IBM Watson IoT Platform Advanced Security Local and Dedicated adds threat intelligence for IoT security

IBM United States Software Announcement 217-031
January 10, 2017

Table of contents
Key prerequisitesKey prerequisitesTechnical informationTechnical information
Planned availability datePlanned availability dateOrdering informationOrdering information
DescriptionDescriptionTerms and conditionsTerms and conditions
Program numberProgram numberPricesPrices


(Corrected on January 20, 2017)

The Program number and Ordering information sections are revised.

Back to topBack to top

Top rule
Bottom rule

IBM Watson™ IoT Platform Advanced Security visualizes critical risks and enables creation of policy-driven mitigation actions. This combination provides intelligent response to protect Watson™ IoT Platform from compromised devices. Clients may now assess device security threats and initiate effective response actions, accelerating Internet of Things (IoT) adoption while managing brand, reputation and operational risks.

Watson IoT Platform Advanced Security enables visualization, prioritization, and automated response to IoT security events:

  • Security dashboard.
    • Visualize and analyze IoT risk across clients' IoT device landscape in a single, manageable perspective.
    • Gain insight to potential vulnerabilities and exposures across the network.
  • Policy management. Automatic identification of security events in accordance with best-practice policies are tailored to clients' environment. Anticipate threats by defining policy conditions that characterize normal device behaviors and interaction patterns, which include:
    • Connectivity policy that defines communication security by IoT device type
    • Whitelists that define the IoT device set, which is authorized to connect to devices
    • Blacklists that predefine IoT device conditions and attributes that are unauthorized to connect

Back to topBack to top

Top rule
Key prerequisites
Bottom rule

An internet connection is required.

Back to topBack to top

Top rule
Planned availability date
Bottom rule

January 16, 2017

Back to topBack to top

Top rule
Bottom rule

Concerns about IoT security are widespread. Some are unfounded, while others are completely justified. The topic weighs heavily on the minds of consumers and enterprises, impacts the adoption of IoT technologies, and undermines consumer confidence.

Enterprises are hesitant to offer innovative new products and services to clients until security of IoT endpoints is more assured. When consumer confidence is shaken by compromised security, it can take months, even years, to re-build trust that may never be fully restored.

The IoT provides a transformational opportunity for organizations to acquire new data and personalize the relationship with clients to levels never before achieved. Potential risks arise from new sensors and devices exchanging data with enterprise system, opening an attack vector for cyber criminals. It is imperative that organizations are proactive in securing access to minimize IoT security risks.

The IBM Watson IoT Platform offering provides integrity for IoT solutions with security by design:

  • Built intrinsically on the highest standards of security to protect clients' IoT solution integrity. This includes compliance with ISO 27001, a key standard that defines the best practices for information security management processes and ensures that the right measures are implemented, documented, and maintained.
  • Extends robust security to applications and users by leveraging security features, that include Transport Layer Security (TLS) V1.2 communications encryption, configuration management of roles that enable controls to be defined for users, applications, and gateways.
  • Includes the benefits of IBM® Bluemix® and IBM Softlayer operational security capabilities compliant with a wide range of industry standards.

Watson IoT Platform Advanced Security enhances the intrinsic security features in the Watson IoT Platform with enhanced security and risk management features. Clients can visualize critical risks and create policy-driven mitigation actions to automate operational responses for their devices. With the risk and security dashboard, they can assess IoT risk and modeling options to securely accelerate IoT securely.

With increased confidence in critical solution infrastructure, these capabilities enable clients to break down the security barriers impeding adoption of IoT and confidently continue their cognitive journey.

Accessibility by people with disabilities

A US Section 508 Voluntary Product Accessibility Template (VPAT), containing details about accessibility compliance, can be found on the IBM® Accessibility website.

Back to topBack to top

Top rule
Program number
Bottom rule
Program number VRM Program name
5725-Z15 SaaS IBM Watson IoT Platform Dedicated
5737-C79 SaaS IBM Watson IoT Platform Local Advanced Security

Back to topBack to top

Top rule
Offering Information
Bottom rule

Product information is available on the IBM Offering Information website.

More information is also available on the Passport Advantage® and Passport Advantage Express® website.

Back to topBack to top

Top rule
Bottom rule


Back to topBack to top

Top rule
Bottom rule

Software Services

IBM Software Services has the breadth, depth, and reach to manage your services needs. You can leverage the deep technical skills of our lab-based, software services team and the business consulting, project management, and infrastructure expertise of our IBM Global Services team. Also, we extend our IBM Software Services reach through IBM Business Partners to provide an extensive portfolio of capabilities. Together, we provide the global reach, intellectual capital, industry insight, and technology leadership to support a wide range of critical business needs.

