The Ponemon Institute’s annual “Cost of Data Breach” study, released this week, served up a clear message: Damages from cyberattacks continue to climb, but organizations can stem these rising costs by preparing and supporting their incident response (IR) team, saving hundreds of thousands of dollars on average.

It’s long been our mission to help organizations transform their IR capabilities, and we’ve done so through our innovative Security Orchestration, Automation, and Response (SOAR) Platform. With our latest platform release, version 26, we’re delighted to launch Resilient Incident Visualization.

Incident Visualization Changes the Game

Resilient Incident Visualization is an industry first. It leverages the simple fact that actually seeing connections between incidents in a way like never before can help security analysts zero in on concerted attacks and respond in record time. It’s a simple yet powerful concept successful in, and now adopted from, other business areas.

Resilient Incident Visualization graphically displays multidimensional relationships between incident artifacts or indicators of compromise (IoCs) and incidents in an organization’s environment. Security analysts can:

  • Instantly gain intelligence, context and direction by seeing the most pertinent connections between artifacts and incidents, both past and present.
  • Immediately uncover broader campaigns targeting the organization and understand how an attack has unfolded over time.
  • Rapidly take investigative or remedial actions from directly within the visualizer, such as querying QRadar or blocking a malicious URL.

Decreasing Costs and Time

With Resilient Incident Visualization, a security analyst can instantly see that artifacts related to a malware incident (e.g., suspicious IP addresses, DNS names, malware hashes, etc.) have appeared in several past incidents. This suggests that these incidents are part of a bigger attack, and the platform provides direction on how to put an end to it.

This latest innovation comes only a few months after Resilient Systems was acquired by IBM Security. It shows that we’re committed to continuously innovating and pushing this market forward to help our customers thrive in the face of today’s cyberthreats. As part of IBM Security, we can innovate faster and more significantly than ever before.

In the end, Resilient Incident Visualization is a step change for incident response — making teams smarter and faster responders.


More from Incident Response

Ransomware Renaissance 2023: The Definitive Guide to Stay Safer

2 min read - Ransomware is experiencing a renaissance in 2023, with some cybersecurity firms reporting over 400 attacks in the month of March alone. And it shouldn’t be a surprise: the 2023 X-Force Threat Intelligence Index found backdoor deployments — malware providing remote access — as the top attacker action in 2022, and aptly predicted 2022’s backdoor failures would become 2023’s ransomware crisis. Compounding the problem is the industrialization of the cybercrime ecosystem, enabling adversaries to complete more attacks, faster. Over the last…

2 min read

Expert Insights on the X-Force Threat Intelligence Index

5 min read - Top insights are in from this year’s IBM Security X-Force Threat Intelligence Index, but what do they mean? Three IBM Security X-Force experts share their thoughts on the implications of the most pressing cybersecurity threats, and offer guidance for what organizations can do to better protect themselves. Moving Left of Boom: Early Backdoor Detection Andy Piazza, Global Head of Threat Intelligence at IBM Security X-Force, sat down with Security Intelligence to chat with us about the rise in the deployment…

5 min read

How Morris Worm Command and Control Changed Cybersecurity

4 min read - A successful cyberattack requires more than just gaining entry into a victim’s network. To truly reap the rewards, attackers must maintain a persistent presence within the system. After establishing communication with other compromised network devices, actors can stealthily extract valuable data. The key to all this is a well-developed Command and Control (C2 or C&C) infrastructure. The number of C2 servers used for launching cyberattacks increased by 30% in 2022. More than 17,000 of these servers were detected last year,…

4 min read

The Important Role of SOAR in Cybersecurity

4 min read - Understaffed security teams need all the help they can get, and they are finding that help through SOAR. SOAR — security orchestration, automation and response — is defined by Gartner as the “technologies that enable organizations to collect inputs monitored by the security operations team.” Gartner identifies a SOAR platform’s three prime functionalities: Threat and vulnerability management, security operations automation and incident response. The number of threats coming across the network and endpoints each day overwhelms most organizations. Adding SOAR…

4 min read