IBM has unveiled the IBM Z, a next generation transaction system capable of running more than 12 billion encrypted transactions per day and making it possible to encrypt data associated with any application, cloud service or database all the time.
IBM Z’s new data encryption capabilities are designed to address the global epidemic of data breaches, a major factor in the $8 trillion cybercrime impact on the global economy by 2022 Of the more than nine billion data records lost or stolen since 2013, only four percent were encrypted, making the majority of such data vulnerable to organized cybercrime rings, state actors and employees misusing access to sensitive information.
In the most significant re-positioning of mainframe technology in more than a decade, when the platform embraced Linux and open source software, IBM Z now dramatically expands the protective cryptographic umbrella of the world’s most advanced encryption technology and key protection. The system’s advanced cryptographic capability now extends across any data, networks, external devices or entire applications – such as the IBM Cloud Blockchain service – with no application changes and no impact on business service level agreements.
“The vast majority of stolen or leaked data today is in the open and easy to use because encryption has been very difficult and expensive to do at scale,” said Ross Mauri, General Manager, IBM Z. “We have created a data protection engine for the cloud era to have a significant and immediate impact on global data security.”
Technology Breakthrough: Industry-First Pervasive Encryption for the Cloud Era
A recent study found that extensive use of encryption is a top factor in reducing the business impact and cost of a data breach. To put that in context, the IBM X-Force Threat Intelligence Index reported that more than four billion records were leaked in 2016 (a 556 percent increase from 2015).
However, encryption is often largely absent in corporate and cloud data centers because current solutions for data encryption in x86 environments can dramatically degrade performance (and thus user experience), and can be too complex and expensive to manage. As a result, only about two percent of corporate data is encrypted today, while more than 80 percent of mobile device data is encrypted.
IBM Z pervasive encryption reflects a call to action on data protection articulated by Chief Information Security Officers and data security experts worldwide, and more than 150 IBM clients around the world who participated and provided feedback in IBM Z’s system design over three years.
As a result of this collaboration, IBM Z brings significant advances in cryptography technology, building on a proven encryption platform that safeguards the world’s banking, healthcare, government and retail systems. IBM Z pervasive encryption delivers breakthroughs including:
· Pervasive encryption of data – all the time. IBM Z makes it possible, for the first time, for organizations to pervasively encrypt data associated with an entire application, cloud service or database in flight or at rest with one click. The standard practice today is to encrypt small chunks of data at a time, and invest significant labor to select and manage individual fields. This bulk encryption at cloud scale is made possible by a massive 7x increase in cryptographic performance over the previous generation z13 – driven by a 4x increase in silicon dedicated to cryptographic algorithms. This is 18x faster compared to x86 systems (that today only focus on limited slices of data) and at just five percent of the cost compared to x86-based solutions.
· Tamper-responding encryption keys. A top concern for organizations is protection of encryption keys. In large organizations, hackers often target encryption keys, which are routinely exposed in memory as they are used. Only IBM Z can protect millions of keys (as well as the process of accessing, generating and recycling them) in “tamper responding” hardware that causes keys to be invalidated at any sign of intrusion and can then be reconstituted in safety. The IBM Z key management system is designed to meet Federal Information Processing Standards (FIPS) Level 4 standards, where the norm for high security in the industry is Level 2. This IBM Z capability can be extended beyond the mainframe to other devices, such as storage systems and servers in the cloud. In addition, IBM Secure Service Container protects against insider threats from contractors and privileged users, provides automatic encryption of data and code in-flight and at-rest, and tamper-resistance during installation and runtime.
· Encrypted APIs. IBM z/OS Connect technologies can make it easy for cloud developers to discover and call any IBM Z application or data from a cloud service, or for IBM Z developers to call any cloud service. IBM Z now allows organizations to encrypt these APIs – the digital glue that links services, applications and systems – nearly 3x faster compared to alternatives based on x86 systems.
“The pervasive encryption that is built into, and is designed to extend beyond, the new IBM Z really makes this the first system with an all-encompassing solution to the security threats and breaches we’ve been witnessing in the past 24 months,” said Peter Rutten, analyst at IDC’s Servers and Compute Platforms Group.
