SlideShare a Scribd company logo
IBM Security Data Sheet
Highlights
• Develops security protection that forms the foundation of
IBM Security
• Researches and analyzes security threats, vulnerabilities
and exploits
• Creates proactive countermeasure technologies
• Collaborates with leading public and private organizations
to help enhance internet security worldwide
• Educates the public about emerging threats
IBM X-Force Research
IBM X-Force helps organizations stay ahead of
emerging threats with security research
IBM® X-Force® Research provides the foundation for IBM’s preemptive
approach to Internet security. This industry-leading group of security experts
focuses on researching and evaluating vulnerabilities, threats and security
issues; developing assessments and countermeasure technology for IBM
products; and educating the public about emerging Internet threats and
trends.
The advanced security research and the threat mitigation technology that X-
Force delivers are instrumental in helping protect IBM customers from the
threat of attack. X-Force threat intelligence, combined with 24x7x365 threat
monitoring and analysis from IBM Security Services global security
operations centers, helps ensure that IBM Security customers stay ahead of
existing and emerging threats. The X-Force team:
• Maintains a comprehensive databases of known security
vulnerabilities
• Analyzes millions of malware samples each year
• Tracks billions of security incidents daily
• Monitors millions of spam and phishing attacks
• Examines billions of web pages and images
Page 1 of 4
Monitoring and reporting internet threats
To deliver a broad view of the threat landscape, the X-Force team
combines its own research findings with data collected from
multiple research sources, including publicly disclosed
vulnerabilities and commercial vulnerability data. The team also
monitors the underground for irresponsibly disclosed zero-day
vulnerabilities; analyzes proofs of concept and public exploit code;
and, through the expertise of the IBM Trusteer® group, analyzes
advanced malware. By monitoring global Internet threats around
the clock and updating the IBM Security AlertCon online resource
center, the X-Force team helps IBM keep stakeholders and clients
abreast of the current global Internet threat level.
IBM X-Force core components
The X-Force research and development team focuses its efforts on
four main areas: research, analytic engines, security content
delivery, and industry and customer deliverables.
• X-Force research groups are responsible for understanding
what each security issue is, how it works and how it can be
exploited.
• That intelligence then feeds into IBM Security analytic
engines to help protect customers against these threats. The
results of analytics and research are delivered through
security content updates to customers on a regular basis.
• Clients and the general public can investigate X-Force threat
intelligence through the X-Force Exchange platform, a
cloud-based threat intelligence sharing platform enabling
users to rapidly research the latest global security threats,
aggregate actionable intelligence and collaborate with peers.
• Industry and customer deliverables are widely regarded as
important to both education and decision making. They
include blogs, speaking engagements, presentations at
security conferences and original research publications such
as the IBM X-Force Threat Intelligence reports, X-Force
Threat Research papers, and X-Force Topical Research
papers
Collaborating with leading organizations to enhance
threat analysis
X-Force builds and maintains one of the largest and most
authoritative vulnerability databases in the industry. Containing
over 100,000 documented vulnerabilities, the database includes
detailed analysis of every notable public vulnerability disclosure
recorded since 1994. Moreover, X-Force collaborates with
thousands of the world’s leading businesses and governments,
industry information sharing and analysis centers, and global
coordination centers, as well as other security product vendors.
Through the IBM X-Force Exchange threat intelligence platform,
IBM offers a collaborative environment for analysts, practitioners
and X-Force researchers. Using this valuable online resource,
security industry experts can work together on investigating threat
observables and indicators of compromise. By providing the ability
to collaborate in private groups and access reports on threat
activity, the platform helps streamline communications and threat
investigations.
Why IBM Security?
A preemptive security approach requires market-leading research,
a keen eye for attack trends and techniques, and a streamlined
and affordable platform for delivering advanced security solutions
that are knowledge-based. IBM Security commands the extensive
knowledge, innovative research methods and complex
technologies required to achieve preemptive security. The
experienced and certified consultants, architects, project managers
and subject matter experts at IBM are prepared to provide your
Page 2 of 4
organization with a comprehensive platform of preemptive security
solutions designed to protect your entire IT infrastructure, from the
network gateway to the desktop.
IBM is the trusted security advisor to thousands of the world’s
leading businesses and governments, providing ahead-of-the-
threat protection for networks, desktops and servers. IBM
understands the threats to your network and the critical balance
between performance and protection. As a result, IBM has enabled
its world-class vulnerability-based security technology to stop
Internet threats before they impact your business.
Page 3 of 4
For more information
To learn more about IBM X-Force, contact your IBM representative
or IBM Business Partner, or visit: ibm.com/security/xforce
© Copyright IBM Corporation 2016
IBM Corporation
Software Group
Route 100
Somers, NY 10589
Produced in the United States of America
December 2016
IBM, the IBM logo, ibm.com, are trademarks of International Business Machines
Corp., registered in many jurisdictions worldwide. Other product and service
names might be trademarks of IBM or other companies. A current list of IBM
trademarks is available on the web at "Copyright and trademark information" at
ibm.com/legal/copytrade.shtml
This document is current as of the initial date of publication and may be changed
by IBM at any time. Not all offerings are available in every country in which IBM
operates.
THE INFORMATION IN THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT
ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT.
IBM products are warranted according to the terms and conditions of the
agreements under which they are provided.
Please Recycle
Page 4 of 4

