IBM Security Roadmap
Unified threat management, quantum-safe cryptography, and semiconductor innovations secure multi-cloud, decentralized environments.
Security
Roadmap
Strategic milestones
All information being released represents IBM’s current intent, is subject to change or withdrawal, and represents only goals and objectives.
You can learn more about the progress of individual items by downloading the PDF in the top right corner.
2030+
Secure semiconductor chips and power ubiquitous controls.
By 2030, security controls will be incorporated along the full computing stack, from the lowest level up, and across multicloud applications and systems.
Why this matters for our clients and the world
Security controls for the lower levels of the stack and across multicloud deployments will counter adversaries trying to attack the very technologies driving the shift to the multicloud.
The technologies and innovations that will make this possible
The integrated hardware root of trust will provide a vertically-integrated IBM security stack that will protect and monitor the attack surfaces across applications and data. A hybrid cloud security control plane anchored in hardware security mechanisms such as chiplet security and secure, cloud-native electronic design automation (EDA) will track and counter adversaries.
How these advancements will be delivered to IBM clients and partners
The hybrid cloud platform will be available with trusted hardware designed by secure, cloud-native processes and embedded in chips in trusted foundries.