IBM Z, deeply integrated with IBM Security software, automates and dramatically streamline security and compliance processes. For example, auditors are expected to manually inspect and validate the security of databases, applications and systems. Organizations can now immediately demonstrate that data within of scope of compliance is protected and the keys are secure. This can significantly reduce the mounting complexity and cost of compliance for auditors. The system also provides an audit trail showing if and when permissioned insiders accessed data.
New: Predictable and Transparent Container Pricing
IBM also announced three groundbreaking new Container Pricing models for IBM Z, providing clients greatly simplified software pricing that combines flexible deployment with competitive economics vs. public clouds and on-premises x86 environments:
· New microservices and applications that enable clients to maximize the value from security-rich on-premises enterprise systems in real time. Clients can now co-locate applications to optimize qualities of services that are priced competitively with public cloud and on-premises platforms.
• Application development and test with the freedom to triple capacity of all development environments on z/OS to support latest DevOps tooling and processes. Clients can triple capacity with no increase in monthly license charge.
• Payment systems pricing based on the business metric of payments volume a bank processes, not the available capacity. This gives clients much greater flexibility to innovate affordably in a competitive environment, particularly in the fast-growing Instant Payment segment.
These precedent-setting Container Pricing options are designed to give clients the predictability and transparency they require for their business. The pricing models are scalable both within and across logical partitions (LPARs) and deliver greatly enhanced metering, capping and billing capabilities. Container Pricing for IBM Z is planned to be available by year-end 2017 and enabled in z/OS V2.2 and z/OS V2.3.
The Most Powerful Transaction System for the Cloud Era
IBM Z builds on the capabilities of the world’s most powerful transaction engine at the center of global commerce today supporting:
· 87 percent of all credit card transactions and nearly $8 trillion payments a year.
· 29 billion ATM transactions each year, worth nearly $5 billion per day.
· Four billion passenger flights each year.
· More than 30 billion transactions per day – more than the number of Google searches every day.
· 68 percent of the world’s production workloads at only six percent of the total IT cost.
Banks and others in the financial services industry process thousands of transactions per second to keep the world’s financial systems running. The mainframe is more critical than ever for reliably handling high volumes of transaction data.
Ninety-two of the world’s top 100 banks rely on the IBM mainframe because of its ability to efficiently process huge volumes of transactions. To help financial services organizations more effectively compete in the cloud era, enormous amounts of sensitive data produced by transactions can now be better protected against fraud and cybercrime, analyzed, and monetized using IBM Z – without causing disruption of day-to-day operations. For banks, this means encryption at the click of a button — even while applications are running — and the ability to migrate data from unencrypted to encrypted with no impact to service level agreements.
The IBM Z, the next generation of IBM’s industry-leading CMOS mainframe technology, features the industry’s fastest microprocessor, running at 5.2GHz, and a new scalable system structure that delivers up to a 35 percent capacity increase for traditional workloads and up to a 35 percent capacity increase for Linux workloads compared to the previous generation IBM z13. The system can support:
· More than 12 billion encrypted transactions per day on a single system.
· The world’s largest MongoDB instance with 2.5x faster NodeJS performance than x86-based platforms.
· Two million Docker Containers.
· 1,000 concurrent NoSQL databases.
Other new capabilities announced today include:
· Three times the memory of the z13 for faster response times, greater throughput and accelerated analytics performance. With 32TB of memory, IBM Z offers one of the largest memory footprints in the industry.
· Three times faster I/O and accelerated transaction processing compared to the z13 to drive growth in data, transaction throughput and lower response time.
· The ability to run Java workloads 50 percent faster than x86 alternatives.
· Industry-leading Storage Area Network response time with zHyperLink, delivering 10x latency reduction compared to the z13 and cutting application response time in half – enabling businesses to do much more work such as real-time analytics or interact with Internet of Things (IoT) devices and cloud applications within the same transaction, without changing a single line of application code..
As part of today’s announcement, IBM also previewed new z/OS software that provides foundational capabilities for private cloud service delivery, enabling a transformation from an IT cost center to a value-generating service provider. When available, these capabilities will include the support of workflow extensions for IBM Cloud Provisioning and Management for z/OS and real-time SMF analytics infrastructure support.