More Related Content

What's hot

The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
IBM Security
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Sundas Kayani
 
Security Trends in the Retail Industry
Security Trends in the Retail IndustrySecurity Trends in the Retail Industry
Security Trends in the Retail Industry
IBM Security
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
James Rutt
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014
 
Considerazioni su ITC Security e sui Cyber Attacks
Considerazioni su ITC Security e sui Cyber Attacks Considerazioni su ITC Security e sui Cyber Attacks
Considerazioni su ITC Security e sui Cyber Attacks
seeweb
 

What's hot (20)

Cyber Security Briefing
Cyber Security BriefingCyber Security Briefing
Cyber Security Briefing
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
 
Cybersecurity - Thomas Gourgeon, Head of International Operations, Orange Cyb...
Cybersecurity - Thomas Gourgeon, Head of International Operations, Orange Cyb...Cybersecurity - Thomas Gourgeon, Head of International Operations, Orange Cyb...
Cybersecurity - Thomas Gourgeon, Head of International Operations, Orange Cyb...
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Security Trends in the Retail Industry
Security Trends in the Retail IndustrySecurity Trends in the Retail Industry
Security Trends in the Retail Industry
 
Information Security Overview
Information Security OverviewInformation Security Overview
Information Security Overview
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your Employees
 
Current Threat Landscape, Global Trends and Best Practices within Financial F...
Current Threat Landscape, Global Trends and Best Practices within Financial F...Current Threat Landscape, Global Trends and Best Practices within Financial F...
Current Threat Landscape, Global Trends and Best Practices within Financial F...
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public Sector
 
T&M Cyber
T&M CyberT&M Cyber
T&M Cyber
 
Career in cyber security
Career in  cyber securityCareer in  cyber security
Career in cyber security
 
Considerazioni su ITC Security e sui Cyber Attacks
Considerazioni su ITC Security e sui Cyber Attacks Considerazioni su ITC Security e sui Cyber Attacks
Considerazioni su ITC Security e sui Cyber Attacks
 

Similar to IBM X-Force Research

Similar to IBM X-Force Research (20)

IBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseIBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, Expertise
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
 
Failed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated RansomwareFailed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated Ransomware
 
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence QuarterlyIBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
 
Trusteer Apex Provides Automatic and Accurate Malware Protection
Trusteer Apex Provides Automatic and Accurate Malware ProtectionTrusteer Apex Provides Automatic and Accurate Malware Protection
Trusteer Apex Provides Automatic and Accurate Malware Protection
 
An Integrated, Intelligent Approach to Security
An Integrated, Intelligent Approach to SecurityAn Integrated, Intelligent Approach to Security
An Integrated, Intelligent Approach to Security
 
Presentación AMIB Los Cabos
Presentación AMIB Los CabosPresentación AMIB Los Cabos
Presentación AMIB Los Cabos
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat Management
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the Crime
 
21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx
 
A New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingA New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm Approaching
 
Infographic network protection security
Infographic network protection securityInfographic network protection security
Infographic network protection security
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptx
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?
 

