IBM CORPORATION in Anomaly Detection Software

IBM cloud security provides a framework that effectively addresses issues of anomaly protection, visibility, access control, and policy enforcement.
  • IBM mainframe security solutions protect enterprises by detecting threats, complying with policy and regulations, and reducing costs. In the area of advanced fraud protection, the company delivers an intelligence-based, cybercrime prevention platform that helps prevent the root cause of frauds, improves the customer experience, reduces operational impact, and utilizes global intelligence services.
  • IBM Security Guardian is designed to safeguard critical data. This data protection platform empowers security teams to automatically analyze what is happening across the data environment to help minimize risks, protect sensitive data from internal and external threats, and seamlessly adapt to changes that affect data security.
  • Security IAM solutions help by protecting and monitoring user access in multi-perimeter environments with the help of context-based access control, security policy enforcement, and business-driven identity governance.
  • IBM security intelligence and analytics products provide SIEM, log management, configuration management, vulnerability management, risk management, incident forensics, and behavioral analysis and anomaly detection capabilities. The QRadar NAD appliance leverages the QRadar security intelligence platform and is designed to complement IBM Siteprotector and IBM Security Network IPS Deployments.

USP : IBM is a prominent player in the field of anomaly detection market. The company provides various services in the area of intrusion detection. Some of these are threat monitoring, multi-vendor intrusion detection, and threat analysis services. IBM has several product offerings, such as cloud security, mainframe security, advanced fraud protection, and endpoint and data security.

BUYERS
VENDORS
EXPERTS
4.3
ANALYSTS
 

IBM CORPORATION detailed analysis

Product Maturity
Company Maturity
Use Case Maturity
Most IMPORTANT
4.2
4.2
3.0
Breadth and Depth of Product Offerings
4.50
4.50
4.25
Product Features and Functionality
3.85
4.65
1.55
Product Branding
5.00
4.60
4.80
Product Differentiation and Impact on Customer Value
3.80
2.65
1.05
Product Quality and Reliability
3.65
4.20
4.35
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

IBM CORPORATION has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Middle East and Africa

    17 Participants

  • Niche Quadrant

    All-Asia-Pacific

    16 Participants

  • Niche Quadrant

    All-Europe

    21 Participants

STRENGTHS
  • Product Maturity
    Breadth and Depth of Product Offerings
  • Product Maturity
    Product Branding
  • Product Maturity / Products Offered
    Network Behaviour Anomoly Detection
  • Product Maturity / Products Offered
    User Behaviour Anomoly Detection
  • Product Maturity / Technology Offered
    Big Data Analytics
  • Product Maturity / Technology Offered
    Data Mining & Business Intelligence
  • Product Maturity / Technology Offered
    Machine Learning & AI
  • Product Maturity / Solutions Offered
    Identity and access management (IAM)
  • Product Maturity / Solutions Offered
    Network Traffic Analytics (Traffic Monitoring)
  • Product Maturity / Solutions Offered
    SIEM(Log Management)
  • Product Maturity / Solutions Offered
    Threat Intelligence and Management
  • Product Maturity / Services Offered
    Business Consulting Services
  • Product Maturity / Services Offered
    Integration & Deployment
  • Product Maturity / Services Offered
    Other Services
  • Product Maturity / End-Users
    Large Enterprises
  • Product Maturity / End-Users
    SME's
  • Product Maturity / Solutions Offered
    Data Loss Prevention (DLP)
  • Product Maturity / Solutions Offered
    Risk Mitigation and Management (Network Dectection)
  • Product Maturity / Medium of Delivery of Support Services
    On-Site Support
  • Product Maturity / Medium of Delivery of Support Services
    Remote Support
WEAKNESSES

Have you EVER used IBM CORPORATION Products?

Share your experience with potential buyers.

TOP FEATURES
  • Product Features and Functionality
    Solutions Offered
  • Technology Offered
    Machine Learning & AI
  • Technology Offered
    Big Data Analytics
  • Solutions Offered
    SIEM(Log Management)
  • Solutions Offered
    Data Loss Prevention (DLP)
  • Solutions Offered
    Threat Intelligence and Management
  • End-Users
    Large Enterprises
  • Products Offered
    Network Behaviour Anomoly Detection
  • Industry Verticals
    Retail and Consumer Goods
  • Industry Verticals
    Manufacturing

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

IBM CORPORATION Presence in Anomaly Detection Software

Questions & Answers

TOP REVIEWS

Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.