IBM X-Force Exchange Infographic

459 views

Published on

IBM® X-Force® Exchange is a cloud-based, collaborative threat intelligence platform that helps you research the latest global security threats, aggregate actionable intelligence, and collaborate with peers to quickly identify external threats and act on them. To learn more and register for a free 30-day trial of the IBM X-Force Exchange Commercial API, visit http://ibm.co/2elY30M.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
459
On SlideShare
0
From Embeds
0
Number of Embeds
324
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

IBM X-Force Exchange Infographic

  1. 1. Real-time global intelligence from over 270 million endpoints IBM X-Force Exchange 65%use external threat intelligence source as part of their security analytics activities3 51%believe it’s imperative to share threat intelligence with industry peers4 of CISOs of enterprises 9,200 In 2014, a record number of new vulnerabilities were recorded.5 IBM® X-Force® Exchange is a cloud-based threat intelligence sharing platform. It enables you to research the latest global security threats, aggregate actionable intelligence and collaborate with your peers. IBM X-Force Exchange can provide increased threat visibility, improved incident investigation and accelerated response. IBM X-Force Exchange helps you: Quickly research and share information about threats by exploiting the depth and breadth of IBM X-Force research. Capitalize on a simple, powerful user experience to make threat research and sharing more efficient. Incorporate intelligence with security operations and near real-time decision making. Collaborate with your industry peers to improve threat management. IBM X-Force Exchange — quickly gain access to human and machine-generated threat intelligence sourced from:2 © Copyright IBM Corporation 2015. IBM, the IBM logo, are trademarks of IBM Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml. 1 Federal Cybersecurity Duplicity: http://www.networkworld.com/article/2886360/cisco-subnet/federal-cybersecurity-duplicity.html 2 IBM X-Force 3 Jon Oltsik,ESG, http://research.esg-global.com/reportaction/blog0715201401/TOC?include=threat%20intelligence 4 2014 IBM CISO Assessment, http://www-03.ibm.com/security/ciso 5 IBM X-Force Threat Intelligence Quarterly, 1Q 2015, https://www.ibm.com/services/forms/signup.do?source=swg-WW_ Security_OrganicS_PKG=ov33510S_TACT=C327017Wdynform=18101 Try IBM X-Force Exchange  Multiple third party sources of intelligence Web threat monitoring of more than 25 billion web pages and images Intelligence from 8 million spam and phishing attacks Strategic and tactical uses of threat intelligence IBM X-Force Exchange helps you better respond to attacks by: Using threat intelligence feeds as context for enriching alerts and other security Validating and correlating threat intelligence; enriching strategic threat intelligence by linking to indicators and internal threat intelligence Connecting IT resources based on threat intelligence feeds; fraud risk assessment

×