There have been some high profile cases recently regarding hacking into a company’s databases to recover sensitive user data such as credit card information or social security numbers. Although not nearly as sensitive as those items, user security has come under much scrutiny from internal company security teams as one way to reduce the incidence of security breaches from both internal and, sometimes, external sources.
IBM PureFlex System has upped the ante on security in the enterprise arena. Building upon the legacy of security first introduced in IBM BladeCenter AMM and System x IMM devices, IBM PureFlex System increases the methods available to manage your users and their associated permissions.
Whereas we used to allow corporations and companies the option to use LDAP (or Active Directory, or AD) security to manage user accounts, LDAP functionality is now the center point of the PureFlex System security model. In addition to LDAP security, we also now prevent insecure protocols and ports from remaining operational and open, further strengthening the methods used to prevent unwanted intrusions.
All of our Integrated Technology Element (ITE, nodes) login methods (through the IMMv2) now communicate with and are controlled by the integrated Chassis Management Module (CMM) and IBM Flex Systems Manager (FSM) modules, depending on whether the FSM is installed and controlling nodes. No user intervention is necessary to make sure that any existing or any new nodes that are added after configuration have the full complement of security options available and working from the moment of installation, and all user accounts are also shared to make sure that no single node becomes the weak link the security chain.
As part of IBM’s new Trusted Computing Base (TCB), which was developed in conjunction with Microsoft, Red Hat, VMware, and others allows for top to bottom security from the hardware down to the OS level. This will be critically important as corporations begin to see the inherent benefit to public/private cloud architectures to better serve not only their employees but the customers they serve too.
Intel’s Trusted eXecution Technology (TXT) used in conjunction with IBM’s Trusted Platform Technology will make sure that the next target in the hacker’s sights, the firmware and microcode that controls the underlying subsystems in all compute nodes, will be protected from tampering and malicious abuse through software specific injection methods. This will ensure that the platform that you build your applications on will continue to be safe and secure even if it is exposed to the public side of the corporation’s cloud either intentionally or by accident.
When all of these improvements in overall security are used together, IBM PureFlex System platform becomes the clear leader for corporations that are looking to ensure that their entire computing platform is protected from brute force, code injection, and social engineering attacks. IBM PureFlex System helps make sure that your information is highly protected and the chances of it falling into the wrong hands is greatly minimized.
IBM PureFlex System is leading the way in a new paradigm of trusted computing platforms that are easy to use, easy to configure and easy to manage.
In a commissioned study, Forrester Consulting describes how the adoption of integrated systems, prompts IT leaders to converge technical roles and adopt new processes for faster solution delivery. Learn how integrated systems can help you deliver solutions faster in this Forrester Consulting Study.