X-Force IRIS, X-Force IRIS, This year, IDC recognized IBM X-Force Incident Response and Intelligence Services (IRIS) as a leader in its “IDC MarketScape: U.S. Incident Readiness, Response, and Resiliency Services 2018 Vendor Assessment.” The IDC report cited how X-Force IRIS effectively streamlines incident response (IR) for customers around the globe by supporting analysts and responders with expert threat intelligence.

X-Force IRIS is laser-focused on reducing the time it takes to detect malicious activities, respond to attacks and, ultimately, mitigate or even prevent threats. Having the ability to quickly identify and respond to threats makes it harder for attackers to be successful.

“Recognition as a leader in the 2018 IDC MarketScape report exemplifies the ability of our X-Force IRIS team in helping clients transform their incident response strategy,” stated Wendi Whitmore, global lead for IBM X-Force IRIS. “We thank our clients for their trust in partnering with X-Force IRIS. We will continue to invest in our people, processes and advanced technology to hunt threats and combat adversaries to help our clients succeed.”

How IBM X-Force IRIS Is Improving Incident Response

The report highlighted IBM Security’s focus on enhancing the response speed among responders who are trained on triage and evidence collection. It also emphasizes the alignment of X-Force IRIS to partner across our IBM Security ecosystem, bridging the gap between security operations and IR and allowing security teams to escalate incidents and quickly develop a response plan.

The X-Force IRIS team has a foundation built on threat expertise using collaborative tools and resources such as X-Force Exchange to better predict and respond to threats. These investments have deepened our capabilities in responding and managing incidents and provide clients with comprehensive security services.

X-Force IRIS continues to be a game changer in incident response and cyberthreat intelligence. Our security experts have been the first line of defense on some of the most publicized breaches throughout the world. With a deep understanding of adversaries and their evolving tactics, we combine incident response, intelligence and remediation to help clients recover faster and focus on what really matters: growing their business despite the challenges of cyber uncertainty.

Download the full report


More from Incident Response

Poor Communication During a Data Breach Can Cost You — Here’s How to Avoid It

5 min read - No one needs to tell you that data breaches are costly. That data has been quantified and the numbers are staggering. In fact, the IBM Security Cost of a Data Breach estimates that the average cost of a data breach in 2022 was $4.35 million, with 83% of organizations experiencing one or more security incidents. But what’s talked about less often (and we think should be talked about more) is how communication — both good and bad — factors into…

5 min read

Ransomware Renaissance 2023: The Definitive Guide to Stay Safer

2 min read - Ransomware is experiencing a renaissance in 2023, with some cybersecurity firms reporting over 400 attacks in the month of March alone. And it shouldn’t be a surprise: the 2023 X-Force Threat Intelligence Index found backdoor deployments — malware providing remote access — as the top attacker action in 2022, and aptly predicted 2022’s backdoor failures would become 2023’s ransomware crisis. Compounding the problem is the industrialization of the cybercrime ecosystem, enabling adversaries to complete more attacks, faster. Over the last…

2 min read

Expert Insights on the X-Force Threat Intelligence Index

5 min read - Top insights are in from this year’s IBM Security X-Force Threat Intelligence Index, but what do they mean? Three IBM Security X-Force experts share their thoughts on the implications of the most pressing cybersecurity threats, and offer guidance for what organizations can do to better protect themselves. Moving Left of Boom: Early Backdoor Detection Andy Piazza, Global Head of Threat Intelligence at IBM Security X-Force, sat down with Security Intelligence to chat with us about the rise in the deployment…

5 min read

How Morris Worm Command and Control Changed Cybersecurity

4 min read - A successful cyberattack requires more than just gaining entry into a victim’s network. To truly reap the rewards, attackers must maintain a persistent presence within the system. After establishing communication with other compromised network devices, actors can stealthily extract valuable data. The key to all this is a well-developed Command and Control (C2 or C&C) infrastructure. The number of C2 servers used for launching cyberattacks increased by 30% in 2022. More than 17,000 of these servers were detected last year,…

4 min read