IBM CORPORATION in Industrial Control Systems Security Solutions

IBM CORPORATION
Online
New York, USA
1911
$50BN to $100BN
Enterprise
80 Likes
71 Buyers are Negotiating "Group Buyer Deal"

IBM CORPORATION USP

The ISS SCADA security solution by IBM has three main components: Intrusion Prevention Systems, SCADA Assessment Services, and IBM Managed Security Systems. IBM Proventia Network Intrusion Prevention System (IPS) has the ability to protect systems from critical vulnerabilities or attacks, while IBM Managed Security Services for clients provides outsourced solutions for comprehensive real-time security management. Request IBM CORPORATION Pricing to get more information.

Summary

IBM Security analyzes and distinguishes real threats from white noise and 'addressed threats’ much faster than other solutions. Integrated IBM solutions deliver advanced automation capabilities as well as strong user and system management abilities for end-to-end security, supplemented with a range of security consulting and managed services. IBM Security solutions can identify the user, location, and time on systems and networks. The additional integration with IBM solutions for analytics, management, and monitoring for individuals, systems, and data provides more insights regarding threats and other security incidents.

IBM QRadar Security Intelligence Platform IBM QRadar is an advanced analytics platform built with an aim to ensure security. It helps detect advanced, hard-to-find threats and eliminate false positives. It combines log events and network flow data from a number of devices, endpoints, and applications distributed throughout the network. Its advanced analytics engine explains events and highlights the footprints left behind.

IBM Security Intelligence Operations and Consulting Services Through this service, IBM helps users in the assessment of security intelligence and operations, offers consultation on building a security operations center, and provides abilities to improve security intelligence, restructure threat analysis, and adopt new use cases and rules.IBM Managed Security Information and Event Management ServicesManaged SIEM Services uses data intelligence and research abilities from IBM X-Force to identify and respond to threats. IBM global security operation centers support these services.

IBM QRadar Advisor with WatsonIBM QRadar Advisor with Watson draws on organized and unorganized data to provide security teams with actionable insights that allow them to discover threats. The solution enables faster deployment with powerful abilities that address the issues of skills shortages, alert overloads, incident response delays, and outdated security information.

IBM QRadar User Behavior AnalyticsIBM’s behavior analytics uses machine learning to track normal user behavior, forecast expected behavior, and detect deviations that can specify an insider threat. Using this solution, security personnel can see the user context of threats as well as find the highest-risk users in the organization.

IBM Managed Detection and Response ServicesThese services are delivered from the global network of IBM X-Force Command Centers, which provide continuous monitoring of enterprise systems (laptops, desktops, and mobile devices). This monitoring solution extends policy configuration and maintenance and enables comprehensive threat-hunting capabilities.

IBM X-Force Incident Response and Intelligence Services (X-Force IRIS)IBM professionals provide a comprehensive solution for users to understand and respond to critical threats more efficiently.

IBM Security Access ManagerIBM Security Access Manager provides combined access management solutions to secure access points by defining and enforcing which resources can be accessed by whom. The solution can automatically terminate access to specific systems to protect data when malicious activity is detected. IBM Security Access Manager can be considered as both a virtual appliance image and a physical appliance, as it is highly scalable and configurable.

IBM Security Identity Governance and IntelligenceThis business-focused solution from IBM is intended to simplify user access provisioning and the certifying and reviewing of policies. It also provides capabilities in the domains of enterprise user lifecycle management, access risk assessment and mitigation, certification, and password management.

Discussions

1
Add Requirements
Added Requirements
“I am looking for a Industrial Control Systems Security Solutions in north America. My budget is $50,000. Looking to buy in 15 days.”
2
Select Vendors
IBM CORPORATION
71 Buyers Negotiating
3
Send Requirement
Get Vendors & Experts Response To Each Requirement Within Hours.
Requirements submitted successfully.
ops! Something went wrong. Please try again later.
Strengths
  • +8
    Integrating identity intelligence
  • +7
    IBM Security Identity
  • +6
    Single-click blocking
  • +5
    IBM Security Network IPS appliances
  • +8
    Module Based
  • +14
    Outcome Based
  • +6
    Per User
  • +5
    Incident Response
  • +10
    Managed Security Services
  • +5
    Risk and Threat Assessment
  • +7
    Risk Based Asset Classification
  • +8
    Risk/VaR Simulation
  • +9
    Cloud
  • +12
    Hybrid
  • +10
    On-premise
  • +13
    Cyber attack simulation
  • +7
    Design & Integration
  • +14
    Implementation
  • +9
    Strategy consulting
  • +10
    IOC detection tools
Weaknesses
  • -12
    Lack of Security Assessements
  • -12
    Device Control
  • -11
    Risking Downtime
  • -5
    As a Service
  • -7
    Per Node/Asset
  • -13
    EDDL - Electronic Device Description Language
  • -12
    FDT – field device tool
  • -11
    ODVA
  • -9
    Education & Training
  • -11
    Support & Maintenance
  • -9
    Software Enabled Methodology
  • -5
    Increased productivity / improve system performance
  • -8
    Multi-purpose tools
  • -12
    System artifact review tools
  • -6
    Distributed Control System (DCS)
  • -6
    Engineering workstations
  • -7
    HMI panels
  • -10
    Remote Terminal Unit (RTU)
  • -12
    ISA-99 (Industrial Automation & Control Systems Security)
  • -13
    WIB M-2784 (Process Control Domain – Security Requirements for Vendors)

IBM CORPORATION Reviews

user-icon

James Smith

4
Apr 11, 2019

“Best security intelligence”

IBM Cloud uses security analytics to detect and respond to threats faster. It monitors and gains security intelligence in hybrid cloud deployment.
Useful (2) Not useful (0)
user-icon

James Smith

3
Apr 11, 2019

“Integrated enterprise security”

IBM provides integrated enterprise security products and services. IBM X-Force research and development support the portfolio of these products and services.
Useful (0) Not useful (0)
user-icon

Buyer, Power, SME

2
Apr 11, 2019

“Up to date threat intelligence platform”

IBM X-Force security experts search and respond to threats and use the latest threat intelligence to prevent breaches.
Useful (0) Not useful (0)
user-icon

Buyer, Energy and Utilities, SME

1
Apr 11, 2019

“Excellent network security services”

IBM Cloud offer network security services to safeguard workloads from network threats. IBM experts guide and provide knowledge in physical security and network isolation and protection to implement a network security solution, thereby secure information assets in a cost-effective manner.
Read less Read more
Useful (0) Not useful (0)
user-icon

Buyer, Power, SME

2
Apr 11, 2019

“Faster threat response”

Monitoring and logging solutions are developed and deployed for all ICS applications and infrastructure. These solutions use proactive measures to help provide faster response to threats and prevent attacks.
Read less Read more
Useful (0) Not useful (0)
I agree to 360Quadrants Terms of use and privacy policy
Success
info
Error

360Quadrants