Part 3: Corporate Security Mission Strategy
Security is a hot topic. It grabs the headlines. Lots of
market research has been done and there are many views of the
information security market, yet by any measure the market is
poised for substantial growth. The information security
opportunity is projected by IDC to grow from $4.5b in 1996 to
$13.5b in 2000, with a 31% CAGR.
Security is the enabler to e-business. IBM, along with its
business partners has security solutions to help companies
conduct business securely. IBM is serious about security and has
a strategy to create a mindshare that IBM means I/T security.
IBM has decades of experience designing and implementing
security systems around the world. Our customers want their
business systems to be secure. They want products and services
based on open standards. They want an effective security
management system and they want access to experienced
professionals for advice and assistance in implementing security
products and services.
Currently, no company can claim the depth
and breadth of security offerings that IBM can, making security
one of the biggest differentiators for the IBM brand. Many of
these focus areas, because they are "for the greater
good" of IBM and not justifiable from within one division's
budget alone, suffered significant budget cuts in 1997-1998.
This adversely impacted our ability to capture mind and market
share as competitors have strengthened their positions by
filling out their own security value nets through partnerships,
mergers and acquisitions. The SecureWay brand pulls the many
aspects of security within the IBM company together. Current
work underway to define security suites will further enable us
to compete in this space.
IBM offers the industry's most extensive and comprehensive
portfolio of security products, solutions and services under the
umbrella of the SecureWay brand. The offerings come from all the
divisions within IBM. The SecureWay brand is currently the
security rallying point for go-to-market execution with work
underway to redefine the brand and create a series of security
suites.
End to end security covers access from the end users desktop
to backend systems. To get there you often go through other
networks, the Internet, servers etc. A security breakage can
occur at any point. Security is only as strong as your weakest
link, that is why we believe it is important to address all
aspects of computer security and why IBM is well positioned to
be a leader in this area. Because security is so comprehensive
and our customers are not security experts we must offer
solutions that are understandable, usable and useful .. or they
won't use them. Our customers expect IBM to provide leadership
technologies to help make them leaders in their field.
Security drives significant revenue and profit for IBM
throughout the strategic horizon. Revenue is generated through
uniquely identifiable security offerings (direct) and through
products whose sale is contingent on other IBM security
offerings (indirect).
Our strategy provides for this by grouping our offerings by
I/T Security Consulting/Services, Technologies and Products and
Solutions.
Consulting and Services : Our worldwide I/T security
consulting practice helps customers determine exactly what their
security risks are...and then designs a security program to
cover them using proven methodology that incorporates both
business and technology requirements.
IBM Security Services has the experience and expertise that
can dramatically reduce risk and exposure in today's
interconnected world. There was a recent announcement in March
that provides a series of security services under e-business.
Technologies: Technology is key to making e-business
real. Many new technologies have been invented to secure
e-business and make it safe. Our research labs develop
technology that has been awarded the most U.S. patents of any
company for five years running with a worldwide portfolio of
more than 30,000 patents, 100 of those are in security.
Products: Award winning research is only part of the
puzzle, however. It is equally important to turn the best of
this technology into products and solutions to help our
customers compete more effectively in a fast-changing world. IBM
has set the pace in this regard, offering the broadest range of
security solutions available from any vendor in the industry
with continuous focus on simplifying these solutions for our
customers use. Unlike many other systems where security is an
"add on", security is integrated into the heart of
IBM's hardware and software products. Our software features
specialized capabilities designed right into our operating
systems, and network and database management programs. Other
tools include: Global Sign On, LDAP Directory, SmartCards,
Firewall, Virtual Private Network technology all part of
eNetwork, built-in security features in Lotus Notes and Tivoli
management tools making security easy to administer.
Solutions: Our security strategy is built on a strong
foundation. It begins with security imbedded into our operating
systems, hardware, software servers, middleware and clients, so
system security can't be circumvented. It continues to the next
layer of network security addressing administration, delivery
and access of information across networked environments. And
thirdly our strategy encompasses commerce applications or
transactions involving secure credit card transactions,
integrating with "middleware" applications and third
party software. All three of these layers need to deal with the
issues of authentication, data integrity, access control and
non-repudiation offering our customer secure solutions. The list
is long and impressive. When coupled with IBM I/T security
consulting and the range of services provided as part of our
SecureWay brand offerings, these tools provide the foundation
for securing our customers information systems and networks.
Enabling I/T security requires adherence to international
standards - - standards reached not just through government
imposition, but through global agreement. IBM fully supports the
delivery of open standards. We all want to operate in a world in
which everybody's software runs on everybody's hardware over
everybody's network. Our strategy addresses working with
governments around the world to support an unrestricted
marketplace for security and encryption products that integrate
globally.
We provide security technology and contribute intellectual
expertise to many standards groups such as Open Group, W3C, ISO
and many other national and regional standards bodies around the
world. Our strategy is to lead in driving secure Internet-based
computing by adopting, developing and promoting standards such
as a PKIX reference implementation of the Internet Engineering
Task Force (IETF) Public-Key Infrastructure (PKIX) which will
promote a standard way to secure any and all applications with
digital certificates. We lead the creation of the Key Recovery
Alliance whose goal is to expedite the use of strong encryption.
And have contributed to many standards such as SET, IPSEC, Open
Card, and Gold Standard to mention a few.
