IBM Focuses On Endpoint Security

After purchasing BigFix last July, IBM has announced that it is integrating the functionality of BigFix into Tivoli Endpoint Manager, which will let users manage the security and compliance of servers, desktops, roaming laptops and point-of-sale devices such as ATMs and self-service kiosks. The company also said that it would be working with Juniper Networks to help develop joint security services for mobile devices, such as those running Apple's iOS, Android, Symbian, Blackberry and Windows ope

February 16, 2011

3 Min Read
NetworkComputing logo in a gray background | NetworkComputing

After purchasing BigFix last July, IBM has announced that it is integrating the functionality of BigFix into Tivoli Endpoint Manager, which will let users manage the security and compliance of servers, desktops, roaming laptops and point-of-sale devices such as ATMs and self-service kiosks. The company also said that it would be working with Juniper Networks to help develop joint security services for mobile devices, such as those running Apple's iOS, Android, Symbian, Blackberry and Windows operating systems. IBM is also researching management support for devices such as smart meters.

IBM is doing this because of the rapid growth of such devices in the market and concern about their security, says Marc van Zadelhoff, worldwide director of strategy for IBM security solutions. By 2015, IBM expects 1 trillion mobile devices and 300 million smart meters, he says. IBM also quoted IDC statistics predicting that the endpoint security market will increase at a compound annual growth rate of 8.3 percent and reach nearly $10 billion in 2014.

Tivoli Endpoint Manager combines endpoint and security management and lets users see and manage both physical and virtual endpoints. It can also identify which devices are not in compliance with corporate IT policies, and recommend security fixes and software updates.

The product supports functionality such as the ability to provision data security, set up virtual private networks and perform encryption, van Zadelhoff says. The Tivoli Endpoint Manager product is a software platform, while the collaboration with Juniper will eventually extend the software platform to Android and other devices, van Zadelhoff says.

Until then, device functionality such as VPN, firewall, data security, protection from Internet attacks and policy-based enforcement will be provided via the cloud through the Juniper Networks Junos Pulse Mobile Security Suite. IBM is also working on similar capabilities such as remotely setting policies, monitoring employee devices to identity data compromises, and erasing data from devices should they become lost or stolen.Support for other devices, such as smart meters, is not yet supported either as software or via a service, but it is under development to provide the ability to, for example, secure a meter remotely and ensure that it is tamper-proof, IBM says. "BigFix has a highly flexible architecture that's message-driven, so client-side functionality can be repurposed in virtually any way that Bigfix 'fixlet' messages can be crafted," says Scott Crawford, managing research director for Enterprise Management Associates. The Juniper partnership is interesting because of the synergies between the two companies--they both focus on the data center and both needed to expand their portfolio for endpoints and mobile, he says.

As far as the research and development aspect, IBM is likely looking at how best to adapt existing assets to the constraints of less traditional endpoints, including point-of-sale devices and smart meters.  While there are advantages to using something as well-established as SNMP, there are also concerns about its size and security, Crawford says.

Tivoli Endpoint Manager is available now for $96 per desktop and $110 per processor core. It is also available as a subscription model, for $39 per desktop per year and $40 per processor core per year. The software supports up to 500,000 machines at once.

See more on this topic by subscribing to Network Computing Pro Reports Four Ways to Lower Mobility Risk (subscription required).

SUBSCRIBE TO OUR NEWSLETTER
Stay informed! Sign up to get expert advice and insight delivered direct to your inbox

You May Also Like


More Insights