IBM is set to join the stage at this year’s 17th Annual AT&T Cybersecurity Conference in New York City, where it will announce the AT&T and IBM mobile cloud security solution. It’s a simplistic concept in name, but it tethers a vastly complex array of domains across devices, apps, networks and cloud computing to tackle the current business boundaries around insecure data.

In this burgeoning mobile economy, CIOs face enormous demand from their businesses to deliver a diverse range of apps that connect with customers and employees across any device. This fundamentally changes the security, management and networking capabilities needed to deliver more user and app-centric business mobility. With the Mobile Cloud Security framework, enterprises now gain a simple, secure and scalable environment to enable their growing mobile workforce.

Mobile Connectivity and Security

This framework starts with IBM MobileFirst Protect, which provides an enterprise mobility management (EMM) solution to help organizations secure their mobile devices, apps and content across the wide range of use cases, especially those that require strong security.

Bringing that device data into the IBM Cloud securely with a strong signal is AT&T NetBond. Connecting to the SoftLayer infrastructure secures public and private clouds for applications and data storage.

To ensure efficiency of cost in conjunction with keeping ROI aligned with rapid device expansion is the AT&T Work Platform. Now, bring-your-own-device (BYOD) programs can be less bloated by offering separate billing of business and personal charges across voice, messaging and data use on an employee’s personal device.

Attacks on the Rise

Why now for these solution pairings? Cybercriminals are increasingly targeting mobile apps, Internet connections and corporate networks. The AT&T Cybersecurity Insights report saw a 62 percent increase in distributed denial-of-service (DDoS) attacks over the past two years. Additionally, IBM research found that nearly half of all companies allocate no budget to securing the apps they develop. Also, many companies are sitting in a state of dormant susceptibility after malware was uploaded to their networks by users who merely wanted to sync photos and music on their mobile phones.

“To help protect organizations, employees and data, IBM Security and AT&T are delivering a tested and easy-to-deploy set of complementary tools [for] mobile cloud security. We’re giving enterprise mobile device users stable, private access to data and apps in the cloud,” said Caleb Barlow, Vice President of IBM Security.

The final results can already be seen through each company’s deep histories in computing and connectivity. Under mobile cloud security solutions, businesses can now scale employee desires for productivity while reducing complexity and increasing security on a global scale.

More from Cloud Security

2024 Cloud Threat Landscape Report: How does cloud security fail?

4 min read - Organizations often set up security rules to help reduce cybersecurity vulnerabilities and risks. The 2024 Cost of a Data Breach Report discovered that 40% of all data breaches involved data distributed across multiple environments, meaning that these best-laid plans often fail in the cloud environment.Not surprisingly, many organizations find keeping a robust security posture in the cloud to be exceptionally challenging, especially with the need to enforce security policies consistently across dynamic and expansive cloud infrastructures. The recently released X-Force…

Cloud threat report: Why have SaaS platforms on dark web marketplaces decreased?

3 min read - IBM’s X-Force team recently released the latest edition of the Cloud Threat Landscape Report for 2024, providing a comprehensive outlook on the rise of cloud infrastructure adoption and its associated risks.One of the key takeaways of this year’s report was focused on the gradual decrease in Software-as-a-Service (SaaS) platforms being mentioned across dark web marketplaces. While this trend potentially points to more cloud platforms increasing their defensive posture and limiting the number of exploits or compromised credentials that are surfacing,…

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today