IBM CORPORATION in Cybersecurity Software

IBM provides real-time visibility and control across endpoints. The company provides services like Content Analysis Software Development Kit, Trusteer Apex Advanced Malware Protection, BigFix, Server Protection Endpoint protection etc. IBM provides protection to the entire enterprise network from known and unknown threats. It also provides control over application and user behavior. It increases visibility and provides every minute data of Internet threats. IBM Maas360 and IBM Security AppScan Mobile Analyzer provide a robust, unified, and scalable solution for organization mobile devices. The company's Security Intelligence and Operations offer products such as IBM Resilient Incident Response Platform and QRadar.

USP :

IBM offers category-wise products which include endpoint protection, network protection, mainframe security, application security, data security, security intelligence and operations, advanced fraud detection, cloud, and mobile security and IAM. IBM Identity and access management services help in protecting an organization from breaches, enhances productivity and competitiveness, and achieves and maintains regulatory compliance. It helps in increasing the maturity of the program with identity and access management services from IBM Security. IBM solutions help in detecting and stopping advanced threats. It automates threat detection and response across the enterprise. 

BUYERS
VENDORS
EXPERTS
4.1
ANALYSTS
 

IBM CORPORATION detailed analysis

Product Maturity
Company Maturity
Most IMPORTANT
0.0
0.0
0.0
Breadth and Depth of Product Offerings
3.95
3.20
3.60
Product Features and Functionality
4.55
5.00
5.00
Delivery
3.30
2.50
2.40
Support and Services
3.50
3.85
2.15
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

IBM CORPORATION has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Middle East and Africa

    15 Participants

  • Niche Quadrant

    All-Asia-Pacific

    21 Participants

  • Niche Quadrant

    All-Europe

    24 Participants

STRENGTHS
  • Product Maturity / Products/Solutions Offered / Identity and...
    Strong Identity & Access Management
    It allows to access to resources and applications, whether in the cloud, on premise, or in a hybrid cloud. It also offers seamless experience as per users’ expectations while providing access to consumer or employee-facing applications. Show More
  • Product Maturity / Products/Solutions Offered / Unified Thre...
    Intelligent Threat Detection
    It intelligently exposes suspicious activity by turning data into tactile and actionable threat insights that helps to get the real enterprise threats up to 60 times faster with AI and automation to help connect the dots. Show More
  • Product Maturity / Products/Solutions Offered / Firewall 
    Unique Firewall Solution
    It avoids undesirable traffic from hitting the servers, and thereby decreases the attacks on surface and allows resources to be dedicated for their intended uses. Show More
  • Product Maturity / Products/Solutions Offered / Antivirus/An...
    Investigates malicious attacks
    It permits to retrace the step-by-step actions of a potential attacker and rapidly and easily conduct detailed investigation of suspected malicious network security incidents. This helps the security teams as it takes less time to investigate offense records, in many cases from days to hours—or even minutes. Show More
  • Product Maturity / Products/Solutions Offered / Intrusion De...
    Robust Security Product
    It provides robust, real-time security monitoring, management and analysis of networks and servers. Its multistep, vendor-neutral approach helps to improve overall security system by offering affordable solution to reduce risk and management complexity. Show More
  • Product Maturity / Breadth and Depth of Product Offerings
    Licenses
  • Product Maturity / Services
    Managed Services
  • Product Maturity / Services
    Professional Services
  • Product Maturity / Support and Services
    Customer Redressal Mechanism/Program
  • Product Maturity / Professional Services
    Consulting
  • Product Maturity / Professional Services
    Support and Maintenance
  • Product Maturity / Professional Services
    Training and Education
  • Product Maturity / Channel for Delivery of Support Services
    On-Site Support
  • Product Maturity / Add-on Product/Solutions
    Others
  • Product Maturity / Security Type
    Application 
  • Product Maturity / Security Type
    Cloud 
  • Product Maturity / Security Type
    Endpoint 
  • Product Maturity / Security Type
    Network 
  • Product Maturity / Channel of Delivery
    Directly
  • Product Maturity / Deployment Model
    Cloud
WEAKNESSES
  • Product Maturity
    Lacks command line tools
    It lacks the user-level command line tools which is sometimes cumbersome Show More
  • Product Maturity
    Lacks reporting feature
    The controlling feature needs to improve and it lacks strong reporting feature Show More
  • Product Maturity / Support and Services
    Level of Support
  • Product Maturity / Professional Services
    Risk & Threat Assessment
  • Product Maturity / Add-on Product/Solutions
    Compliance Management
  • Product Maturity / Add-on Product/Solutions
    Incident Response
  • Product Maturity / Channel for Delivery of Support Services
    Remote Support
  • Product Maturity / Add-on Product/Solutions
    Security Monitoring
  • Product Maturity / Security Type
    Wireless 
  • Product Maturity / Products/Solutions Offered
    Data Loss Prevention (DLP)
  • Product Maturity / Delivery Mode for Client Location
    Per User / Device Basis
  • Product Maturity / Delivery Mode for Client Location
    Subscription / Licensing
  • Product Maturity / Channel of Delivery
    Through Partners / Third-Party Vendors
  • Product Maturity / End Users
    CIO
  • Product Maturity / End Users
    CISO
  • Product Maturity / End Users
    ISO
  • Product Maturity / End Users
    System Administrator
  • Product Maturity
    Breadth and Depth of Product Offerings
  • Product Maturity / End Users
    Others, Please Specify
  • Product Maturity / Products/Solutions Offered
    Antivirus/Antimalware 
See More