To manage the corporate security within IBM, a security
management system has been put in place. It is a two-pronged
approach that combines the customer-driven insights of top
division level managers who view security as an important
differentiator which will drive more revenue and profit for
their offerings with the cross-IBM focus of senior corporate
level managers who plan IBM's future. On one side is the
Security Management Team (SMT) acts as an Investment Review
Board for security, made up of the top executives from our
platform, software and services divisions. This group meets
quarterly to steer our tactical and strategic security
investments as a corporation in order to focus our investments
and optimize the security portfolio. On the other side is the
CEC level Security Council which meets 3-5 weeks after the SMT
meets to review its' recommendations and provide high level
guidance.
In 1998-1999, the SMT's charter is to maximize the IBM value
proposition as it relates to security in order to capture our
rightful share of the multi-billion dollar opportunity
identified for security (approaching $13.5B by the year 2000),
and to ensure that security remains a key differentiator for
e-business. The SMT has committed to a contract with the IBM
corporation that in return for investment dollars, specific
quantifiable results will be realized. It will drive IBM's
strategic interests irrespective of local measurement issues,
ensure coherent investments across IBM, and promote IBM-wide
interests in partnerships, standards, and policy. The Security
Council's charter is to review and validate these
recommendations in light of future directions the company will
be taking and decide how best to prioritize and fund them.
Appendix A : Branded Web Sites
alphaWorks: www.alphaworks.ibm.com
alphaWorks was created by John Patrick in August 1996, as a
new web site that gained mind share in the internet space by
portraying a "cool new site" with new technologies,
and a "new blue" attitude. Now based in Cupertino, CA
and a part of the Network Computing Software Division,
alphaWorks has evolved into much more than a web site. The
mission for alphaWorks is to speed emerging IBM technologies out
of research, and into market-driven products, by applying an
e-business mindset to existing IBM procedures. alphaWorks also
identifies strategic IBM technologies and matches them with
appropriate business and development opportunities. alphaWorks'
successful use of the World Wide Web brings significant
visibility and real-time end-user feedback to new technologies.
This effective use of the Web to attract and maintain a large,
involved community of internal and external developers makes the
team uniquely qualified for this role.
Almost 100,000 registered users representing executives and
developers from both small and large companies are a part of the
alphaWorks community. alphaWorks attracts monthly traffic of
over 85,000 end-user visits alphaWorks currently hosts 58
technologies on its Web site, with a diverse collection of Java
technologies, collaborative Web frameworks, and multi-media
authoring tools. Several technologies have
"graduated", i.e. have gone on to become
revenue-generating IBM products. These graduates include
WebRunner Server Works, Lotus Bean Machine and Interactive
Network Dispatcher.
Over 100 positive mentions of alphaWorks have been in
publications since January 1, 1997, including coverage in a
5,000 word cover article in Fast Company magazine. One of
alphaWorks' most recent successes is a free commercial license
for XML for Java offer, which has attracted numerous press hits
from Java World and Info World. After posting the alphaBeans
technology on the alphaWorks site, Information Week named
alphaWorks "Web Site of the Week."
alphaWorks will capitalize on its network of researchers and
other suppliers to locate more technologies that will address a
strategic weakness in current or planned IBM product lines. For
example, alphaWorks recently identified a new data mining
research technology that may be the basis of an advanced feature
for several NCSD products, including Mobile and the Host
Integration Solution. alphaWorks matched the technology owner in
Research with the appropriate NCSD product group. alphaWorks
facilitates the assessment and integration of a new technology
by creating an easy-to-assimilate business case or
"alphaBrief." This "alphaBrief" is written
in close coordination with the technology owners. It is then
distributed electronically to relevant product owners. This is
just one example of how alphaWorks speeds technology assessment
and decision-making.
Three strategic areas will be focused on: Java, Wireless
Communications, and Network Computing. While it will not exclude
other technology submissions, alphaWorks will encourage
submissions that solve problems leading to competitive
advantages for IBM in these areas. Java, Wireless
communications, and Network Computing were selected for three
reasons:
- IBM must win in these areas to realize its vision of
Network Computing,
- Internal and external researchers and developers find
these technologies compelling,
- Many of theses technologies are well suited for
download, demonstration and explanation via the Web.
jCentral: www.ibm.com/java
The ibm.com/java site was created to bolster the adoption of
Java by: providing resources to Java developers to write new
Java applications; communicating IBM's leadership in Java; and,
showcasing all of IBM's Java products, technologies, and
programs. Additionally, searching and locating Java resources is
critical for the rapid development and deployment of enterprise
applications. IBM's jCentral, a search engine for Java
resources, provides developers with a growing catalogue of over
200,000 sources of Java information. The IBM Java site
(ibm.com/java) together with jCentral has effectively created a
Java developer community with over 1.2MM end-user impressions
per month. ibm.com/java with jCentral is a current-day example
of the future of the web. Currently, web users are retrieving
information from hundreds of sources and interpreting that
information for their own use. In the past two years, the rise
of webzines, on-line communities, even browser or search engine
start pages have begun to sift through, add commentary to, and
provide direction for negotiating information on the web. Users
opt to have their information chosen for them based upon their
trust of or experience with these compilers. These compilers are
middlemen that pose a potential threat to IBM. Their communities
will, in effect, serve as a channel to end users and anyone
wishing to reach the end users will be held captive by the whims
of the intermediary (this could include fees, rules, information
editing or other undesirable results). In order to pre-empt this
situation, ibm.com/java and jCentral have begun to build a
proprietary virtual community, providing IBM with a direct line
to its end users. IBM's challenge will be to extend the jCentral
technology and business model to a broader audience of
developers.
Go to top of page