IBM 2014 Annual Report Download - page 18

Download and view the complete annual report

Please find page 18 of the 2014 IBM annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 158

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158

SECURITY OPERATIONS CENTERS
Over the past decade, we have spent
nearly $2 billion on security research and
development resulting in 3,700 security-
related patents. Our 10global Security
Operations Centers manage and monitor
15 billion events daily. We help protect
more than 10,000 clients worldwide.
SECURITY ANALYTICS
Our security software and services help
clients protect against advanced threats.
We offer analytics, fraud protection,
identity and access management, and
leading application, data and infrastructure
security capabilities as well as cloud
and mobile solutions to help clients
innovate without increasing risk. For
example, in 2014 IBM introduced the
Threat Protection System which
includes an end-to-end architecture of
analytics and forensics software that
helps organizations continuously prevent,
detect and respond to ongoing and
sophisticated cyberattacks, and in many
cases, eliminate the threat before the
damage has occurred.
Cybersecurity attacks can go undetected for months. Security for
complex, 21st century enterprises is no longer only about building
firewalls” to keep intruders out. Its now a Big Data problem which
is why IBM is the global leader in enterprise IT security. Our unique
analytics capabilities anticipate and protect against a fluid threat
landscape and a new generation of organized cybercriminals. IBMs
intelligent immune systems can detect even the smallest anomalies,
in time to protect an organizations vital data.
15B
events monitored
and managed
each day
Security revenue
increased
19%
in 2014
Double-digit
revenue growth
in security for
9
straight quarters
172014 IBM Annual Report