IBM Security App Exchange Now Features Over 90 Custom Applications
ARMONK, NY - 19 Apr 2017: IBM (NYSE: IBM) announced today that the IBM Security App Exchange has grown to over 90 custom applications from IBM and Business Partners, fostering innovation and collaboration amongst the security community. Over 30,000 apps, content packs and tools have been downloaded since the launch of the App Exchange, allowing users to easily extend the capabilities of IBM’s Security technologies with custom apps and integrations.
Launched in December 2015, the IBM Security App Exchange is a community marketplace for customers, Business Partners and other developers to build and share applications which build upon and integrate with IBM Security products.
The IBM Security App Exchange has been populated with new applications from more than 30 Business Partners, including Trend Micro, Recorded Future, BluVector and Ziften. Through this collaboration, customers now have access to innovative new solutions which can help them streamline their security operations, potentially saving valuable resources and allowing their security teams to remain focused on the latest threats rather than technology management and integration.
Combining these partner applications with innovative new security apps developed within IBM Security, the App Exchange is now home to 92 applications which extend across the IBM Security portfolio, including IBM QRadar security intelligence platform, BigFix endpoint management, Guardium data protection, MaaS360 mobile device management, Resilient incident response platform, and IBM’s open source threat intelligence platform, X-Force Exchange.
“As threats are evolving faster than ever, collaborative development amongst the security community will help organizations adapt quickly and speed innovation in the fight against cybercrime,” said Sandeep Mukherjee, Marketing Manager, IBM Security. “The rapid growth of the IBM Security App Exchange shows the value that this collaboration is providing to partners and customers.”
New Applications Extend QRadar Capabilities
Through collaboration with its Business Partners and internal innovation from within IBM Security, the applications within the IBM Security App Exchange are designed to provide customers with better visibility into more types of data and also offer new automated search and reporting functions which help security specialists focus on the most pressing threats.
Examples of new applications that have been developed for the App Exchange since its initial launch include:
IBM QRadar Advisor with Watson combines the cognitive capabilities of IBM Watson and the industry-leading IBM QRadar Security Intelligence Platform to uncover hidden threats and automate insights. It enriches security incidents compiled by the QRadar platform with insights from IBM Watson for Cyber Security, enabling analysts to investigate and respond to threats at superior speed and scale. By augmenting analysts’ ability to act on threats with confidence, Watson revolutionizes the way security analysts work.
Recorded Future for IBM QRadar helps security operations center (SOC) analysts to make faster verdicts and better manage the ever-increasing volume of alerts. This integration with Recorded Future threat intelligence enriches events in QRadar with external context. Recorded Future automatically collects and analyzes threat intelligence in real time from the open, deep, and dark web, helping customers make informed verdicts. SOC analysts can efficiently dismiss false positives and capture threat context for true incidents.
BluVector for QRadar combines the power of BluVector supervised machine learning and automation with the security analytics capabilities of QRadar to detect and investigate advanced cyber threats more quickly and accurately. A leader in Network Security Monitoring & Analytics, BluVector enables security team to reduce the time to respond from months to minutes.
User Behavior Analytics - IBM QRadar UBA provides an efficient means for detecting anomalous or malicious behaviors with new insight into deviation in user behavior to detect and prioritize risky user activities—quickly showing who is doing what on your networks. The application comes with ready-to-go anomaly detection, as well as behavioral rules and analytics. It leverages the curated log and activity data already in QRadar, which can speed time to insights. By streamlining monitoring, detection and investigation, the QRadar solution helps security analysts become more productive and manage insider threats efficiently.
These applications are enabled by the QRadar application framework, which allows the security community to quickly build new QRadar applications via open APIs and software developer kits. IBM Security has been closely testing and vetting every application before it is posted to the App Exchange to ensure the integrity of these community contributions.
About IBM Security
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned IBM X-Force® research, enables organizations to effectively manage risk and defend against emerging threats. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 35 billion security events per day in more than 130 countries, and holds more than 3,000 security patents. For more information, please visit www.ibm.com/security, follow @IBMSecurity on Twitter or visit the IBM Security Intelligence blog.
Disclaimer: IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion.