IBM CORPORATION in Cybersecurity Software

Are you from this Company ?
Online
New York, USA
1911
$50BN to $100BN
Enterprise
70 Likes
62 Buyers Negotiating

IBM USP

IBM offers category-wise products which include endpoint protection, network protection, mainframe security, application security, data security, security intelligence and operations, advanced fraud detection, cloud, and mobile security and IAM. IBM Identity and access management services help in protecting an organization from breaches, enhances productivity and competitiveness, and achieves and maintains regulatory compliance. It helps in increasing the maturity of the program with identity and access management services from IBM Security. IBM solutions help in detecting and stopping advanced threats. It automates threat detection and response across the enterprise. The business strategies and product functionalities of IBM make it one of the top cybersecurity Vendors.

Request IBM Pricing to get more information.

Summary

IBM provides real-time visibility and control across endpoints. The company provides services like Content Analysis Software Development Kit, Trusteer Apex Advanced Malware Protection, BigFix, Server Protection Endpoint protection etc. IBM provides protection to the entire enterprise network from known and unknown threats. It also provides control over application and user behavior. It increases visibility and provides every minute data of Internet threats. IBM Maas360 and IBM Security AppScan Mobile Analyzer provide a robust, unified, and scalable solution for organization mobile devices. The company's Security Intelligence and Operations offer products such as IBM Resilient Incident Response Platform and QRadar.

IBM Pricing
IBM pricing has not been disclosed by the vendor. However, it is in line with the competitors in the market. Users can contact the vendor for getting more details & competitive pricing.

IBM Demo
To know better about IBM, the users can have a look at a website and go through the various features offered about it. For more information and demo, the users can request the website and get across the demo soon.

Features:

  • A dynamic approach that strategizes before, after and during a potential breach
  • Offers cloud security services that will protect you and give you complete visibility, control and security.
  • Helps in automating and integrating security into the continuous deployment pipeline
  • Make use of DevOps and Agile methods to utilize identity and access management services
  • Embrace the potential of privileged access management

Discussions

1
Add Requirements
Added Requirements
“I am looking for a Cybersecurity Software in north America. My budget is $50,000. Looking to buy in 15 days.”
2
Select Vendors
IBM
62 Buyers Negotiating
3
Send Requirement
Get Vendors & Experts Response To Each Requirement Within Hours.
Requirements submitted successfully.
ops! Something went wrong. Please try again later.
Strengths
  • +13
    Strong Identity & Access Management
  • +12
    Intelligent Threat Detection
  • +11
    Unique Firewall Solution
  • +10
    Investigates malicious attacks
  • +9
    Robust Security Product
  • +10
    Licenses
  • +13
    Managed Services
  • +12
    Professional Services
  • +7
    Customer-Friendly
  • +14
    Consulting
  • +5
    Support and Maintenance
  • +6
    Training and Education
  • +9
    On-Site Support
  • +6
    Others
  • +9
    Application security
  • +10
    Cloud security
  • +8
    Endpoint security
  • +7
    Network security
  • +13
    Directly
  • +9
    Cloud
Weaknesses
  • -8
    Lacks command line tools
  • -7
    Lacks reporting feature
  • -5
    Breadth and Depth of Product Offerings
  • -7
    Delivery
  • -6
    Product Features and Functionality
  • -6
    Customer- Level of Support
  • -7
    Risk & Threat Assessment
  • -14
    Compliance Management
  • -5
    Incident Response
  • -10
    Remote Support
  • -13
    Security Monitoring
  • -11
    Wireless security
  • -8
    Data Loss Prevention (DLP)
  • -12
    Per User / Device Basis
  • -11
    Subscription / Licensing
  • -14
    Third-Party Vendors
  • -11
    CIO
  • -9
    CISO
  • -10
    ISO
  • -8
    System Administrator

IBM Reviews

user-icon

Buyer, Healthcare, SME

5
Jun 07, 2019

“Comprehensive and Powerful Security Solution”

It is the most comprehensive and powerful security solution with the added benefit of many next-generation features and excellent correlation. Easy to install, configure and manage. Provides rapid search, quick and easy log source integration, easy and clear report and rule preparation and much more.
Read less Read more
Useful (0) Not useful (0)
user-icon

Buyer, Manufacturing, SME

5
Jun 07, 2019

“Great stability”

It provides inbound, outbound reverse proxying functions as well as SSO functionality with great stability that helps organizations to maintain their strong security posture.
Useful (0) Not useful (0)
user-icon

Buyer, Media & Entertainment, SME

2
Jun 07, 2019

“Easy to use”

The tool is simple and easy to use, doesn’t slow down any equipment and provides confidence in personal info security along with that of the clients.
Useful (0) Not useful (0)
user-icon

Buyer, Healthcare, SME

3
Jun 07, 2019

“Best Security Product”

It rapidly detects and reveals any possible threat, uses an advanced Sense Analytics engine to correlate and normalize such data and identifies security attacks. It also consolidates network flow data and record events.
Read less Read more
Useful (0) Not useful (0)
user-icon

Buyer, Media & Entertainment, SME

3
Jun 07, 2019

“Brilliant overall performance”

The overall performance of the product is brilliant and far beyond what was experienced in the past with other products. Resources are always preserved to maintain real-time correlation capabilities.
Useful (0) Not useful (0)
IBM Presence in Cybersecurity Software
IBM is headquartered in New York, US. The company is a diversified computer technology and consulting corporation, engaged in offering delivery and implementation services, enterprise software systems, and financing solutions. The company operates in 5 business segments, namely, Global Technology Services (GTS), Global Business Services (GBS), software, systems and technology, and global financing. IBM is one of the leading vendors of cybersecurity solutions and services. It made an early move toward incorporating cognitive technologies in the cybersecurity market space. IBM understands employing security products from several vendors with big skill gaps largely increases the complexity of enterprises’ security infrastructure and the cost to manage the infrastructure. It also believes that adding more security tools incurs extra costs to install, configure, manage, and patch these security tools. To reduce this burden and ensure optimal security, the company developed a security framework-powered security analytics and intelligent orchestration, which can incorporate all kinds of security solutions and technologies from diverse vendors. The company has been very successful in the recent years with its cognitive security solutions and services and is expecting greater demand in the upcoming years. Moreover, the company also focuses on developing new products and services using the strategy of acquisitions and partnerships. These strategies have helped it further innovate its product offerings, acquire new customers, and expand its global presence.
I agree to 360Quadrants Terms of use and privacy policy
Success
info
Error
Company Size :
  Enterprise
  SME
  Startup