The cloud market today is full of references to the API economy. This is certainly with merit since the capabilities of an application programming interface (API) open the doors to a world of new applications, services and products.

APIs exist for cloud platforms in every major industry, and security is no exception. The tight integration between security solutions that APIs can make possible helps to close intelligence gaps that attackers might otherwise slip through. APIs also commonly provide threat intelligence for security infrastructure that enhances efficacy, provides valuable context and reduces your time-to-know and time-to-act on current and emerging threats.

The API of the IBM X-Force Exchange platform has provided threat intelligence integration capabilities to other applications since its inception. During the platform’s relatively short history, the platform and its API have continued to evolve, with improvements evident in the depth and breadth of the original X-Force threat intelligence available. Within the collaboration portal and the API, X-Force Exchange now provides granular intelligence like Threat Indicators and Observables, to higher order content like Campaigns and Tools, Tactics and Procedures (TTPs). X-Force Exchange can deliver this range of threat intelligence via the API, using two major specifications that allow users to use the method that best suits their needs.

RESTful API Support

Probably the most common method for accessing an API today is through a RESTful architectural interface that provides access to data in a reliable, scalable and simple manner. X-Force Exchange does this while providing threat intelligence information in JSON notation.

Users who are already familiar with this technology or have proprietary systems that can easily leverage a RESTful API would benefit quickly from this method. In addition, IBM has made the X-Force Exchange Node SDK available to help users get started with their integrations.


X-Force Exchange also supports STIX and TAXII standards to allow for interoperability and automated machine-to-machine (M2M) exchange of threat intelligence. The adoption of these standards is where the true value of threat intelligence sharing really shines: It provides the ability for users to share information across different tools while abstracting away all the details of how threat intelligence information is captured, processed and exchanged across different platforms. These standards are gaining popularity across the spectrum of users and companies. Check Point Software Technologies, Soltra, Verisign, the United States Department of Defense (DoD) and many more organizations are actively involved in the evolution and promotion of STIX and TAXII via the OASIS IT standards consortium as the de facto standard for automated M2M threat intelligence exchange.

Threat Intelligence Use Cases

Over the last year, we’ve seen the X-Force Exchange API gain significant traction across a number of different use cases. The use cases commonly represent users interested in programmatically obtaining X-Force data to provide a new source of threat intelligence to their security infrastructure and/or operations.

Where the use cases differ is across different user types and their goals for threat intelligence integration:

  • The security analyst aims to implement an additional source of threat intelligence for their security infrastructure. This infrastructure may contain threat detection devices, a SIEM or a data analytics platform.
  • The managed security services provider, operating a security operations center (SOC), wants to help analysts speed their investigations and prioritize threats so that responders address the most severe issues first, increasing the provider’s overall efficiency.
  • The software provider looks to integrate threat intelligence into their product in a way that provides additional value in their offerings to their clients. From reputation to risk analysis, there are many IBM business partners that create and offer applications that integrate X-Force threat intelligence.

Sign up for a free trial of the IBM X-Force Exchange

With the value of threat intelligence and APIs well established, X-Force is introducing a new offering: IBM X-Force Exchange Commercial API. This will allow users to access the same X-Force threat intelligence available on the platform using a commercially-licensed API option which enjoys increased quota, enhanced query options, full support and the ability to integrate and resell products containing IBM X-Force content. The X-Force threat intelligence commercial API satisfies all the use cases for enhancing a security product or platform, a team’s efficacy and efficiency in a SOC, or a third-party security offering.

Learn More

More from Threat Intelligence

Phishing kit trends and the top 10 spoofed brands of 2023

4 min read -  The 2024 IBM X-Force Threat Intelligence Index reported that phishing was one of the top initial access vectors observed last year, accounting for 30% of incidents. To carry out their phishing campaigns, attackers often use phishing kits: a collection of tools, resources and scripts that are designed and assembled to ease deployment. Each phishing kit deployment corresponds to a single phishing attack, and a kit could be redeployed many times during a phishing campaign. IBM X-Force has analyzed thousands of…

Grandoreiro banking trojan unleashed: X-Force observing emerging global campaigns

16 min read - Since March 2024, IBM X-Force has been tracking several large-scale phishing campaigns distributing the Grandoreiro banking trojan, which is likely operated as a Malware-as-a-Service (MaaS). Analysis of the malware revealed major updates within the string decryption and domain generating algorithm (DGA), as well as the ability to use Microsoft Outlook clients on infected hosts to spread further phishing emails. The latest malware variant also specifically targets over 1500 global banks, enabling attackers to perform banking fraud in over 60 countries…

Threat intelligence to protect vulnerable communities

2 min read - Key members of civil society—including journalists, political activists and human rights advocates—have long been in the cyber crosshairs of well-resourced nation-state threat actors but have scarce resources to protect themselves from cyber threats. On May 14, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) released a High-Risk Communities Protection (HRCP) report developed through the Joint Cyber Defense Collaborative that addresses the threat to these vulnerable groups, with findings contributed by the X-Force Threat Intelligence team.Cyber criminals seek stolen credentialsThe HRCP…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today