Security and Privacy       

links

Security and Privacy - overview


chain lockWhen companies change, undergo mergers or make acquisitions, their information infrastructure becomes virtual -- and unavoidably vulnerable. Moreover, employees increasingly become mobile and work on many different interconnected devices from anywhere in the world. Consequently, security researchers recognize that it is no longer sufficient to safeguard trusted IT systems against malware from a single point of attack. Nor is it realistic to prevent connections between the untrusted outside world and the trusted company domain. IBM's security and privacy computer scientists must address these and many other factors.

At IBM Research-Tokyo, for example, world-class cryptographers, networking and operating system gurus and skilled middleware and application security & privacy experts are promoting data security technologies in the area of log management and analysis, data security & privacy and smarter mobility security.

At IBM Research-Zurich, researchers concentrate on many aspects of information security including, secure identity cards and ID systems; data storage security; identity governance, security policies and cloud computing security.

IBM has a long history of helping clients address the challenges of securing their people, data, applications and infrastructure. In the 1960s, IBM chairman Thomas J. Watson, Jr. set up a cryptography research group in the Yorktown Heights, NY, laboratory. The group created an encryption method named Lucifer to protect the data for a cash-dispensing system that IBM had developed for Lloyds Bank in the United Kingdom. In 1971, Lloyds Bank bought the code, and IBM worked to turn Lucifer into a commercial product.

Today IBM’s Cryptography Research Group works aggressively to stay ahead of would-be criminals. Among its achievements:

Homomorphic encryption, which allows an authorized user to work on data while it is encrypted.

Cryptographic co-processing, which frees the main processor from handling AES, DES, TDES, RSA, SHA-1. SHA-224 - SHA-512 cryptographic tasks.

Ethical hacking, a term coined by IBM that includes penetration testing as well as a broad range of security evaluations.

At IBM, these professional interest communities (PICs) comprise Privacy and Security:

 

news IBM smarter commerce logo IBM energy ball jigsaw puzzle pieces
       
MEDIA PRODUCTS RESEARCH WORK WITH US

 

Last updated on July 1, 2014

 

 

 

 

 

 

 

 

 




Research Areas

Technical interests at IBM Research

RESEARCHERS

RESEARCH PROJECTS

RESEARCH PUBLICATIONS