New! Threat Intelligence Strategy Map: From Technical Activities to Business Value
Select from our comprehensive threat intelligence offerings
IBM X-Force Exchange
IBM X-Force Exchange is a cloud-based threat intelligence platform that allows you to consume, share, and act on threat intelligence. It enables you to rapidly research the latest global security threats, aggregate actionable intelligence, consult with experts, and collaborate with peers. IBM X-Force Exchange, supported by human- and machine-generated intelligence, leverages the scale of IBM X-Force to help users stay ahead of emerging threats.
The Advanced Threat Protection Feed is designed to help you monitor and protect your environment efficiently. This feed provides you with machine-readable, actionable indicators that directly integrate with your security tools, such as firewalls, Intrusion Prevention Systems, and Siems, through open standards.
The IBM X-Force Exchange Commercial API provides programmatic access to external threat intelligence to help contextualize security events. As a companion offering to the IBM X-Force Exchange collaborative platform, this API uses open standards to help speed time to action.
The Early Warning Feed is designed to give you early warning on hundreds of new malicious domains surfaced daily through IBM's collaboration with Quad9. This unique content is available through the Advanced Threat Protection Feed and the X-Force Exchange Commercial API.
IBM X-Force IRIS Premium Threat Intelligence Reports
The X-Force IRIS Premium Threat Intelligence Reports provide you with timely access to contextual threat intelligence that is published and curated by the X-Force IRIS team. There are four categories of reports including Threat Activity, Malware, Threat Group Profiles, and Industry Analysis. This unique content is available through the Advanced Threat Protection Feed and the X-Force Exchange Commercial API.
IBM X-Force Exchange Software Development Kit
IBM X-Force Exchange Software Development Kit (SDK) leverages the skills and extensive infrastructure of IBM X-Force to help deliver and maintain a set of threat intelligence data focused on the areas of URL filtering, IP reputation, and web application profiles. This Software Development Kit uses an up-to-date URL filter database—also known as a web filter database—to provide accurate analysis. It also provides an application programming interface (API) to facilitate integration.
How customers use it
Research the latest threats
Finding timely and relevant threat intelligence.
X-Force Exchange provides access to 900+ terabytes of human and machine-generated threat intelligence through Reports, Advisories, and Collections, including support for third-party providers through Bring-Your-Own functionality.
Integrate threat intelligence through open standards
It takes too long to make information actionable.
IBM X-Force threat intelligence can be integrated into existing security solutions via the a RESTful API, including STIX over TAXII protocols to incorporate structured and unstructured data.
Automate blocking of malicious websites
Too many malicious domains to keep up with to create blacklist.
The Early Warning Feed provides you with a list of malicious domains to integrate with your security tools. It also provides information on deep-dive lifecycles and volumetric data allowing you to make timely decisions before a threat propagates.
Guide decision making
Decision makers in your organization are looking to make informed, strategic cybersecurity decisions.
The X-Force IRIS Premium Threat Intelligence Reports provide you with higher-order intelligence to generate strategic awareness across regions and industries, identify future trends, and characterize threat events to guide strategic decision making.
Monitor and protect your environment against cyber-threats
Lack of reliable indicators to integrate with threat monitoring tools like firewalls, intrusion prevention systems and SIEMs.
The Advanced Threat Protection Feed provides you with a list of machine-readable, actionable indicators that directly integrates with your security tools.
Once registered for an IBM ID, you will need to verify your account using the API token in the e-mail message that you receive.