Feature spotlights

Interactive API Documentation

Through the Swagger site, you can try out all of the API calls from by clicking the [Try it out!] button in each API endpoint section. You will need to provide the API Key and password affiliated with your IBM ID from the IBM X-Force Exchange platform after logging in with your IBM ID.

Integrated Threat Intelligence

Learn how research from IBM X-Force is transformed into actionable intelligence and integrated into security intelligence solutions.

Access Active Investigations

Take advantage of IBM X-Force research expertise and access published investigations and IOCs for active threats and malware campaigns.

Use STIX/TAXII Open Standards

Import threat indictors to existing security solutions using STIX over TAXII to help speed investigation and response time.

How customers use it

  • Enhance security insights with curated content

    Enhance security insights with curated content

    Problem

    Security analysts can’t separate the signal from the noise.

    Solution

    IBM X-Force automated technologies and research teams monitor the global threat level at all times to deliver a range of intelligence from higher order investigations to indicators and observables.

  • Integrate threat intelligence through open standards

    Integrate threat intelligence through open standards

    Problem

    It takes too long to make information actionable.

    Solution

    IBM X-Force threat intelligence can be integrated into existing security solutions via the a RESTful API, including STIX over TAXII protocols to incorporate structured and unstructured data.

Technical details

Software requirements

IBM X-Force Exchange is a cloud-based platform that works on the latest versions of Firefox, Chrome, Internet Explorer, and Safari. The Commercial API has no additional requirements.

    Hardware requirements

    IBM X-Force Exchange is a cloud-based platform. Hardware requirements are for devices that can run the latest versions of Firefox, Chrome, Internet Explorer, and Safari.

      Technical specifications

      Once registered for an IBM ID you will need to verify your account using the API token in the e-mail message that you receive.

        See a complete list of technical specifications

        Buy now and get started