IBM Software Services can provide expertise to accelerate IoT adoption by assessing, modelling, and mitigating IoT security risks. Top IBM IoT Professional Services skills are available to support securing IoT solution deployments based on best practice harvested from many significant IoT projects. IBM security services professionals can identify critical risks and exposures in solution infrastructure by using advanced analytic tools. Configure Watson IoT Platform Risk Management policies to address emerging IoT security threats and help you implement Watson IoT Blockchain projects.

Three IoT Security service offerings are provided:

  • An IoT Security Assessment that will assess and report on IoT security risk that is specific to your solution context
  • IoT Security Intelligence services that enables your enterprise to respond IoT Security events by understanding them in real time by using Threat Intelligence tools that are deployed and tuned for your IoT risk profile
  • IoT Security Anonymization services to unlock the value and protect your IoT data by using IBM tooling and experts to deploy active data privacy tools configured for your IoT data flows

IoT Security Assessment

To remain competitive in the marketplace companies are either considering, or have already started to deploy an IoT solution. CIOs, CISOs, and line-of-business leaders may have security concerns around IoT that impedes their decision to move forward with an IoT deployment whether that is at the planning or implementation stage. IBM offers an expert assessment of IoT risk profile, which includes devices, access, and data. Companies will be able to work with IBM IoT and IBM Security experts by using proven Security assessment methodologies to explore and define a IoT Security Strategy. Following this one-week workshop activity, clients will have a more structured IoT Security Plan and the confidence to move forward with their IoT solution.

IoT Security Intelligence

Traditional IT security measures, such as signature-based detection can only address known attacks. The application of IoT devices in different corporate settings and for different purposes mean that it is harder to define known attacks for this landscape. Therefore, behavior-based solutions, such as the IoT Security Intelligence offering, can detect deviations from normal behavior and recognize new attacks or security issues. The solution achieves this through the continuous analysis of IoT network interactions to identify anomalies such as potential attacks, malfunctions, or misconfigurations.

Using IoT Security Intelligence Solution, businesses can utilize a behavior-based IoT Security Intelligence System that identifies anomalies, such as potential attacks, malfunctions, or misconfigurations based on the analysis of IoT events analyze and respond to real-time threats coming from their environment with visualization provided through a viewable dashboard.

IoT Security Anonymization

In today's market place, sharing data for analysis, insights, support or other purposes requires cognizance of compliance both from a data security and legislative standpoint. This requires going beyond simple data deidentification or producing data where records can not be referenced to an original. This prevents the singling out individuals or devices from a dataset. This process is called Anonymized Data. The IoT Security Anonymizer enables the client who uses the IBM Privacy Library to secure data by using a variety of sophisticated algorithms (for example, Lattice Anonymizer, Mondrian Anonymizer, Differential Privacy, Residual Entropy-based Vulnerability Inference), while enforcing Privacy Constraints: k-anonymity, l-diversity, t-closeness. This process leaves the data usable for analysis but completely decouples the dataset from the original records.

This Professional Services offering provides the tooling and IBM expertise to ensure data privacy, while maximizing data utility.

A library of data privacy and utility models

  • Automatically infer data vulnerabilities by detecting sensitive data attributes
  • Ability to learn optimal anonymization rules
  • Selective deidentification and reidentification of data attributes
  • InRich privacy models (k/l/t, differential privacy)
  • Twenty-plus, built-in data types (time series, geolocation, and so on)
  • Ability to scale to large data volumes on Apache Spark

Work with IBM IoT lab services team and IBM Research to create safe data extracts by automatically inferring sensitive attributes that use Residual Entropy-based Vulnerability Inference, and then obfuscating the sensitive data by using a sophisticated algorithms example given, Lattice Anonymizer, Mondrian Anonymizer. Each support various Privacy Constrain k-anonymity, l-diversity, t-closeness. Also supports Differentially Private data release.

To learn more about IBM Software Services, contact your Lab Services Sales or Delivery Leader.

Back to topBack to top

Top rule
Technical information
Bottom rule

Specified operating environment

Software requirements

An internet connection is required.

The program's specifications and specified operating environment information may be found in documentation accompanying the program, if available, such as a readme file, or other information published by IBM, such as an announcement letter. Documentation and other program content may be supplied only in the English language.

