Welcome!

@CloudExpo Authors: Liz McMillan, Elizabeth White, Roger Strukhoff, Philippe Abdoulaye, Pat Romanski

News Feed Item

IBM MobileFirst Helps Organizations Strengthen App Security

Made in IBM Labs: Security Software Shows Where Vulnerabilities Appear in iOS Apps

ARMONK, N.Y., Feb. 21, 2013 /PRNewswire/ -- IBM (NYSE: IBM) today announced security software that helps organizations proactively reduce the security risk to iOS enterprise apps. Clients will be able to build security testing into the initial design of mobile apps so that vulnerabilities can be detected early in the development process, before being deployed to customers or employees. Today's announcement further expands the IBM MobileFirst portfolio, which marries deep expertise with a comprehensive set of mobile software and cloud-based services.  

(Logo: http://photos.prnewswire.com/prnh/20090416/IBMLOGO)

According to Gartner, more than 45.6 billion mobile apps were downloaded in 2012. As the rate of app use on mobile devices increases, securing smartphones and other endpoint devices is a top priority for organizations and Chief Information Security Officers. With the proliferation of consumer and enterprise mobile apps, organizations cannot always control or restrict the apps installed on user devices, so they must test how apps send and save data. IBM's new security software can automatically identify where data enters and leaves a mobile app, helping to prevent mobile data leakage. 

Improving Security and Reducing Costs of iOS Mobile Apps
The pace of mobile application releases and updates can be overwhelming for organizations trying to maintain strict security guidelines and policies. IBM AppScan Source 8.7 for iOS provides the ability to improve security quality without sacrificing time-to-market of mobile app projects. This allows organizations to better protect each mobile app release in the face of constant updates. IBM previously announced IBM AppScan for apps running on the Android platform.

KiwiTech is a leading mobile technology firm headquartered in Washington DC, and offices in New York and New Delhi. The company has developed more than 750 apps which have generated over three million downloads on iOS and Android platforms. With more than 200 mobile development and related professionals focused on app development, including security is a top priority for the organization.

"Over the last four years, KiwiTech has developed hundreds of iOS and Android mobile apps for organizations around the world. As the risk from mobile malware and data leakage grows, our customers are looking for ways to secure their iOS and Android apps and protect corporate data," said Rakesh Gupta, Chief Executive Officer, KiwiTech. "The new IBM AppScan product will allow us to proactively secure mobile apps and automate security testing to ensure our customers can keep pace with constant updates."

In addition, IBM AppScan Source 8.7 for iOS can help reduce the cost of developing secure apps by building security analysis early into the development cycle. It provides developers with an unmatched view into where vulnerabilities appear in their mobile apps, which improves security quality without sacrificing time to market of mobile app projects.

"This new capability showcases IBM's execution in our strategy to help clients incorporate security into their infrastructure and solutions from the design, development and testing phases rather than leaving security to become an afterthought," said Caleb Barlow, Director of Application, Data and Mobile Security, IBM. "It also aligns with the IBM MobileFirst strategy by empowering organizations with confidence to aggressively evolve and seize the business potential that mobility promises."

New capabilities to IBM AppScan Source 8.7 for iOS include:

  • Complete Language Support for Objective-C, JavaScript and Java: Includes the ability to do call and data flow analysis that will generate trace information. This new capability enables organizations to build secure enterprise mobile apps, regardless of technology choice, for employees and partners.
  • Support for US Federal Government Requirements: Internet Protocol version 6 (IPv6) and use of a FIPS 140-2 validated cryptographic module.
  • 40,000 Mobile Security APIs Supported: IBM Security Research conducted a comprehensive analysis on the iOS Software Development Kit (SDK) to include coverage of APIs that might introduce security risks. The API profiles have been added to the IBM AppScan Source Security Knowledgebase and tied to the analysis engine. Combined with the research conducted on the Android SDK, IBM AppScan Source has researched and characterized the security risk of approximately 40,000 mobile APIs.

IBM AppScan Source 8.7 for iOS is planned for release on March 25th.

About IBM Security
AppScan is part of IBM's portfolio that provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. IBM operates one of the world's broadest security research and development, and delivery organizations. This comprises 10 security operations centers, nine IBM Research centers, 11 software security development labs and an Institute for Advanced Security with chapters in the United States, Europe and Asia Pacific. IBM monitors 15 billion security events per day in more than 130 countries and holds more than 3,000 security patents.

For more information on IBM security, please visit: www.ibm.com/security.

About IBM MobileFirst
As the first new technology platform for business to emerge since the World Wide Web, mobile computing represents one of the greatest opportunities for organizations to expand their business. Based on nearly 1,000 customer engagements, 10 mobile-related acquisitions in the last four years, a team of thousands of mobile experts and 270 patents in wireless innovations, IBM MobileFirst offers an array of solutions that helps businesses connect, secure, manage and develop mobile networks, infrastructures and applications.

To learn more, visit the IBM MobileFirst press kit or http://www.ibm.com/mobilefirst. Follow @ibmmobile, #ibmmobile on Twitter, and see IBM MobileFirst on YouTube, Tumblr and Instagram.

Contact(s) information

John Connolly
IBM Media Relations
(781) 636-8512
[email protected]

Tod Freeman
IBM Media Relations
(415) 320-5893
[email protected]

SOURCE IBM

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
University of Colorado Athletics has selected FORTRUST, Colorado’s only Tier III Gold certified data center, as their official data center and colocation services provider, FORTRUST announced today. A nationally recognized and prominent collegiate athletics program, CU provides a high quality and comprehensive student-athlete experience. The program sponsors 17 varsity teams and in their history, the Colorado Buffaloes have collected an impressive 28 national championships. Maintaining uptime...
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm ...
"There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci...
Apixio Inc. has raised $19.3 million in Series D venture capital funding led by SSM Partners with participation from First Analysis, Bain Capital Ventures and Apixio’s largest angel investor. Apixio will dedicate the proceeds toward advancing and scaling products powered by its cognitive computing platform, further enabling insights for optimal patient care. The Series D funding comes as Apixio experiences strong momentum and increasing demand for its HCC Profiler solution, which mines unstruc...
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
So you’ve heard how click-to-call widgets can really enhance a website’s potential for customer interaction and you want to try it out for yourself. Or you’re considering offloading pieces of your VoIP infrastructure, but want to see how that would unfold first. Where can you find this technology, that’s free and available to try out? Spotting the potential in a space where customers can experiment with these types of features, Voxbone is launching The Workshop.
Redis is not only the fastest database, but it is the most popular among the new wave of databases running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 19th Cloud Expo, Dave Nielsen, Developer Advocate, Redis Labs, will share the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
Let’s face it, embracing new storage technologies, capabilities and upgrading to new hardware often adds complexity and increases costs. In his session at 18th Cloud Expo, Seth Oxenhorn, Vice President of Business Development & Alliances at FalconStor, discussed how a truly heterogeneous software-defined storage approach can add value to legacy platforms and heterogeneous environments. The result reduces complexity, significantly lowers cost, and provides IT organizations with improved efficie...
"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Most organizations prioritize data security only after their data has already been compromised. Proactive prevention is important, but how can you accomplish that on a small budget? Learn how the cloud, combined with a defense and in-depth approach, creates efficiencies by transferring and assigning risk. Security requires a multi-defense approach, and an in-house team may only be able to cherry pick from the essential components. In his session at 19th Cloud Expo, Vlad Friedman, CEO/Founder o...
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...