More from Susanna Harper

More from Susanna Harper (14)

Moving Forward: Harnessing data to improve business outcomes in travel and tr...
Moving Forward: Harnessing data to improve business outcomes in travel and tr...Moving Forward: Harnessing data to improve business outcomes in travel and tr...
Moving Forward: Harnessing data to improve business outcomes in travel and tr...
 
Tomorrow’s Value Chain: How Blockchain Drives Visibility, Trust and Efficiency
Tomorrow’s Value Chain: How Blockchain Drives Visibility, Trust and EfficiencyTomorrow’s Value Chain: How Blockchain Drives Visibility, Trust and Efficiency
Tomorrow’s Value Chain: How Blockchain Drives Visibility, Trust and Efficiency
 
Ibm afghanistan case study
Ibm afghanistan case studyIbm afghanistan case study
Ibm afghanistan case study
 
Thinking out of the toolbox full deck
Thinking out of the toolbox full deckThinking out of the toolbox full deck
Thinking out of the toolbox full deck
 
Thinking out of the toolbox exec report - IBM
Thinking out of the toolbox exec report - IBMThinking out of the toolbox exec report - IBM
Thinking out of the toolbox exec report - IBM
 
Game, set and perfect match. Wimbledon and IBM
Game, set and perfect match. Wimbledon and IBMGame, set and perfect match. Wimbledon and IBM
Game, set and perfect match. Wimbledon and IBM
 
The first public demonstratio n of machine translation: the Georgetown-IBM s...
The first public demonstratio n of machine translation:  the Georgetown-IBM s...The first public demonstratio n of machine translation:  the Georgetown-IBM s...
The first public demonstratio n of machine translation: the Georgetown-IBM s...
 
Ibm annual-report-2016(1)
Ibm annual-report-2016(1)Ibm annual-report-2016(1)
Ibm annual-report-2016(1)
 
IBM Executive Report - New lessons on building the consumer products brand ex...
IBM Executive Report - New lessons on building the consumer products brand ex...IBM Executive Report - New lessons on building the consumer products brand ex...
IBM Executive Report - New lessons on building the consumer products brand ex...
 
Ibm 1st-26yrs-history - IBM’s UNSUNG FOUNDING HISTORY.
Ibm 1st-26yrs-history - IBM’s  UNSUNG   FOUNDING  HISTORY. Ibm 1st-26yrs-history - IBM’s  UNSUNG   FOUNDING  HISTORY.
Ibm 1st-26yrs-history - IBM’s UNSUNG FOUNDING HISTORY.
 
Ibm annual-report-2016
Ibm annual-report-2016Ibm annual-report-2016
Ibm annual-report-2016
 
Qantas freight case_study_final(1)
Qantas freight case_study_final(1)Qantas freight case_study_final(1)
Qantas freight case_study_final(1)
 
CEVA Logistics: Creating headroom for growth with 90 percent faster reactions...
CEVA Logistics: Creating headroom for growth with 90 percent faster reactions...CEVA Logistics: Creating headroom for growth with 90 percent faster reactions...
CEVA Logistics: Creating headroom for growth with 90 percent faster reactions...
 
Qantas freight case_study_final
Qantas freight case_study_finalQantas freight case_study_final
Qantas freight case_study_final
 

Recently uploaded

Recently uploaded (20)

