SHARE
Facebook X Pinterest WhatsApp

IBM Aims to ‘SMash’ Web 2.0 Threats

IBM has announced a technology to secure enterprise mashups — the applications built from cobbling together data from multiple sources. SMash — short for “Secure Mashup” — compartmentalizes the underlying code of the applications combined in a mashup. The partitioned code is then brought together through a secured channel. Mashups are a part of IBM’s […]

Mar 17, 2008
Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

IBM has announced a technology to secure enterprise mashups — the applications built from cobbling together data from multiple sources.

SMash — short for “Secure Mashup” — compartmentalizes the underlying code of the applications combined in a mashup. The partitioned code is then brought together through a secured channel.

Mashups are a part of IBM’s broader agenda of infusing business applications with Web 2.0 features to improve workplace collaboration, data accessibility and, ultimately, the business decisions that companies make.

“Web 2.0 is fundamentally about empowering people, and has created a societal shift in the way we organize, access and use information,” IBM Fellow and Vice President Rod Smith said in a statement.

“Security concerns can’t be a complete inhibitor or clients lose out on the immense benefit mashups bring,” he said.

In October, IBM first unveiled its Mashup Starter Kit, a suite of tools for non-technical workers to create mashup applications through an intuitive series of mouse clicks.

Using an enterprise mashup, companies could — for instance — pair real-time traffic or weather data with distribution schedules to ensure that shipping routes are not disrupted.

A recent study conducted by IBM’s X-Force Security Team highlighted the need for securing Web browsers, finding that they are becoming the entry point to sensitive data for increasingly sophisticated cyber criminals. Hacking a browser would enable crooks to access data behind the company’s firewall.

This article was first published on InternetNews.com. To read the full article, click here.

  SEE ALL
APPLICATIONS ARTICLES
 
KC

Kenneth Corbin is a Datamation contributor.

Recommended for you...

8 Best Data Analytics Tools: Gain Data-Driven Advantage
Common Data Visualization Examples: Transform Numbers into Narratives
Liz Ticong
May 20, 2024
10 Best Cloud-Based Project Management Software Platforms of 2024
Leon Yen
May 14, 2024
HubSpot CRM vs. Salesforce: Head-To-Head Comparison (2024)
Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.