Once again, we are humbled and honored to be recognized as a leader in the Gartner Magic Quadrant for Managed Security Services, a title we have held five consecutive times. Last year was another significant and transformational period for IBM Security, especially for our managed security services (MSS) business.

In 2017, we were all put to the test by unprecedented breaches, which paralyzed numerous businesses across the globe. While there is no such thing as an easy breach, several IBM MSS clients had an advantage regarding timing and reaction to WannaCry, Petya, Meltdown and Spectre.

Download the 2018 Gartner Magic Quadrant for Managed Security Services (MSSP)

A Gartner Magic Quadrant for Managed Security Services Leader

The alignment between our global capabilities, technology, threat intelligence research partnerships and people allowed us to mobilize and assist clients. It also provided us the actions and speed required to significantly minimize damage and ensure the resumption of smooth business operations.

We made significant investments in 2017 to help our clients address their regulatory obligations regarding data transmission and protection. We opened local European data centers, which can offer fully Europe-based services. Clients worldwide who conduct business in Europe have the support they need to localize their data and ensure that our dedicated teams compliantly handle it.

Cyber Range: A Must-Do

In 2017, the IBM Security Cyber Range became a must-do for more than 200 organizations throughout the world. As part of our global network of IBM X-Force Command Centers (which represents IBM Managed Security Services), the Cambridge, Massachusetts Cyber Range is an immersive experience that helps clients test and prepare for an inevitable breach. Clients get a powerful simulated experience that accelerates their preparedness — and IBM Security deepens its partnership and alignment with clients against future attacks.

The business of MSS is no longer simple firewall or device policy management. Today’s customers seek a deeper threat management partnership with vendors that deliver a comprehensive view of their threat environment. They also want a collection of crucial information about vulnerabilities, emerging threats, geographical trends and market/industry trends, as well as subsequent analyses and strategies.

At IBM Security, we are compelled to deliver on that demand — and we’ve been doing it progressively through the years.

A Pivotal Year for MSS

We believe achieving a leader recognition in the Gartner Magic Quadrant for Managed Security Services wouldn’t be possible without the partnership between our valued clients and the alignment of IBM Security analysts, intelligence researchers and our global state-of-the-art facilities in fighting cybercrime.

We are thankful to work with some of the world’s leading enterprises, and we consider it a privilege to gain the valuable experience from our clients that helps drive important innovations and transformations in our business. Through this partnership, our teams and innovations are accelerating IBM Security’s capabilities in exceeding beyond traditional MSS.

Download the 2018 Gartner Magic Quadrant for Managed Security Services (MSSP)

More from Security Services

Secure-by-Design: Which Comes First, Code or Security?

4 min read - For years, developers and IT security teams have been at loggerheads. While developers feel security slows progress, security teams assert that developers sacrifice security priorities in their quest to accelerate production. This disconnect results in flawed software that is vulnerable to attack. While advocates for speed and security clash, consumers must often pay the price when threat actors strike. 48% of developers admitted they were still shipping code with vulnerabilities in 2022. It’s clearly time for a change. Many believe…

4 min read

ITG10 Likely Targeting South Korean Entities of Interest to the Democratic People’s Republic of Korea (DPRK)

7 min read - In late April 2023, IBM Security X-Force uncovered documents that are most likely part of a phishing campaign mimicking credible senders, orchestrated by a group X-Force refers to as ITG10, and aimed at delivering RokRAT malware, similar to what has been observed by others. ITG10's tactics, techniques and procedures (TTPs) overlap with APT37 and ScarCruft. The initial delivery method is conducted via a LNK file, which drops two Windows shortcut files containing obfuscated PowerShell scripts in charge of downloading a…

7 min read

Detecting Insider Threats: Leverage User Behavior Analytics

3 min read - Employees often play an unwitting role in many security incidents, from accidental data breaches to intentional malicious attacks. Unfortunately, most organizations don’t have the right protocols and processes to identify potential risks posed by their workforce. Based on a survey conducted by SANS Institute, 35% of respondents said they lack visibility into insider threats, while 30% said the inability to audit user access is a security blind spot in their organizations. In addition, the 2023 X-Force Threat Intelligence Index reported that…

3 min read

Poor Communication During a Data Breach Can Cost You — Here’s How to Avoid It

5 min read - No one needs to tell you that data breaches are costly. That data has been quantified and the numbers are staggering. In fact, the IBM Security Cost of a Data Breach estimates that the average cost of a data breach in 2022 was $4.35 million, with 83% of organizations experiencing one or more security incidents. But what’s talked about less often (and we think should be talked about more) is how communication — both good and bad — factors into…

5 min read