Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

IBM Technology Atlas Unified threat management, quantum-safe cryptography, IBM Technology Atlas

→ Updated April 2023


and semiconductor innovations secure multi-cloud,
Security roadmap decentralized environments.

→ on target → on target

2023 2024 2025 2027 2029 2030+


Security journey Unified threat management Zero-trust-based security and Quantum-safe cryptography Robust AI and fully homomor- Security brings trust to a Secure semiconductor chips
leverage foundation models compliance drives multi cloud and a secure supply chain phic encryption secure insights decentralized digital world power ubiquitous controls
to protect high-value assets cyber resiliency are the norm and data while in use

Strategy overview In 2023, the protection of high- By 2024, full-stack zero-trust In 2025, we will protect By 2027, technologies like fully 2029 will bring security and By 2030, security controls will
value assets will tighten with architectures that provide multi-cloud deployments with homomorphic encryption (FHE) management of trust across be incorporated along the full
unified threat management in continuous compliance and quantum-safe cryptography and and robust AI will be widely used decentralized computing / computing stack, from the lowest
the hybrid cloud, and compliance digital sovereignty will make a secure supply chain of software to protect enterprises against digital environments with self- level up, and across multi-cloud
with regulations. This will raise organizations more resilient. and services that addresses the data breaches and adversarial AI. sovereign identity and digital applications and systems.
the mean time to failure and This will raise the mean time to threat of quantum computing assets. This will bring protection
lower the mean time to recovery failure and lower the mean time and open-source software and trust to IT deployments and
to within an hour. to recovery to minutes. vulnerabilities. sovereign clouds.

Why this matters With an evolving security As digital transformations Quantum-safe cryptography Fully homomorphic encryption The innovations we will deliver Security controls for the lower
to our clients and threat landscape, unified threat expand the attack surface, protects classical cryptography enables analytics and privacy on in 2029 will enable organiza- levels of the stack and across
the world management and compliance advances in 2024 will help from quantum attacks, while a always encrypted data, including tions to solve the security chal- multi-cloud deployments counter
will protect businesses from organizations ensure risk-based secure software supply chain when it is in use, and robust AI lenges posed by the expanded adversaries trying to attack the
growing threats and allow faster access across multi-cloud protects enterprises with will protect against adversarial attack surface of decentralized very technologies driving the
response across hybrid cloud environments to protect from provenance and security checks attacks on AI services. IT deployments like sovereign shift to the multi-cloud.
environments. cyber threats, and automated to filter vulnerabilities. clouds and virtual worlds.
and continuous compliance.

The technology or Standardized industry controls, Prescriptive zero trust-based Quantum-safe cryptography Fully homomorphic encryption Open standards and privacy- A multi-cloud security control
innovations that will the development of an advanced controls with continuous industry standards and crypto agility will and AI robustness toolkits preserving techniques plane anchored in hardware
make this possible assessment platform, and monitoring and confidential enable the migration to a quan- will produce privacy-enabled will secure decentralized security mechanisms such as
compliance management tools containers built on secure tum-safe future. A software bill of and robust AI. Model security environments like sovereign chiplet security and secure,
will protect the attack surface. enclaves for adaptive policy materials and industry certifica- operations (ModelSecOps) clouds, digital assets, cloud-native electronic design
A cloud-native and enterprise- management with distributed tions like the supply-chain levels will discover and remediate decentralized identity, etc. automation (EDA) will be
grade log management enforcement will provide for software artifacts (SLSA) will vulnerable services and clear Breach and attack simulations developed to track and counter
solution, behavior analytics, protection. AI foundation be enabled by software genome text data. with a risk-driven approach will adversaries. It will be used to
and foundation models will models on multiple telemetry technologies for software com- help address threats proactively protect and monitor the attack
monitor the attack surface, and sources will automate the threat position analysis across legacy and prevent breaches. A mature surfaces across applications
automation with AI will enhance management lifecycle and evolve and closed-source code. risk operation center will and data.
the response time. into a risk operations center. improve monitoring.

The platform or A cloud-native, open unified The hybrid cloud will be A governance mechanism based Frameworks for developing Sovereign hybrid cloud and The multi-cloud platform will be
infrastructure will threat management platform enhanced with built-in on crypto agility will ease the robust and secure AI other distributed deployments available with trusted hardware
these advancements will be delivered, differentiated zero trust guarantees and migration to quantum-safe applications on encrypted data, will have decentralized identity designed by secure, cloud-native
by delivered on with AI, simple to use, and continuous compliance added cryptography. We will deliver crypto libraries with hardware and compliance, ensuring and processes and embedded in
integrated with infrastructure, at all levels and integrated with innovations in the software acceleration, and AI robustness managing trust everywhere. chips in trusted foundries.
the multi-cloud platform, deployments across sovereign supply chain security in a cloud- toolkits will become embedded
applications, and data. and hybrid clouds. native manner to meet SLSA in AI developer tooling.
level 4 for containers.

You might also like