IBM Global Financing can help credit-qualified clients acquire the new IBM Z, lower their total cost of ownership, and accelerate return on investment. IBM Global Financing offerings for IBM mainframe solutions are available from IBM and IBM Business Partners, and provide flexible terms and conditions that can be customized to align cost to project benefits or other client needs.
Hearables are the new wearables
Earworn devices were among the fastest growing categories of wearable in the last quarter, capturing almost half of the market
Global wearable device shipments grew 85.2% in the second quarter of 2019 (2Q19) as shipments totaled 67.7 million units according to new data from the International Data Corporation (IDC) Worldwide Quarterly Wearable Device Tracker. Earworn devices (hearables) were among the fastest growing categories, capturing 46.9% of the overall wearables market during the quarter, up from 24.8% a year ago. Driving that growth was a slew of new products and consumers who purchased their second wearable, a hearable, to use in parallel with existing watches or wrist bands.
“The growing popularity of the hearables segment is forcing existing brands to reconsider past designs when launching new products, as evident in Samsung’s popular Galaxy Buds, while also attracting new brands to market,” said Jitesh Ubrani research manager for IDC Mobile Device Trackers. “And though it’s still early days, the market is showing signs of emerging subsegments such as hearables dedicated to sports from the likes of Jabra, premium hearables from companies such as Bose, and ones dedicated to hearing loss such as those from Nuheara.”
“What has been driving the hearables market is the experience,” says Ramon T. Llamas, research director, Wearables. “Quality audio is still the hallmark of hearables, but additional features – ranging from adjusting audio to smart assistants and health and fitness – increase their value and utility. As prices come down and more features come on board, this next generation of hearables will become the new normal for earphones.”
Hearable Company Highlights
Apple led the market for hearables by capturing 50.2% share during the quarter. New products such as the refreshed AirPods and the latest from the Beats lineup helped the company grow 218.2% compared to last year. With the iPhone business facing challenges, Apple’s wearables business, particularly the popularity of the AirPods, is helping the company once again become the de facto standard though this time it’s for hearables.
Samsung, thanks to its self-branded devices and the JBL brand, captured the second position during the quarter. The highly publicized Galaxy Buds were one of the company’s most popular pair of hearables as the pair was bundled with the purchase of Samsung’s latest smartphone. Additionally, the JBL Tune 500BT managed to capture a large share as the low price and wide availability helped move a lot of volume.
Xiaomi’s AirDots (amongst other models) helped the company capture the third position. Though the company primarily sells its hearables in China, Xiaomi has already started to make inroads in other markets such as Europe and the Middle East with its smartphones and wrist bands. IDC expects Xiaomi to follow suit with its hearables.
Bose, a company with a long history of headphones and other audio products, ranked fourth in this market. The company’s long lineage in audio and premium offering has helped set the company apart from the remainder of the pack. The QC35ii and the SoundSport Free were two of its most popular products during the quarter. The latest Headphones 700 and upcoming Earbuds 500 should help the company maintain momentum in the upcoming quarters.
ReSound, the parent company of Jabra, rounded out the top 5 with 5.1% share and 132.9% growth. Jabra’s Elite Active 65t have been extremely popular as an alternative to Apple’s AirPods and have also been promoted heavily on Amazon’s store, allowing the company to pitch itself as a strong consumer brand in addition to its preexisting headset business that is targeted at office workers. At IFA 2019, Jabra announced the next version of the Elite Active series, which helps modernize the hearables and should provide healthy competition for others on the list.
Top 5 Wearable Companies, Hearable Devices only, by Shipment Volume, Market Share, and Year-Over-Year Growth, Q2 2019 (shipments in millions)
|2Q19 Market |
|2Q18 Market |
|Source: IDC Worldwide Quarterly Wearables Tracker, September 9, 2019|
Note: IDC defines Earwear/Hearables as the wearables that hang on or plug into the ear. The device must operate wirelessly and provide stereo sound while also including at least one of the following features:
- Track health/fitness (e.g., Samsung Gear IconX).
