General Page
Insights from "Cost of a Data Breach 2022" 1
- “Reaching an all-time high, the cost of a data breach averaged USD 4.35 million in 2022.” 1
- “Eighty-three percent of organizations studied (550) have experienced more than one data breach, and just 17% said this was their first data breach.” 1
- 59% of organizations don’t deploy Zero Trust. They incur an average of USD 1 million in greater breach costs compared to those that do deploy Zero Trust 1
- “Healthcare breach costs hit a new record high. The average breach in healthcare increased by nearly USD 1 million to reach USD 10.10 million.” 1
- “Eleven percent of breaches in the study were ransomware attacks, an increase from 2021, when 7.8% of breaches were ransomware, for a growth rate of 41%.” 1
-
NOTE: The following services can be provided under the IBM Expert Assist program, https://ibm.biz/expertassist.
For questions, contact systems-expert-labs@ibm.com. - Security Assessment
- AIX Security Assessment
This service provides a comprehensive security analysis designed to identify security measures that can be implemented by an enterprise that is seeking to improve the cyberdefense of their AIX infrastructure.
This service consists of 2 parts:- Part one: an assessment of over 50 security policies to be used across the AIX infrastructure
- Part two: an assessment of over 300 security settings of a single AIX or VIOS instance
The assessment requires only a few hours of the client’s time. The security recommendations for this service are derived from Center for Internet Security (CIS) Controls and the CIS benchmark for AIX. The consultant provides a presentation of the findings, and the client receives a set of electronic documents of all findings.
Click for full Details PDF(777KB)
- Linux Security Assessment
This assessment service, which requires only a few hours of your time, provides a comprehensive security analysis of a single Red Hat Enterprise Linux (RHEL), or SUSE Linux Enterprise Server (SLES) instance. This service is designed to identify security safeguards that can be implemented to mitigate security risk on your Linux systems. The security recommendations for this service are derived from Center for Internet Security (CIS) Controls and the CIS benchmarks for RHEL, and SLES.
Click for full Details PDF(786KB)
- OpenShift Security Assessment
This assessment service, which requires only a few hours of your time, provides a comprehensive security analysis of a single Red Hat OpenShift Container Platform (OCP) cluster. This service is designed to identify security safeguards that can be implemented to mitigate security risk on your OCP clusters. The security recommendations for this service are derived from the Center for Internet Security Red Hat OpenShift Container Platform v4 Benchmark.
Click for full details PDF(273KB)
- AIX Security Assessment
- PowerSC
- Security and Compliance with PowerSC
This implementation service provides a deployment of the PowerSC Graphical User Interface Server and Agents in your environment. This solution provides centralized management of numerous security and compliance-related safeguards designed to mitigate security risk on AIX, VIOS, Linux, IBM i, and HMC.
Click for full details PDF(103KB)
- AIX Patch Management with PowerSC
This implementation service provides a deployment of PowerSC Trusted Network Connect and Patch Management (TNC) in your environment. TNC is designed to provide continuous patch management for AIX and VIOS. TNC provides update capabilities for interim fixes, service packs, technology levels, and open source packages.
Click for full details PDF(317KB)
- Malware Defense with PowerSC
This implementation service is designed to mitigate the security risk of viruses and malware, including ransomware. This service provides deployment of three measures for malware defense: Threat Hunting, Allowlisting, and ClamAV. Threat Hunting provides scanning for malware that uses hashes not registered to virus databases. ClamAV is an open source antivirus engine that provides scanning for over 8.6 million known trojans, viruses, malware, and other malicious threats. Allowlisting provides detection or prevention of the launching of unauthorized software. These security measures can be implemented for PowerSC managed AIX or Linux endpoints.
Click for full details
- Multi-Factor Authentication with PowerSC
This implementation service adds an authentication safeguard to prevent attackers from gaining unauthorized access that can result in a security incident, including a ransomware attack. This solution can be implemented for AIX, Linux, VIOS, HMC, and IBM i
Click for full details PDF(249KB)
- Security and Compliance with PowerSC
- Identity, Credential, and Access Management
- LDAP Integration with Microsoft Active Directory
This LDAP integration service is designed to provide centralized management of user accounts, group accounts, and passwords by using Microsoft Active Directory. This solution can be used across your entire AIX and Linux environments.
Click for full details PDF(182KB)
- LDAP Integration with IBM Security Directory Server
This LDAP integration service is designed to provide centralized management of user accounts, group accounts, and passwords by using IBM Security Directory Server. This solution can be used across your entire AIX and Linux environments.
Click for full details PDF(290KB)
- LDAP Login Control Automation
This service provides tools and consulting to add LDAP-based host access for LDAP users to their existing LDAP-based centralized user management solution. Once this solution is implemented, you no longer need to manage login access locally on each individual AIX or Linux host.
Click for full details PDF(49KB)
- LDAP Integration with Microsoft Active Directory
- AIX Security
- AIX Trusted Execution
If you are faced with the challenge of mitigating the security risk of malware, including ransomware, this consulting service assists you with deploying AIX Trusted Execution. AIX Trusted Execution is designed to detect or prevent not just ransomware, but all types of malware on AIX.
Click for full details PDF(105KB)
- Enhanced Role Based Access Control
If you are faced with the challenge of mitigating the security risk of excessive administrative privilege, this consulting service assists you with deploying Role Based Access Control (RBAC) on AIX. RBAC is designed to significantly mitigate the risk of excessive administrative privilege on AIX.
Click for full details PDF(46KB)
- AIX Auditing
If you are faced with the challenge of detecting malicious activity on AIX, this consulting service assists you with properly configuring the AIX Auditing subsystem. The AIX Auditing subsystem provides you with a powerful solution to collect detailed logs of security events on AIX.
Click for full details PDF(43KB)
- AIX Trusted Execution
All Services PDF (1.7MB)
- Ponemon Institute - Cost of a Data Breach Report 2022. (July 2022)
Was this topic helpful?
Document Information
Modified date:
08 November 2023
UID
ibm16584155