It is always thrilling when thought leaders endorse, agree with or support a major initiative. But, far more powerful is when analysts comment publically or write reports aimed at customers and partners with a message that a vendor understands their pain and is successfully executing a strategy that addresses that pain in a unique and comprehensive way. It is now clear to CISOs and security leaders that placing the burden of deploying a bunch of siloed point products in a multi-perimeter world squarely on them or on their partners is no longer good business.

IBM Security recently closed on the acquisition of Trusteer, a very successful advanced malware and fraud protection provider, who in a very short period of time has dominated the financial industry with their solution. We are thrilled to have this excellent company made up of excellent employees on our team. Having been acquired by IBM less than two years ago, and having grown this new Security Systems division rapidly in that time period, we know the challenges and how to best provide our customers and partners with both the best-in-class products they require and also the broad platform and integrated solutions more and more customers are demanding.

Proof of execution:

  • The QRadar Security Intelligence Platform has seen its sales go through the roof after being acquired by IBM
  • Each of the Security System division’s pillars (People, Infrastructure, Data, Applications, and Security Intelligence) has seen solid and steady growth
  • More and more customers and partners are subscribing to our “Security Intelligence, Think Integrated” strategy

Here are a few of the comments analyst recently made regarding the Trusteer acquisition:

Forrester,  IBM Buys Trusteer And, With It, Better, More-Intelligent Data-Centric Security

Prior to the Q1 Labs acquisition, Forrester’s assessment of this acquisition would likely have included a much stronger note of caution to S&R (security and Risk Management) pros. However, the success of the Q1 Labs acquisition, together with IBM’s strong commitment to security  as a strategic priority, should give confidence to S&R pros considering Trusteer solutions in both the short term and the long term.  Overall, the acquisition is good news for both IBM and Trusteer customers.

Paula Musich, Current Analysis, IBM’s Trusteer Acquisition: Not Just a Web Fraud Prevention Foray

Positive on IBM’s deal to acquire web fraud prevention provider  Trusteer, because it not only positions IBM to dominate the web fraud prevention market, but brings new enterprise anti-malware technology, critical threat research and intelligence capabilities, and a stronger presence in the security as a service market.

Mike Rothman, Securosis, IBM/Trusteer:  Shooting Across the Bow of the EPP Suites

It’s early, but there is a clear opportunity for someone to totally disrupt  the endpoint protection racket. Similar to what Palo Alto did to the perimeter firewall.  IBM is betting on being able to spur that disruption. So is this the beginning of the end for EPP?  If you take a step back, EPP has been on a path to irrelevance for years.

Javvad Malik and Eric Hanselman, 451 Research, IBM Looks to Foil Phishing with Trusteer Takeout

This acquisition brings IBM into direct competition with advanced endpoint malware-detection and -protection providers such as Bit9, Bromium, AccessData, Guidance Software, HBGary, Mandiant, Tanium and Viewfinity. It could mark an enhanced stance whereby Big Blue extends its capabilities to incorporate advanced malware-detection capabilities at the network layer.

Michela Menting, ABI Research, IBM Snaps Up Trusteer

Certainly IBM is in a favorable position to build up a strong cybersecurity competence. Innovation  through acquisition is one way to do it, and IBM has the resources.  The realization of its security strategy will lie in the successful integration of all these acquisitions into its overall value proposition, as well as the ability to accommodate other vendor’s technology.  This is especially important since the current market for cybersecurity is highly fragmented, with many organizations opting for a multitude of different solutions for securing their networks, systems, endpoints, and data.

Jon Oltsik, ESG, IBM Extends Its Cybersecurity Footprint with Trusteer Acquisition

Look for IBM to also get the most out of the Trusteer Cybercrime  Prevention Architecture, a technology stack that includes device-based protection, middleware services, and cloudbased intelligence. This architecture gives IBM the opportunity to integrate Trusteer security technology with existing products, layer in other acquisitions, or work on common solutions with 3rd party partners.  With the Trusteer acquisition, IBM fills in a few product gaps and continues to demonstrate its intentions to compete in all aspects of enterprise security. Look for IBM to continue to be aggressive and set the pace.

Joseph Feiman, Gartner

This is a big deal! Good move!

Avivah Litan/Gartner, eWeek, American Banker

Big Blue is marketing Trusteer’s wares beyond the financial sector. With IBM planning to acquire Trusteer, a security software company specializing in anti-fraud products for financial services organizations, enterprises can expect to see security technology that originally targeted financial institutions spread into the broader security market. IBM could expand into the advanced threats market, web application security and endpoint protection. Banking was a clear-cut use case that Trusteer went after, but the products could work equally well in many other security  and fraud markets.

More from Intelligence & Analytics

The 13 Costliest Cyberattacks of 2022: Looking Back

2022 has shaped up to be a pricey year for victims of cyberattacks. Cyberattacks continue to target critical infrastructures such as health systems, small government agencies and educational institutions. Ransomware remains a popular attack method for large and small targets alike. While organizations may choose not to disclose the costs associated with a cyberattack, the loss of consumer trust will always be a risk after any significant attack. Let’s look at the 13 costliest cyberattacks of the past year and…

What Can We Learn From Recent Cyber History?

The Center for Strategic and International Studies compiled a list of significant cyber incidents dating back to 2003. Compiling attacks on government agencies, defense and high-tech companies or economic crimes with losses of more than a million dollars, this list reveals broader trends in cybersecurity for the past two decades. And, of course, there are the headline breaches and supply chain attacks to consider. Over recent years, what lessons can we learn from our recent history — and what projections…

When Logs Are Out, Enhanced Analytics Stay In

I was talking to an analyst firm the other day. They told me that a lot of organizations purchase a security information and event management (SIEM) solution and then “place it on the shelf.” “Why would they do that?” I asked. I spent the majority of my career in hardware — enterprise hardware, cloud hardware, and just recently made the jump to security software, hence my question. “Because SIEMs are hard to use. A SIEM purchase is just a checked…

4 Most Common Cyberattack Patterns from 2022

As 2022 comes to an end, cybersecurity teams globally are taking the opportunity to reflect on the past 12 months and draw whatever conclusions and insights they can about the threat landscape. It has been a challenging year for security teams. A major conflict in Europe, a persistently remote workforce and a series of large-scale cyberattacks have all but guaranteed that 2022 was far from uneventful. In this article, we’ll round up some of the most common cyberattack patterns we…