IBM CORPORATION in Cybersecurity Software

Content Analysis Software Development Kit, Trusteer Apex Advanced Malware Protection, BigFix, Server Protection Endpoint protection products included in the endpoints protection category. This category provides real-time visibility and control across endpoints. Network protection contains products such as IBM X-Force, Network Protection, and IBM Security Network Protection for VMware, SiteProtector System, Network Intrusion Prevention System, and Network Active Bypass. This category provides protection to the entire network from known and unknown threats. It also provides control over application and user behavior. It increases visibility and provides every minute data of Internet threats. Application Security contains products such as AppScan, Arxan Application Protection for IBM Solutions, IBM Application on Cloud, and MobileFirst Platform Application Scanning. IBM Security Guardium, Key Lifecycle Manager, and IBM Security Data Privacy for Hadoop products comes under data security. However, IBM Maas360, and IBM Security AppScan Mobile Analyzer comes under the mobile category, which provides a robust, unified, and scalable solution for organization mobile devices. Security Intelligence and Operations have products such as IBM Resilient Incident Response Platform and QRadar.
Show More

USP :

IBM have category-wise product offerings such as endpoint protection, network protection, mainframe security, application security, data security, security intelligence and operations, advanced fraud detection, cloud, and mobile security and IAM.IBM Identity and access management services help in protecting an organization from breaches, enabling productivity and competitiveness, and achieving and maintaining regulatory compliance. It helps in increasing the maturity of the program with identity and access management services from IBM Security. IBM solutions help in detecting and stopping advanced threats. It automates threat detection and response across the enterprise. IBM monitors and enforces compliance to meet industry standards and security policies. IBM security services enable to activate global intelligence, innovates without introducing risk, and matures with the program over time.

BUYERS
VENDORS
EXPERTS
4.1
ANALYSTS
 

IBM CORPORATION detailed analysis

Product Maturity
Company Maturity
Most IMPORTANT
0.0
0.0
0.0
Breadth and Depth of Product Offerings
3.95
3.20
3.60
Product Features and Functionality
4.55
5.00
5.00
Delivery
3.30
2.50
2.40
Support and Services
3.50
3.85
2.15
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

IBM CORPORATION has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Middle East and Africa

    15 Participants

  • Niche Quadrant

    All-Asia-Pacific

    21 Participants

  • Niche Quadrant

    All-Europe

    24 Participants

STRENGTHS
  • Product Maturity / Products/Solutions Offered / Identity and Access Management (IAM)
    Strong Identity & Access Management
    It allows to access to resources and applications, whether in the cloud, on premise, or in a hybrid cloud. It also offers seamless experience as per users’ expectations while providing access to consumer or employee-facing applications. Show More
  • Product Maturity / Products/Solutions Offered / Unified Threat Management (UTM)
    Intelligent Threat Detection
    It intelligently exposes suspicious activity by turning data into tactile and actionable threat insights that helps to get the real enterprise threats up to 60 times faster with AI and automation to help connect the dots. Show More
  • Product Maturity / Products/Solutions Offered / Firewall 
    Unique Firewall Solution
    It avoids undesirable traffic from hitting the servers, and thereby decreases the attacks on surface and allows resources to be dedicated for their intended uses. Show More
  • Product Maturity / Products/Solutions Offered / Antivirus/Antimalware 
    Investigates malicious attacks
    It permits to retrace the step-by-step actions of a potential attacker and rapidly and easily conduct detailed investigation of suspected malicious network security incidents. This helps the security teams as it takes less time to investigate offense records, in many cases from days to hours—or even minutes. Show More
  • Product Maturity / Products/Solutions Offered / Intrusion Detection System/Intrusion Prevention System (IDS/IPS)
    Robust Security Product
    It provides robust, real-time security monitoring, management and analysis of networks and servers. Its multistep, vendor-neutral approach helps to improve overall security system by offering affordable solution to reduce risk and management complexity. Show More
  • Product Maturity / Breadth and Depth of Product Offerings
    Licenses
  • Product Maturity / Services
    Managed Services
  • Product Maturity / Services
    Professional Services
  • Company Maturity / Breadth of Applications Served
    Tailor-made/customized Solutions
  • Company Maturity / Mergers and Acquisitions Strategy
    Joint Ventures
  • Company Maturity / Mergers and Acquisitions Strategy
    M&A
  • Company Maturity / Mergers and Acquisitions Strategy
    New Partnerships and Collaborations
  • Product Maturity / Support and Services
    Customer Redressal Mechanism/Program
  • Product Maturity / Professional Services
    Consulting
  • Product Maturity / Professional Services
    Support and Maintenance
  • Product Maturity / Professional Services
    Training and Education
  • Company Maturity / Channel Strategy and Fit
    Distibutors Landscape
  • Company Maturity / Viability
    Growth Rate
  • Product Maturity / Channel for Delivery of Support Services
    On-Site Support
  • Product Maturity / Add-on Product/Solutions
    Others
WEAKNESSES
  • Product Maturity
    Lacks command line tools
  • Product Maturity
    Lacks reporting feature
  • Company Maturity / Breadth of Applications Served
    Industry Vertical Addition
  • Product Maturity / Support and Services
    Level of Support
  • Company Maturity / Channel Strategy and Fit
    Business Expansion Strategy
  • Product Maturity / Professional Services
    Risk & Threat Assessment
  • Product Maturity / Add-on Product/Solutions
    Compliance Management
  • Product Maturity / Add-on Product/Solutions
    Incident Response
  • Company Maturity / Vision Alignment
    Patents Registered
  • Product Maturity / Channel for Delivery of Support Services
    Remote Support
  • Product Maturity / Add-on Product/Solutions
    Security Monitoring
  • Product Maturity / Security Type
    Wireless 
  • Company Maturity / Geographic Footprint
    Indirect Presence - Asia-Pacific
  • Company Maturity / Geographic Footprint
    Indirect Presence - Latin America
  • Company Maturity / Geographic Footprint
    Indirect Presence - Middle East and Africa
  • Company Maturity / Application Revenue Slit
    Others - Revenue
  • Product Maturity / Products/Solutions Offered
    Data Loss Prevention (DLP)
  • Product Maturity / Delivery Mode for Client Location
    Per User / Device Basis
  • Product Maturity / Delivery Mode for Client Location
    Subscription / Licensing
  • Product Maturity / Channel of Delivery
    Through Partners / Third-Party Vendors

