IBM CORPORATION in Industrial Control Systems Security Solutions

IBM Security analyzes and distinguishes real threats from white noise and 'addressed threats’ much faster than other solutions. Integrated IBM solutions deliver advanced automation capabilities as well as strong user and system management abilities for end-to-end security, supplemented with a range of security consulting and managed services. IBM Security solutions can identify the user, location, and time on systems and networks. The additional integration with IBM solutions for analytics, management, and monitoring for individuals, systems, and data provides more insights regarding threats and other security incidents.

IBM QRadar Security Intelligence Platform IBM QRadar is an advanced analytics platform built with an aim to ensure security. It helps detect advanced, hard-to-find threats and eliminate false positives. It combines log events and network flow data from a number of devices, endpoints, and applications distributed throughout the network. Its advanced analytics engine explains events and highlights the footprints left behind.

IBM Security Intelligence Operations and Consulting Services Through this service, IBM helps users in the assessment of security intelligence and operations, offers consultation on building a security operations center, and provides abilities to improve security intelligence, restructure threat analysis, and adopt new use cases and rules.IBM Managed Security Information and Event Management ServicesManaged SIEM Services uses data intelligence and research abilities from IBM X-Force to identify and respond to threats. IBM global security operation centers support these services.

IBM QRadar Advisor with WatsonIBM QRadar Advisor with Watson draws on organized and unorganized data to provide security teams with actionable insights that allow them to discover threats. The solution enables faster deployment with powerful abilities that address the issues of skills shortages, alert overloads, incident response delays, and outdated security information.

IBM QRadar User Behavior AnalyticsIBM’s behavior analytics uses machine learning to track normal user behavior, forecast expected behavior, and detect deviations that can specify an insider threat. Using this solution, security personnel can see the user context of threats as well as find the highest-risk users in the organization.

IBM Managed Detection and Response ServicesThese services are delivered from the global network of IBM X-Force Command Centers, which provide continuous monitoring of enterprise systems (laptops, desktops, and mobile devices). This monitoring solution extends policy configuration and maintenance and enables comprehensive threat-hunting capabilities.

IBM X-Force Incident Response and Intelligence Services (X-Force IRIS)IBM professionals provide a comprehensive solution for users to understand and respond to critical threats more efficiently.

IBM Security Access ManagerIBM Security Access Manager provides combined access management solutions to secure access points by defining and enforcing which resources can be accessed by whom. The solution can automatically terminate access to specific systems to protect data when malicious activity is detected. IBM Security Access Manager can be considered as both a virtual appliance image and a physical appliance, as it is highly scalable and configurable.

IBM Security Identity Governance and IntelligenceThis business-focused solution from IBM is intended to simplify user access provisioning and the certifying and reviewing of policies. It also provides capabilities in the domains of enterprise user lifecycle management, access risk assessment and mitigation, certification, and password management.

USP : The ISS SCADA security solution by IBM has three main components: Intrusion Prevention Systems, SCADA Assessment Services, and IBM Managed Security Systems. IBM Proventia Network Intrusion Prevention System (IPS) has the ability to protect systems from critical vulnerabilities or attacks, while IBM Managed Security Services for clients provides outsourced solutions for comprehensive real-time security management.

BUYERS
VENDORS
EXPERTS
3.6
ANALYSTS

IBM CORPORATION detailed analysis

Product Maturity
Company Maturity
Use Case Maturity
Most IMPORTANT
0.0
0.0
0.0
Feature and Functionality
1.30
2.90
2.65
Services
2.45
3.85
2.85
Pricing
2.10
0.00
0.90
Deployment
3.60
3.90
3.45
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

IBM CORPORATION has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Middle East and Africa