Planning information



Back to topBack to top

Top rule
Ordering information
Bottom rule

Product: IBM Watson IoT Platform Dedicated (5725-Z15)

Product: IBM Watson IoT Platform Local Advanced Security (5737-C79)

Passport Advantage

IBM Watson IoT Platform Dedicated (5725-Z15)

Part description Part number
IBM Watson IoT Platform Advanced Security Dedicated Base Instance per Month D1RT1LL
IBM Watson IoT Platform Advanced Security Dedicated Incremental Instance per Month D1RTCLL

IBM Watson IoT Platform Local Advanced Security (5737-C79)

Part description Part number
IBM Watson IoT Platform Advanced Security Local Base Instance per Month D1RTELL
IBM Watson IoT Platform Advanced Security Local Incremental Instance per Month D1RTFLL
IBM Watson IoT Platform Advanced Security Local Instance One Time Set Up D1RU0LL

Charge metric

Program name PID number Charge metric
IBM Watson IoT Platform Dedicated 5725-Z15 Per Instance
IBM Watson IoT Platform Local Advanced Security 5737-C79 Per Instance


Instance is a unit of measure by which the IBM SaaS can be obtained. An Instance is access to a specific configuration of the IBM SaaS. Sufficient entitlements must be obtained for each Instance of the IBM SaaS made available to access and use during the measurement period specified in Client's Proof of Entitlement (PoE) or Transaction Document.

Back to topBack to top

Top rule
Terms and conditions
Bottom rule

The information provided in this announcement letter is for reference and convenience purposes only. The terms and conditions that govern any transaction with IBM are contained in the applicable contract documents such as the IBM International Passport Advantage Agreement, the International Passport Advantage Express Agreement, the Cloud Services Agreement and associated Service Descriptions, or the IBM SaaS Terms of Use.


The IBM International Passport Advantage Agreement and the IBM SaaS Terms of Use or the IBM Cloud Services Agreement (CSA) and the Service Description govern your use of this offering.

Technical support

Technical support is provided for IBM SaaS and enabling software, as applicable, during the subscription period. Any enhancements, updates and other materials provided by IBM as part of any such technical support are considered to be part of IBM SaaS or enabling software, as applicable, and therefore governed by the SaaS Terms of Use or the CSA and associated Service Description. Technical support is included with IBM SaaS and is not available as a separate offering.

Refer to additional technical support information in the IBM Software as a Service Terms of Use document for the program.

Terms of Use

The program's Terms of Use and CSA Service Description document is available on the Software as a Service terms website.

Limited warranty

If warranted, refer to the warranty as stated in the Terms of Use document or the Cloud Services Agreement for this offering.

Money-back guarantee


Volume orders (IVO)


Passport Advantage applies

Yes, information is available on the Passport Advantage and Passport Advantage Express website.

Software Subscription and Support applies


System i Software Maintenance applies


Variable charges apply


Educational allowance available

Not applicable.

Back to topBack to top

Top rule
Statement of good security practices
Bottom rule

IT system security involves protecting systems and information through prevention, detection, and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, or misappropriated or can result in misuse of your systems to attack others. Without a comprehensive approach to security, no IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products, or services to be most effective.

Important: IBM does not warrant that any systems, products, or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.

Back to topBack to top

Top rule
Bottom rule

Business Partner information

If you are an IBM Business Partner -- Distributor for Workstation Software acquiring products from IBM, you may link to Passport Advantage Online for resellers where you can obtain Business Partner pricing information. An IBMid and password are required to access the IBM Passport Advantage website.

Passport Advantage

For Passport Advantage information and charges, contact your IBM representative. Additional information is also available on the Passport Advantage and Passport Advantage Express website.


IBM Watson and Watson are trademarks of IBM Corporation in the United States, other countries, or both.

IBM, PartnerWorld, Passport Advantage, System i, Bluemix and Express are registered trademarks of IBM Corporation in the United States, other countries, or both.

Other company, product, and service names may be trademarks or service marks of others.

Terms of use

IBM products and services which are announced and available in your country can be ordered under the applicable standard agreements, terms, conditions, and prices in effect at the time. IBM reserves the right to modify or withdraw this announcement at any time without notice. This announcement is provided for your information only. Additional terms of use are located at:

Terms of use

For the most current information regarding IBM products, consult your IBM representative or reseller, or visit the IBM worldwide contacts page

IBM United States

Share this page

Digg Linked In

Contact IBM