View all newsletters
Receive our newsletter - data, insights and analysis delivered to you

IBM Security Taps Into AI Technologies

IBM Security brings the power of artificial intelligence to security developments, offering a seamless approach to detecting threats.

By April Slattery

IBM has revealed new technology and services that improve the way security teams use human machine and intelligence to fight, defend and respond to cyber-attacks.

The new technology contains a Resilient Incident Response Platform (IRP), which combined with Intelligent Orchestration can help significantly accelerate the incident response time.

IBM’s platform delivers the three key components required for a Security Operations and Response model, according to Gartner, into a single integrated platform. These include Security Orchestration and Automation, Security Incident Response Platforms and Threat Intelligence Platforms.

Delivering these capabilities through a unified platform offers an open platform to work on, with a new ‘drag and drop’ workflow engine, allowing workers to move and re-use integrations as security environments or plans change.

Organisations will benefit from the capabilities by improving the speed and agility of response process in addition to achieving rapid time to value of their security investments.

The power behind IBM’s Intelligent Orchestration is the ecosystem of partner integrations, such as Cisco and McAfee, which enables security teams to have an open and easy portal to share data and actions between solutions and security tools.

Activities across partner technologies, such as monitoring and escalation, identification and enrichment, communication and coordination, or containment, response, and recovery are automatically initiated using the platform and thus making a seamless execution.

Content from our partners
Green for go: Transforming trade in the UK
Manufacturers are switching to personalised customer experience amid fierce competition
How many ends in end-to-end service orchestration?

Delivered via the IBM Security App Exchange, these integrations are enterprise-grade applications that can be easily added to any workflow.

Automation & Integration

Another key capability for connecting machine and human intelligence is the new IBM X-Force Threat Management services, using an AI engine to automate how IBM Security Services manages active threats for clients.

The platform joins together tools from IBM and various partners with machine learning and AI algorithms embedded into the platform, which aims to guide analysts through the threat management process and automates simple functions.

Integrating AI and machine learning into the platform removes the need or human intervention and instead automates certain steps in threat management, by using three AI engines to compare incidents against 600,000 past use cases.

The additional level of analysis added to IBM’s platform allows the system to automatically initiate specific actions of protection, such as dismissing false positive or duplicate alerts or escalating the incident for further investigation by a higher security analyst.

Using the new Resilient IRP, IBM’s system will also support the composition of more complex response activities from the platform and give customers the powerful tool to prioritize attacks, accurately identify the critical incidents, and automate tasks more efficiently.

“The collaboration between humans and intelligent machines is going to affect every industry,” said Marc van Zadelhoff, General Manager, IBM Security.

“In security, we see this manifesting itself first in the security operations center where the data only keeps growing. Companies have an opportunity with breakthroughs like AI for active threat management and Intelligent Orchestration to rewire incident response procedures for the age of intelligence.”

IBM also recently announced new ‘Skinny’ Mainframes, to accelerate the processing of encrypted transactions on a single system.

Topics in this article : , , ,
Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU