Bangkok--22 Aug--IBM
New IBM SmartCloud offerings, Mobility and Security Drive Transformational Business Outcomes
Today, IBM unveiled new software that represents a significant advancement in the level of visibility, control and automation for organizations to securely manage and deploy cloud services. In this year’s Pulse Comes To You 2012, IBM is sharing its approach on Cloud with the launch of the new SmartCloud Foundation offerings, Mobility and Security with business partners and customers.
A recent IBM Institute for Business Value study found that 90 percent of organizations expect to adopt or substantially deploy a cloud model in the next three years. Organizations are now faced with what has become known as “virtual image sprawl.”
Mrs. Jadesada Kraisingkorn, Country Manager Software Group, IBM Thailand Co.,Ltd. said “Virtual images are tripling every two years, outpacing the doubling in compute power and essentially flat IT budgets. With current operating practices, every two years, you'd need 1.5 times the physical infrastructure to support cloud and twice the labor. That's an unsustainable cost and management problem which is the exact opposite of the promise of cloud,"
IBM’s new SmartCloud Foundation offerings allow organizations to install, manage, configure and automate the creation of cloud services in private, public or hybrid environments with a higher level of control than previously available in the industry. Collectively, the new offerings will help clients speed delivery, lower risk and better control the move to deploy cloud alongside their existing production environments.
IBM has also released new capabilities with IBM SmartCloud Continuous Delivery. The software is a suite of best practice patterns for enabling integrated lifecycle management of cloud services, combining Rational Collaborative Lifecycle Management solutions with IBM SmartCloud Provisioning.
IBM SmartCloud Monitoring applies its industry-leading monitoring expertise to provide greater visibility into the performance of virtual and physical environments: storage, network and server resources. The software contains business- and technical-policy analysis to enable better capacity planning and workload placement. The software’s predictive and historical analytics help IT staff prevent outages of cloud services while reducing operational, licensing and capital costs.
“Enterprises view cloud computing as a way to improve responsiveness and change the economics of IT. At the same time, the envelope of IT is stretching way beyond the data center, networks and workstations to new classes of mobile assets with embedded intelligence. Clients need to exert the same control over this virtualized, distributed world as they would exert over prior models of IT.
As global networks of people become instrumented, interconnected and intelligent, dramatic shifts are taking place. The ways employees interact, relationships form, decisions are made, work is accomplished and the way goods are purchased are fundamentally changing.
Going Mobile
With the growing use of laptops by organizations, there are several important factors to consider, including today's 24/7 work environment that requires many users to keep laptops running around the clock—not always in power-saving modes. Stolen laptops are also one of the biggest causes of data breaches to organizations in 2011.
IBM's strategy is to offer its customers a complete set of the software and services they need to effectively bring mobile devices into their business infrastructure. These capabilities include:
- Build and Connect Mobile Applications: The explosive growth of mobile has created a fragmented landscape for enterprises to support, often with limited budgets and skills. IBM’s development and integration tools, complemented by Worklight, help clients to develop mobile applications and their supporting infrastructures for a variety of platforms just once - including Apple iOS and Google Android - while offering capabilities to securely connect to corporate IT systems.
- Manage and Secure Mobile Devices: As Bring Your Own Device or “BYOD” gains popularity, IT departments are looking to find an efficient and secure way to enable employees’ use of mobile devices in the work place. Rather than implement a separate infrastructure solely for mobile devices, IBM’s offerings are helping customers deliver a single solution that effectively manages and secures all endpoints. These unified capabilities can now extend from servers and laptops, to smartphones and tablets.
- Extend Existing Capabilities and Capitalize on New Business Opportunities: The rapid adoption of mobile computing is also creating demand for organizations to extend their current business capabilities to mobile devices, while capitalizing on the new opportunities that mobile devices uniquely provide. For instance, IBM's software, services and industry frameworks offer clients the ability to use mobile to engage with their customers around growing business opportunities such as analytics, commerce and social business applications.
Advancing Security
The growing security threats had made security a focus area to ensure continuous productivity and efficiency and security Intelligence can offer clients beyond perimeter defense.
“Security Intelligence applies advanced analytics and automation technology to the collection and analysis of information from hundreds of sources across an organization such as the network, applications, user activity, mobile endpoints and physical security devices. Instead of the piecemeal approach, it looks across the firm to prevent, predict and detect threats,” said Mrs. Jadesada Kraisingkorn.
IBM has been quietly assembling its strategy and technical prowess in security intelligence with a strong research emphasis. Last October, IBM acquired Q1 Labs and made it the centerpiece of a new division, Security Systems. This builds on more than 10 strategic security acquisitions IBM has made in the last decade, and the more than 25 analytics-related purchases, including security analytics software firm, i2.
About IBM Cloud Computing
For more information about cloud offerings from IBM, visit http://www.ibm.com/smartcloud. Follow us on Twitter at @ibmcloud.
About IBM Security
For more information on IBM security, please visit: www.ibm.com/security.