X-Force IRIS, X-Force IRIS, This year, IDC recognized IBM X-Force Incident Response and Intelligence Services (IRIS) as a leader in its “IDC MarketScape: U.S. Incident Readiness, Response, and Resiliency Services 2018 Vendor Assessment.” The IDC report cited how X-Force IRIS effectively streamlines incident response (IR) for customers around the globe by supporting analysts and responders with expert threat intelligence.

X-Force IRIS is laser-focused on reducing the time it takes to detect malicious activities, respond to attacks and, ultimately, mitigate or even prevent threats. Having the ability to quickly identify and respond to threats makes it harder for attackers to be successful.

“Recognition as a leader in the 2018 IDC MarketScape report exemplifies the ability of our X-Force IRIS team in helping clients transform their incident response strategy,” stated Wendi Whitmore, global lead for IBM X-Force IRIS. “We thank our clients for their trust in partnering with X-Force IRIS. We will continue to invest in our people, processes and advanced technology to hunt threats and combat adversaries to help our clients succeed.”

How IBM X-Force IRIS Is Improving Incident Response

The report highlighted IBM Security’s focus on enhancing the response speed among responders who are trained on triage and evidence collection. It also emphasizes the alignment of X-Force IRIS to partner across our IBM Security ecosystem, bridging the gap between security operations and IR and allowing security teams to escalate incidents and quickly develop a response plan.

The X-Force IRIS team has a foundation built on threat expertise using collaborative tools and resources such as X-Force Exchange to better predict and respond to threats. These investments have deepened our capabilities in responding and managing incidents and provide clients with comprehensive security services.

X-Force IRIS continues to be a game changer in incident response and cyberthreat intelligence. Our security experts have been the first line of defense on some of the most publicized breaches throughout the world. With a deep understanding of adversaries and their evolving tactics, we combine incident response, intelligence and remediation to help clients recover faster and focus on what really matters: growing their business despite the challenges of cyber uncertainty.

Download the full report


More from Incident Response

5 Golden Rules of Threat Hunting

When a breach is uncovered, the operational cadence includes threat detection, quarantine and termination. While all stages can occur within the first hour of discovery, in some cases, that's already too late.Security operations center (SOC) teams monitor and hunt new threats continuously. To ward off the most advanced threats, security teams proactively hunt for ones that evade the dashboards of their security solutions.However, advanced threat actors have learned to blend in with their target's environment, remaining unnoticed for prolonged periods. Based…

Everyone Wants to Build a Cyber Range: Should You?

In the last few years, IBM X-Force has seen an unprecedented increase in requests to build cyber ranges. By cyber ranges, we mean facilities or online spaces that enable team training and exercises of cyberattack responses. Companies understand the need to drill their plans based on real-world conditions and using real tools, attacks and procedures. What’s driving this increased demand? The increase in remote and hybrid work models emerging from the COVID-19 pandemic has elevated the priority to collaborate and…

People, Process and Technology: The Incident Response Trifecta

Let's say you are the CISO or IT security lead of your organization, and your incident response program needs an uplift. After making a compelling business case to management for investment, your budget has been approved and expanded. With your newfound wealth, you focus on acquiring technology that will improve your monitoring, detection and analysis of data traffic. Has the incident program really improved by the technology acquisition, or is the uplift merely cosmetic? If no other changes have been…

Self-Checkout This Discord C2

This post was made possible through the contributions of James Kainth, Joseph Lozowski, and Philip Pedersen. In November 2022, during an incident investigation involving a self-checkout point-of-sale (POS) system in Europe, IBM Security X-Force identified a novel technique employed by an attacker to introduce a command and control (C2) channel built upon Discord channel messages. Discord is a chat, voice, and video service enabling users to join and create communities associated with their interests. While Discord and its related software…