DEBUG: PAGE=domain, TITLE=Application Services,ID=1426,TEMPLATE=subprogram
toggle expanded view
programcode = ITSAPP
programid = 146
database = t
alerts = t
neat = t
vendors = t
forecasting = f
confidence = f
definitions = t

Search within: Application Services:

Access our analyst expertise:

Only NelsonHall clients who are logged in have access to our analysts and advisors for their expert advice and opinion.

To find out more about how NelsonHall's analysts and sourcing advisors can assist you with your strategy and engagements, please contact our sales department here.

Subscribe to blogs & alerts:

manage email alerts using the form below, in order to be notified via email whenever we publish new content:

has Database = t

Contracts Database

for Application Services

Track the pattern of service adoption by monitoring Application Services contract awards by your peers. Identify who are the successful vendors this industry now. Updated monthly!

These documents are available to logged in clients that have purchased access to this program.

has Confidence = f -- IGNORED

IBM - Cyber Resiliency

Vendor Analysis

by Mike Smart

published on May 22, 2019

Access to this report is restricted to logged in clients with access. Login to get full access

Report Overview:

IBM organizes its cybersecurity services portfolio around seven key competencies: security strategy, risk, and compliance; security intelligence and operations; X-Force Red offensive security; X-Force Incident Response and Intelligence Services (IRIS); Identity and Access Management (IAM); data and access security; and Infrastructure and endpoint security.

Who is this Report for:

NelsonHall’s Cyber Resiliency profile on IBM is a comprehensive assessment of IBM’s offerings and capabilities designed for:

  • Sourcing managers monitoring the capabilities of existing suppliers of managed security services and identifying vendor suitability for resiliency services RFPs
  • Vendor marketing, sales, and business managers looking to benchmark themselves against their peers
  • Financial analysts and investors specializing in the IT services sector.

Scope of this Report:

The report provides a comprehensive and objective analysis of IBM’s cyber resiliency offerings and capabilities, and market and financial strengths, including:

  • Identification of the company’s strategy, emphasis, and new developments
  • Analysis of the company’s strengths, weaknesses, and outlook
  • Revenue estimates
  • Analysis of the profile of the company’s customer base including the company’s targeting strategy and examples of current contracts
  • Analysis of the company’s offerings and key service components
  • Analysis of the company’s delivery organization including the location of delivery locations.

Key Findings & Highlights:

This NelsonHall vendor assessment analyzes IBM’s offerings and capabilities in cyber resiliency.

IBM's security services are organized around seven competencies:

  • Its security strategy, risk, and compliance competency: aims to evaluate a client's existing security strategies, identify security and compliance gaps, and provide consulting and managed services to secure the client
  • Security Intelligence and operations: focus on the build and management of security operations centers (SOCs)
  • The X-Force Red Offensive Security competency: provides security testing programs using propriety and third-party tools
  • X-Force Incident Response and Intelligence Services (IRIS) competency: complements the X-Force Red Offensive Security competency by building incident response planning and services
  • Identity and Access Management (IAM) competency: aims to build effective identity and access management and governance, with a focus on the cloud
  • The data and access security competency: focuses on the deployment and monitoring of data protection systems
  • Infrastructure and endpoint security: provide security infrastructure monitoring and management for endpoints and infrastructure for the cloud.

IBM provides security services from its six 24x7 security operations centers (SOCs) and its five none-24x7 SOCs.

Login to get full access:

close