- Modify audio, and not just noise reduction (e.g., Nuheara IQbuds).
- Provide language translation on the device (e.g., Waverly Labs).
- Enable smart assistants at the touch of a button or through hotword detection even if the assistant is running on another device such as a smartphone (e.g., Apple’s AirPods and Google’s Pixel Buds).
Phishing attacks hook into iOS
The number of phishing attacks targeting users of Mac computers, iOS-based mobile devices, and the associated web services ecosystem to lure them into fraudulent schemes has reached 1.6 million in the first half of 2019 (H1-19) – proving that the growing number of users of popular digital devices is clearly attracting more and more cybercriminals!
While the volume of malicious software threatening users of macOS and the iOS mobile platform is much lower than those threating users of Windows and Android platforms, when it comes to phishing – a platform agnostic cyberthreat – things are quite different.
Phishing attacks rely on social engineering, which means most have nothing to do with software. In fact, Kaspersky’s recent Threats to Mac Users research highlighted that the number of cases where users faced fraudulent web pages utilising the Apple brand, as a decoy, has increased significantly in the first six-months of the year, reaching 1.6 million. This figure is around 9% greater than attacks experienced during the whole of 2018, when Kaspersky security solutions prevented more than 1.49 million attempts to access Apple-themed phishing pages.
What’s more, some regions had more macOS users hit by phishing than others, for instance, Brazil leads this list with 30.9% of users attacked, followed by India with 22.1% – and while not as prominent as other regions (and in proportion to the number of Apple device users), South Africa still sits at 17.5%.
The research is based on threat statistics voluntarily shared by users of Kaspersky Security Network – a global cloud infrastructure designed for immediate response to emerging cyberthreats.
Among the most frequent fraud schemes are those designed to resemble the iCloud service interface, aimed at stealing credentials to Apple ID accounts. Links to such services usually come from spam emails posed as emails from technical support. They often threaten to block user accounts should they not click the link.
Another widespread scheme is the use of scaremongering pages that try to convince the user that their computer is under serious security threat and it will only take a couple of clicks and a few dollars to solve those issues.
“While technically these fraud schemes are nothing new, we believe they pose an even greater danger to Apple users than similar schemes against users of other platforms – such as Windows or Android. This is because the ecosystem around Macs and other Apple devices is generally considered a far safer environment. Therefore, users might be less cautious when they encounter fake websites. Meanwhile the successful theft of iCloud account credentials could lead to serious consequences – an iPhone or iPad could be remotely blocked or wiped by a malicious user, for example. We urge users of Apple devices to pay more attention to any emails they receive, especially those claiming to be from technical support and requesting the user’s details or asking the user to visit a link,” said Tatyana Sidorina, security researcher at Kaspersky.
In addition to a rise in phishing, thereport also revealed other types of threats to users of macOS-based devices. The results have demonstrated some relatively positive tendencies: the most common threats for Mac users proved not to be critically dangerous malware, like banking Trojans, but instead AdWare threats, which are not-necessarily fatal and defined as ‘potentially unwanted programs’. Most are threatening users by overloading their devices with unrequested advertisements, yet some of these programs might, in fact, turn out to be a disguise for more serious threats.
Other findings of the report include:
- The total number of phishing attacks detected in the first half of 2019 (H1-19) on Mac computers protected by Kaspersky solutions was almost 6 million. The whole of 2018 saw 7.3 million hits.
- 39.95% of the detected attacks were aimed at stealing users’ financial data. That is 10%more than in the first half of 2018 (H1-18).
- Some regions had more macOS users hit by phishing than others: Brazil leads this list with 30.9% of users attacked, followed by India with 22.1% and South Africa with 17.5%.
- The most active malware to hit macOS users were variations of the Shlayer family, that succeeded in distribution by disguising itself as Adobe Flash Player updates.
To keep your devices safe, Kaspersky recommends:
- Keeping macOS and all your apps and programs up to date
- Using only legitimate software, downloaded from official webpages or installed from the Mac App Store
- Starting to use a reliable security solution like Kaspersky Internet Security that delivers advanced protection on Mac, as well as on PC and mobile devices.