Trends

DT taps IBM’s AI to speed up security patching

What happened: Deutsche Telekom drafts in IBM for AI upgrade to security processes Deutsche Telekom has deployed IBM Concert, an AI-driven automation platform, to overhaul its security patching procedures. The system brings together vulnerability data, patch deployment tools, and reporting functions…

IBM Concert patch automation

Headline

What happened: Deutsche Telekom drafts in IBM for AI upgrade to security processes Deutsche Telekom has deployed IBM Concert, an AI-driven automation platform, to overhaul its security patching procedures. The system brings together vulnerability data, patch deployment tools,…

Context

Deutsche Telekom has deployed IBM Concert , an AI-driven automation platform, to overhaul its security patching procedures. The system brings together vulnerability data, patch deployment tools, and reporting functions, creating a “single source of truth.” A pilot test saw the Median Time to Patch for critical vulnerabilities drop from 80 hours to just eight hours—a ten‑fold improvement. IBM Concert has also reduced average patching duration from around 90 minutes to 20 minutes per instance, helping DT accelerate software updates and improve cybersecurity.

Evidence

Pending intelligence enrichment.

Analysis

Also read: Deutsche Telekom sets up sovereign cloud unit Also read: Deutsche Telekom and Nvidia to build AI cloud in Germany The AI-powered system addresses one of the most laborious tasks in IT security: patch management. As the volume of enterprise applications grows—IDC estimates one billion new apps by 2028—manual patching becomes both risky and unsustainable. Automating this process can reduce costs, tighten compliance, and improve response to emerging vulnerabilities. However, the long‑term benefits will depend on whether DT and IBM can scale the solution across hybrid cloud platforms without losing flexibility or control over security protocols.

Key Points

  • Deutsche Telekom and IBM deployed IBM Concert to automate patch management, delivering up to tenfold faster response to critical vulnerabilities.
  • As software volumes grow, such AI automation becomes crucial—but scaling it securely and flexibly remains a challenge.

Actions

Pending intelligence enrichment.

Author

Juno Chen