Security News > 2020 > June > IBM Acquires Cloud Security Company Spanugo
IBM has announced a definitive agreement to acquire cloud cybersecurity posture management solutions provider Spanugo.
Spanugo's technology allows organizations to demonstrate compliance in real time, while also helping them continuously improve their cloud security to ensure that attacks can be repelled.
The acquisition, IBM says, follows the introduction of its financial services public cloud last year, which was designed to help financial services institutions meet regulatory compliance, as well as ensure required security and resiliency.
IBM plans to integrate Spanugo software into its public cloud, to accelerate the release of a security control center to help customers define compliance profiles, manage controls, and monitor compliance.
"IBM is committed to building the industry's most secure and open public cloud for business. With the acquisition of Spanugo, we have taken another major step in advancing IBM's differentiated capabilities in security and compliance for our enterprise clients, including those in highly regulated industries," said Howard Boville, SVP, Cloud, IBM. "Bringing Spanugo's technology into our financial services public cloud will help provide our clients with evidence of their ongoing compliance, in real time," Boville continued.
News URL
Related news
- How AI Is Changing the Cloud Security and Risk Equation (source)
- Strategies for CISOs navigating hybrid and multi-cloud security (source)
- AWS unveils cloud security IR service for a mere $7K a month (source)
- Are Long-Lived Credentials the New Achilles’ Heel for Cloud Security? (source)
- Best CSPM Tools 2024: Top Cloud Security Solutions Compared (source)
- CrowdStrike vs Wiz: Which Offers Better Cloud Security and Value? (source)
- CISA Mandates Cloud Security for Federal Agencies by 2025 Under Binding Directive 25-01 (source)
- Enhancing visibility for better security in multi-cloud and hybrid environments (source)
- Microsoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks (source)