IBM and identity management firm CrossIdeas are merging for an unreported amount, the companies said. The move will shore up IBM's security software portfolio to help customers with increasing privacy and surveillance issues.

While CrossIdeas was already an IBM partner, the purchase will give IBM the complete tools of the company to help push forward ideas and new software that will ensure users are only allowed to get access to applications and data permitted under corporate governance and regulatory bodies. The idea, as a whole, is to bar third-parties from observing or getting into private databases and the cloud.

The overall idea is aimed specifically at businesses, with the companies giving the example of an employee who was recently promoted to a new position, but still maintains access to their old job profile, meaning they have the ability, if desired, to approve trades while also having the ability to enter trades in the first place. The aim with the new software merger is to give companies the ability to shut that down without worries.

It will also help deliver better products that should avoid the pesky backdoor that hackers have been able to find in almost all software to hack into peoples' devices.

"The addition of CrossIdeas extends IBM's market share leading portfolio of identity and access management capabilities," said Brendan Hannigan, general manager of IBM Security Systems.

"IBM can now provide enterprises with enhanced governance capabilities and transparency into risk from the factory floor to the board room, giving leaders the insight they need to protect their brand and customers."

It comes on the heels of privacy concerns, which Tech Times has reported in earnest, and cybersecurity, which has quickly become a tipping point in the tech world vis-à-vis the general population.

A recent study showed the vast majority of companies are susceptible to a cyber hit, but IBM believes they can begin to alleviate those concerns by upping their push into better security software and closing backdoors in operating systems and networks.

ⓒ 2024 TECHTIMES.com All rights reserved. Do not reproduce without permission.
Join the Discussion