SHARE
Facebook X Pinterest WhatsApp

IBM to Put Watson to Work on IT Security

Reduce Data Breach Damage by Improving Detection and Response Most of what security analysts do comes down to correlating various events to determine how a particular attack is being perpetrated against an IT environment. Making use of years of experience, those security experts can usually identify the vulnerability being exploited, which is critical to putting […]

Written By
MV
Mike Vizard
Feb 17, 2016
Slide Show

Reduce Data Breach Damage by Improving Detection and Response

Most of what security analysts do comes down to correlating various events to determine how a particular attack is being perpetrated against an IT environment. Making use of years of experience, those security experts can usually identify the vulnerability being exploited, which is critical to putting a defense in place.

At the IBM PartnerWorld 2016 conference today, Denis Kennelly, vice president of development and technology for IBM Security, revealed that IBM is working on employing its Watson artificial intelligence platform to work on IT security issues. By integrating IBM Watson with its X-Force security database and Qradar security intelligence software, Kennelly says IBM plans to elevate the level of analytics being used to identify attack patterns. IBM is also committed to sharing those patterns via an IBM X-Force Exchange service it unveiled last year.

Kennelly says the goal is not to replace security analysts, but rather compensate for the acute shortage of IT personnel with IT security expertise. Because so much relevant IT security information is contained in unstructured formats such as blogs, individual IT security teams can’t correlate that information. In contrast, IBM Watson not only takes advantage of advanced analytics to correlate that data, the information itself is more accessible using natural language.

In addition to security, IBM is building a broad range of Watson content libraries on its own and in conjunction with partners. In the case of security, the company is leveraging a database of exploits it has been collecting for several decades.

The opportunity now is to not only collect that data, but put it to use to both prevent the attack in the first place and, eventually, identify the person or organization that launched it.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Top RPA Tools 2022: Robotic Process Automation Software
Jenn Fulmer
Aug 24, 2022
Metaverse’s Biggest Potential Is In Enterprises
Tom Taulli
Aug 18, 2022
The Value of the Metaverse for Small Businesses
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.