® based solutions. The announcement, made today at the OpenStack Silicon Valley event, further highlights IBM’s continued support to deliver OpenStack solutions across all cloud depl...