IBM 8 Bar Logo

IBM Security Roadmap

Unified threat management, quantum-safe cryptography, and semiconductor innovations secure multi-cloud, decentralized environments.

Security
Roadmap

Strategic milestones

All information being released represents IBM’s current intent, is subject to change or withdrawal, and represents only goals and objectives.

You can learn more about the progress of individual items by downloading the PDF in the top right corner.

2030+

Secure semiconductor chips and power ubiquitous controls.

By 2030, security controls will be incorporated along the full computing stack, from the lowest level up, and across multicloud applications and systems.

Why this matters for our clients and the world

Security controls for the lower levels of the stack and across multicloud deployments will counter adversaries trying to attack the very technologies driving the shift to the multicloud.

The technologies and innovations that will make this possible

The integrated hardware root of trust will provide a vertically-integrated IBM security stack that will protect and monitor the attack surfaces across applications and data. A hybrid cloud security control plane anchored in hardware security mechanisms such as chiplet security and secure, cloud-native electronic design automation (EDA) will track and counter adversaries.

How these advancements will be delivered to IBM clients and partners

The hybrid cloud platform will be available with trusted hardware designed by secure, cloud-native processes and embedded in chips in trusted foundries.