Security News > 2020 > November > Tanium and IBM join forces to create a security and compliance monitoring solution for hybrid cloud

Tanium announced it is working with IBM to create a security and compliance monitoring solution for hybrid cloud, creating an easy path to verify and validate compliance for highly regulated industries such as healthcare, financial services and government.
Because most public cloud environments are still hardening their compliance and security instrumentation, regulated industries find they spend too much time, effort and money to obtain complete and consolidated audit evidence for cloud workloads.
"For financial services, telecommunications, healthcare and government organizations in particular, regulatory requirements and security concerns continue to be an obstacle for cloud adoption," said Howard Boville, senior vice president, IBM Hybrid Cloud.
Tanium and IBM are collaborating to provide highly regulated industries, such as financial services, a consistent approach for real-time visibility, security and compliance to help them benefit from hybrid cloud transformations.
Moving forward, IBM expects to integrate Tanium's capability into its Security and Compliance Center that provides continuous compliance assessment, enforcement and remediation that organizations can leverage within the IBM Cloud.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/u1nT8sRaWpE/
Related news
- FCC Launches 'Cyber Trust Mark' for IoT Devices to Certify Security Compliance (source)
- How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal? (source)
- Watch Out For These 8 Cloud Security Shifts in 2025 (source)
- Beyond VPN: How TruGrid Simplifies RDP Deployment, Security, and Compliance (source)
- How CISOs can balance security and business agility in the cloud (source)
- Balancing cloud security with performance and availability (source)
- Compliance Isn’t Security: Why a Checklist Won’t Stop Cyberattacks (source)