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 

IBM X-Force Research

  • 1. IBM Security Data Sheet Highlights • Develops security protection that forms the foundation of IBM Security • Researches and analyzes security threats, vulnerabilities and exploits • Creates proactive countermeasure technologies • Collaborates with leading public and private organizations to help enhance internet security worldwide • Educates the public about emerging threats IBM X-Force Research IBM X-Force helps organizations stay ahead of emerging threats with security research IBM® X-Force® Research provides the foundation for IBM’s preemptive approach to Internet security. This industry-leading group of security experts focuses on researching and evaluating vulnerabilities, threats and security issues; developing assessments and countermeasure technology for IBM products; and educating the public about emerging Internet threats and trends. The advanced security research and the threat mitigation technology that X- Force delivers are instrumental in helping protect IBM customers from the threat of attack. X-Force threat intelligence, combined with 24x7x365 threat monitoring and analysis from IBM Security Services global security operations centers, helps ensure that IBM Security customers stay ahead of existing and emerging threats. The X-Force team: • Maintains a comprehensive databases of known security vulnerabilities • Analyzes millions of malware samples each year • Tracks billions of security incidents daily • Monitors millions of spam and phishing attacks • Examines billions of web pages and images Page 1 of 4
  • 2. Monitoring and reporting internet threats To deliver a broad view of the threat landscape, the X-Force team combines its own research findings with data collected from multiple research sources, including publicly disclosed vulnerabilities and commercial vulnerability data. The team also monitors the underground for irresponsibly disclosed zero-day vulnerabilities; analyzes proofs of concept and public exploit code; and, through the expertise of the IBM Trusteer® group, analyzes advanced malware. By monitoring global Internet threats around the clock and updating the IBM Security AlertCon online resource center, the X-Force team helps IBM keep stakeholders and clients abreast of the current global Internet threat level. IBM X-Force core components The X-Force research and development team focuses its efforts on four main areas: research, analytic engines, security content delivery, and industry and customer deliverables. • X-Force research groups are responsible for understanding what each security issue is, how it works and how it can be exploited. • That intelligence then feeds into IBM Security analytic engines to help protect customers against these threats. The results of analytics and research are delivered through security content updates to customers on a regular basis. • Clients and the general public can investigate X-Force threat intelligence through the X-Force Exchange platform, a cloud-based threat intelligence sharing platform enabling users to rapidly research the latest global security threats, aggregate actionable intelligence and collaborate with peers. • Industry and customer deliverables are widely regarded as important to both education and decision making. They include blogs, speaking engagements, presentations at security conferences and original research publications such as the IBM X-Force Threat Intelligence reports, X-Force Threat Research papers, and X-Force Topical Research papers Collaborating with leading organizations to enhance threat analysis X-Force builds and maintains one of the largest and most authoritative vulnerability databases in the industry. Containing over 100,000 documented vulnerabilities, the database includes detailed analysis of every notable public vulnerability disclosure recorded since 1994. Moreover, X-Force collaborates with thousands of the world’s leading businesses and governments, industry information sharing and analysis centers, and global coordination centers, as well as other security product vendors. Through the IBM X-Force Exchange threat intelligence platform, IBM offers a collaborative environment for analysts, practitioners and X-Force researchers. Using this valuable online resource, security industry experts can work together on investigating threat observables and indicators of compromise. By providing the ability to collaborate in private groups and access reports on threat activity, the platform helps streamline communications and threat investigations. Why IBM Security? A preemptive security approach requires market-leading research, a keen eye for attack trends and techniques, and a streamlined and affordable platform for delivering advanced security solutions that are knowledge-based. IBM Security commands the extensive knowledge, innovative research methods and complex technologies required to achieve preemptive security. The experienced and certified consultants, architects, project managers and subject matter experts at IBM are prepared to provide your Page 2 of 4
  • 3. organization with a comprehensive platform of preemptive security solutions designed to protect your entire IT infrastructure, from the network gateway to the desktop. IBM is the trusted security advisor to thousands of the world’s leading businesses and governments, providing ahead-of-the- threat protection for networks, desktops and servers. IBM understands the threats to your network and the critical balance between performance and protection. As a result, IBM has enabled its world-class vulnerability-based security technology to stop Internet threats before they impact your business. Page 3 of 4
  • 4. For more information To learn more about IBM X-Force, contact your IBM representative or IBM Business Partner, or visit: ibm.com/security/xforce © Copyright IBM Corporation 2016 IBM Corporation Software Group Route 100 Somers, NY 10589 Produced in the United States of America December 2016 IBM, the IBM logo, ibm.com, are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at "Copyright and trademark information" at ibm.com/legal/copytrade.shtml This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. THE INFORMATION IN THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. Please Recycle Page 4 of 4