Have you EVER used IBM CORPORATION Products?

Share your experience with potential buyers.

TOP USECASES
TOP FEATURES
  • Product Features and Functionality
    Professional Services
  • Product Features and Functionality
    Services
  • Products/Solutions Offered
    Distributed Denial of Service Mitigation (DD..
  • Products/Solutions Offered
    Firewall 
  • Products/Solutions Offered
    Security and Vulnerability Management 
  • Products/Solutions Offered
    Disaster Recovery 
  • Products/Solutions Offered
    SIEM
  • Products/Solutions Offered
    Identity and Access Management (IAM)
  • Products/Solutions Offered / Antivirus
    Antimalware 
  • Security Type
    Network 

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

IBM CORPORATION Presence in Cybersecurity Software

Questions & Answers

TOP REVIEWS

Looking for Cybersecurity Software? Get help
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#1 in Cybersecurity Software

“Great stability"

(*)(*)(*)(*)(*)5
It provides inbound, outbound reverse proxying functions as well as SSO functionality with great stability that helps organizations to maintain their strong security posture.
Head - Product Management,Buyer Healthcare
Head - Product Management, Buyer Healthcare
#1 in Cybersecurity Software

“Comprehensive and Powerful Security Solution"

(*)(*)(*)(*)(*)5
It is the most comprehensive and powerful security solution with the added benefit of many next-generation features and excellent correlation. Easy to install, configure and manage. Provides rapid search, quick and easy log source integration, easy and clear report and rule preparation and much more.
Head - Product Management,Buyer Healthcare
Head - Product Management, Buyer Healthcare
#1 in Cybersecurity Software

“Best Security Product"

(*)(*)(*)(*)(*)5
It rapidly detects and reveals any possible threat, uses an advanced Sense Analytics engine to correlate and normalize such data and identifies security attacks. It also consolidates network flow data and record events.
Business Analyst,Company Name Classified
Business Analyst, Company Name Classified
#1 in Cybersecurity Software

“Easy to use"

(*)(*)(*)(*)(*)5
The tool is simple and easy to use, doesn’t slow down any equipment and provides confidence in personal info security along with that of the clients.
Business Analyst,Company Name Classified
Business Analyst, Company Name Classified
#1 in Cybersecurity Software

“Brilliant overall performance"

(*)(*)(*)(*)(*)5
The overall performance of the product is brilliant and far beyond what was experienced in the past with other products. Resources are always preserved to maintain real-time correlation capabilities.