Have you EVER used IBM CORPORATION Products?

Share your experience with potential buyers.

TOP FEATURES
  • Product Features and Functionality
    Professional Services
  • Products/Solutions Offered
    Unified Threat Management (UTM)
  • Products/Solutions Offered
    Firewall 
  • Product Features and Functionality
    Services
  • Security Type
    Network 
  • Products/Solutions Offered / Antivirus
    Antimalware 
  • Products/Solutions Offered
    Identity and Access Management (IAM)
  • Products/Solutions Offered
    Security and Vulnerability Management 
  • Products/Solutions Offered / Intrusion Detection System/Intr..
    IPS)
  • Professional Services
    Training and Education

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

IBM CORPORATION Presence in Cybersecurity Software

Questions & Answers

TOP REVIEWS

Get help
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#1 in Cybersecurity Software

“Great stability"

(*)(*)(*)(*)(*)5
It provides inbound, outbound reverse proxying functions as well as SSO functionality with great stability that helps organizations to maintain their strong security posture.
Head - Product Management,Buyer Healthcare
Head - Product Management, Buyer Healthcare
#1 in Cybersecurity Software

“Comprehensive and Powerful Security Solution"

(*)(*)(*)(*)(*)5
It is the most comprehensive and powerful security solution with the added benefit of many next-generation features and excellent correlation. Easy to install, configure and manage. Provides rapid search, quick and easy log source integration, easy and clear report and rule preparation and much more.
Head - Product Management,Buyer Healthcare
Head - Product Management, Buyer Healthcare
#1 in Cybersecurity Software

“Best Security Product"

(*)(*)(*)( )( )3
It rapidly detects and reveals any possible threat, uses an advanced Sense Analytics engine to correlate and normalize such data and identifies security attacks. It also consolidates network flow data and record events.
Business Analyst,Company Name Classified
Business Analyst, Company Name Classified
#1 in Cybersecurity Software

“Brilliant overall performance"

(*)(*)(*)( )( )3
The overall performance of the product is brilliant and far beyond what was experienced in the past with other products. Resources are always preserved to maintain real-time correlation capabilities.
Business Analyst,Company Name Classified
Business Analyst, Company Name Classified
#1 in Cybersecurity Software

“Easy to use"

(*)(*)( )( )( )2
The tool is simple and easy to use, doesn’t slow down any equipment and provides confidence in personal info security along with that of the clients.
...

Marie Stelle

Engagement Partner - 360Quadrants.com