    27 Participants

  • Niche Quadrant

    All-Asia-Pacific

    31 Participants

  • Niche Quadrant

    All-Europe

    34 Participants

SECTORS
REGIONS
North America Latin America Middle East and Africa Europe Asia-Pacific
STRENGTHS
  • Product Maturity / Identity And Access Management / Device c...
    Integrating identity intelligence
    The company provides a robust approach to identity and access management that helps ensure fulfillment of business objectives related to security, productivity, or compliance, both in the short term and as the organization continues to develop in the future. Show More
  • Product Maturity / Identity And Access Management / Session ...
    IBM Security Identity
    IBM Security Identity and Access Assurance offers compliance initiatives, reduces operational costs (by automating manual organizational tasks that can decrease support desk calls), enhances operational security positions, administers and enforces user access to resources, and improves operational proficiencies, thus aiding in the enhancement of user efficiency. Show More
  • Product Maturity / Intrusion Detection System/Intrusion Prev...
    Single-click blocking
    By using Network IPS products, updated security content can be automatically activated and applied to Network IPS appliances. Security content suggests the execution of a ‘set to block’ action and is certified to be free of false positives. Multiple Network IPS appliances deployed in an active/active configuration provide the highest redundancy possible while preserving full session state maintenance between devices. Show More
  • Product Maturity / Intrusion Detection System/Intrusion Prev...
    IBM Security Network IPS appliances
    The IBM® Security Network IPS appliances are purpose-built, Layer 2 network security appliances that you can deploy either at the gateway or the network to block intrusion attempts, denial of service (DoS) attacks, malicious code, backdoors, spyware, peer-to-peer applications, and a growing list of threats without requiring extensive network reconfiguration. Show More
  • Product Maturity / Pricing
    Module Based
  • Product Maturity / Pricing
    Outcome Based
  • Product Maturity / Pricing
    Per User
  • Product Maturity / Post Deployment
    Incident Response
  • Product Maturity / Post Deployment
    Managed Security Services
  • Product Maturity / Implementation Methodology
    Risk and Threat Assessment
  • Product Maturity / Implementation Methodology
    Risk Based Asset Classification
  • Product Maturity / Implementation Methodology
    Risk/VaR Simulation
  • Product Maturity / Modes
    Cloud
  • Product Maturity / Modes
    Hybrid
  • Product Maturity / Modes
    On-premise
  • Product Maturity / Pre Deployment
    Cyber attack simulation
  • Product Maturity / Pre Deployment
    Design & Integration
  • Product Maturity / Pre Deployment
    Implementation
  • Product Maturity / Pre Deployment
    Strategy consulting
  • Product Maturity / Development Tools
    IOC detection tools
WEAKNESSES
  • Product Maturity / Firewall / Network topology vizualization
    Lack of Security Assessements
    Network visibility in terms of security assessments has become a challenge in the current state of network systems which in turn is impacting the risk factor. Show More
  • Product Maturity / Antivirus/Malware / Device Control
    Device Control
    Allowing devices that cannot protect themselves to connect to the network can lead to security incidents for the organization. Show More
  • Product Maturity / Use Cases / Increased productivity / impr...
    Risking Downtime
    As the output of ICS relates to physical processes, any downtime—such as a power outage—can have effects at an organizational level. Show More
  • Product Maturity / Pricing
    As a Service
  • Product Maturity / Pricing
    Per Node/Asset
  • Product Maturity / Integration
    EDDL - Electronic Device Description Language
  • Product Maturity / Integration
    FDT – field device tool
  • Product Maturity / Integration
    ODVA
  • Product Maturity / Post Deployment
    Education & Training
  • Product Maturity / Post Deployment
    Support & Maintenance
  • Product Maturity / Implementation Methodology
    Software Enabled Methodology
  • Product Maturity / Use Cases
    Increased productivity / improve system performance
  • Product Maturity / Development Tools
    Multi-purpose tools
  • Product Maturity / Development Tools
    System artifact review tools
  • Product Maturity / Control systems
    Distributed Control System (DCS)
  • Product Maturity / Control systems
    Engineering workstations
  • Product Maturity / Control systems
    HMI panels
  • Product Maturity / Control systems
    Remote Terminal Unit (RTU)
  • Product Maturity / Oil and gas
    ISA-99 (Industrial Automation & Control Systems Security)
  • Product Maturity / Oil and gas
    WIB M-2784 (Process Control Domain – Security Requirements for Vendors)
See More

Have you EVER used IBM CORPORATION Products?

