SHARE
Facebook X Pinterest WhatsApp

IBM Opens QRadar Security Platform APIs

Study Finds More Companies Have Data Breach Response Plan, But Still Lack Crucial Steps Recognizing that IT security by definition is a team sport, IBM today announced it is adding a set of open application programming interfaces (APIs) to the IBM Security QRadar platformthrough which third-party organizations can build applications that can be accessed via […]

Written By
MV
Mike Vizard
Dec 8, 2015
Slide Show

Study Finds More Companies Have Data Breach Response Plan, But Still Lack Crucial Steps

Recognizing that IT security by definition is a team sport, IBM today announced it is adding a set of open application programming interfaces (APIs) to the IBM Security QRadar platformthrough which third-party organizations can build applications that can be accessed via a new IBM Security App Exchange marketplace. Kevin Skapinetz, director of strategy for IBM Security, says that given the simple fact that digital criminals now routinely share information concerning vulnerabilities and attack vectors, it benefits the IT security community to share as much intelligence as possible.

With that goal in mind, IBM previously agreed to share the IT security data it collects, which is a resource that IBM says over 2,000 organizations are now making use of to gather security intelligence. Now Skapinetz says IBM is taking that concept one step further by publishing an open set of APIs for its security analytics application.

The first four third-party vendors to make use of the IBM APIs are Bit9 + Carbon Black, BrightPoint Security, Exabeam and Resilient Systems. STEALTHbits and iSIGHT Partners also have apps in development.

IBM today also unveiled a new release of IBM Security QRadar, which can now invoke rules to deal with specific threats once they are detected, and offers tighter integration between QRadar and IBM BigFix endpoint security management software.

The sad truth of the matter is that when it comes to IT security, most organizations are hopelessly outgunned. They generally don’t have the expertise needed to proactively detect threats, which results in systems being compromised for months before anyone realizes those systems have been compromised. As in the days of yore, when merchants pooled their collective resources to defend their commerce from the threat of piracy, modern organizations need to be able to collaborate in ways that much better defend their IT security interests. After all, it’s a lot easier for criminals to prey on a lone organization than it is one that is part of a much larger digital convoy.

IBM-App-Exchange

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Top ETL Tools 2022
Collins Ayuya
Jul 14, 2022
Snowflake vs. Databricks: Big Data Platform Comparison
Surajdeep Singh
Jul 14, 2022
Identify Where Your Information Is Vulnerable Using Data Flow Diagrams
Jillian Koskie
Jun 22, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.