Share your experience with potential buyers.

TOP FEATURES

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

Questions & Answers

TOP REVIEWS

Get help
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
#2 in Industrial Control Systems Security Solutions

“Better Anomaly Detection solution"

(*)(*)(*)(*)(*)5
The Siemens Secure-NOK SNOK® Network Anomaly Detection solution runs on the RX1500 Application Processing Engine (APE) module. This APE is x86-based and is designed to use a single-line module slot in a Siemens RUGGEDCOM RX1500 device. It is capable of hosting various cyber security solutions such as Next Generation Firewalls and identity-based cloaking solutions. SNOK® Network Anomaly Detection helps Siemens RUGGEDCOM RX1500 with an additional critical layer for its security application capability.
Internal Analyst,MnM
Internal Analyst, MnM
#17 in Industrial Control Systems Security Solutions 9 Reviews

“Real-time monitoring and cyber security services"

(*)(*)(*)(*)(*)5
MSSPs are empowered by the Nozomi Networks solution to provide real-time monitoring and cyber security services for OT networks. It is a multitenant application that provides best-in-class ICS threat detection.
Internal Analyst,MnM
Internal Analyst, MnM
#2 in Industrial Control Systems Security Solutions

“Enhanced network security"

(*)(*)(*)(*)(*)5
Network Security from Siemens helps customers to be prepared for challenges; it helps them use it as a base to build digital enterprises.
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#22 in Industrial Control Systems Security Solutions 10 Reviews

“Embedded security deployment model"

(*)(*)(*)(*)(*)5
Schneider offers an embedded security deployment model for industrial automation interconnectivity. Virtualizations and encryption technologies are used by the company to secure containers for varied applications.
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#5 in Industrial Control Systems Security Solutions

“Good process overview"

(*)(*)(*)(*)(*)5
ABB''''s S+ Operations offers an arranged, and detailed process overview displays to present situational awareness and recognition anywhere in the water facility.
Other,Company Name Classified
Other, Company Name Classified
#2 in Industrial Control Systems Security Solutions

“Robust and easy to use"

(*)(*)(*)(*)(*)5
Siemens’ modern Distributed Control System is robust and easy to use once integrated with all tools. Siemens’ SIMATIC PCS 7 is a process automation software that enables advanced process control, virtual commissioning & process simulation and also monitors plant performance through one integrated engineering system.
Chief Manager - Marketing,Company Name Classified
Chief Manager - Marketing, Company Name Classified
#10 in Industrial Control Systems Security Solutions

“Advanced security solutions"

(*)(*)(*)(*)(*)5
McAfee has always been innovative and hence provides advanced software solutions to manage systems centrally. It also helps prevent the proliferation of unauthorized apps and malware.
Internal Analyst,MnM
Internal Analyst, MnM
#10 in Industrial Control Systems Security Solutions

“Best firewall solution"

(*)(*)(*)(*)(*)5
McAfee Firewall Enterprise uses SecureOS and Type Enforced Access Control to ensure efficient security. SecureOS is a UNIX operating system; it uses Type Enforcement security technology that is patented. This ensures superior network security without the need for emergency security patches.
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#22 in Industrial Control Systems Security Solutions 10 Reviews

“Deploying in high security areas"

(*)(*)(*)(*)(*)5
Access Control Systems are deployed in high-security areas that need monitoring of movement of material or people.
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#10 in Industrial Control Systems Security Solutions

“Provides better antimalware solution"

(*)(*)(*)(*)(*)5
McAfee Firewall Enterprise is an anti-virus module used on HTTP, FTP, and Send mail rules for the detection and subsequent blocking of viruses, spyware, and prohibited MIME extensions.
Chief Product Manager,Company Name Classified
Chief Product Manager, Company Name Classified
#20 in Industrial Control Systems Security Solutions 10 Reviews

“Anomaly Detection"

(*)(*)(*)(*)(*)5
The Anomaly Detection Engine provided by Indegy creates standard baselines, detects deviations, and triggers alerts for suspicious events.
Internal Analyst,MnM
Internal Analyst, MnM
#17 in Industrial Control Systems Security Solutions 9 Reviews

“Application Control"

(*)(*)(*)(*)(*)5
This discovers threats and suspicious behavior related to specific applications.
Internal Analyst,MnM
Internal Analyst, MnM
#22 in Industrial Control Systems Security Solutions 10 Reviews

“Good Security Solution"

(*)(*)(*)(*)(*)5
Network communications can be secured and controlled, and the security solution provided by Schneider can protect network traffic. These solutions help increase productivity as well as improve asset performance.
Internal Analyst,MnM
Internal Analyst, MnM
#28 in Industrial Control Systems Security Solutions

“Excellent end-point protection"

(*)(*)(*)(*)(*)5
Rockwell automation provides an excellent end-point protection software(e.g.antivirus,anti-malware) which control system PCs and keep all signatures up to date
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
#24 in Industrial Control Systems Security Solutions 10 Reviews

“Tracking Advanced Threats"

(*)(*)(*)(*)(*)5
Raytheon Foreground Security model which is V-SOC. The V-SOC model focuses on advanced threats and tracking attacker tactics, techniques, and procedures versus simple alert response. The V-SOC service identifies existing network or host compromises, zero day exploits, data exfiltration, network anomalies, emerging advanced threats, suspicious insider behaviour, use of insecure ports/protocols, and misconfigured devices.
Chief Manager - Marketing,Company Name Classified
Chief Manager - Marketing, Company Name Classified
#28 in Industrial Control Systems Security Solutions

“Support and service"

(*)(*)(*)(*)(*)5
Rockwell Automation has been recognized for its excellent support and service for critical production equipment. The successful completion of their work made a significant contribution and deliver high quality parts on schedule.
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
#12 in Industrial Control Systems Security Solutions 10 Reviews

“Incident response and investigation consultancy services"

(*)(*)(*)(*)(*)5
Kaspersky Lab’s Industrial Systems Emergency Response Team is a project that offers wide range of information services, starting from intelligence on the latest threats and security incidents with mitigation strategies and incident response and investigation consultancy and services. In addition to the latest intelligence about threats and vulnerabilities, Kaspersky Lab’s Industrial CERT shares expertise on compliance.
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
#48 in Industrial Control Systems Security Solutions 10 Reviews

“Quality Processing and Analysis Tool"

(*)(*)(*)(*)(*)5
With the rise in data analytics ,extracting maximum amount of information from available data sources , the company aims to minimise critical activities and protect the vulnerability. It provides national digital defence capacity permitting government bodies to control access to interchange information, according to local legal and regulatory framework .
Internal Analyst,MnM
Internal Analyst, MnM
#29 in Industrial Control Systems Security Solutions

“Excellent ICS security solution"

(*)(*)(*)(*)(*)5
The company identifies privileged account risks by locating all privileged user and application accounts, credentials and trust relationships, including accounts associated with remote access. It reduces the risk of unauthorized access to critical systems by securing and controlling access to privileged accounts.
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
#28 in Industrial Control Systems Security Solutions

“Highly focused and skilled"

(*)(*)(*)(*)(*)5
Rockwell team is highly focused, skilled and professional. They have been successful with the work they have been awarded by delivering what was needed on time and on budget. Rockwell intrusion prevention system (IPS) inspects traffic coming from both the enterprise and external networks, and can block traffic that it determines to be malicious.