CAMBRIDGE, Mass.--(BUSINESS WIRE)--Resilient Systems, an industry standard solution for incident response (IR), announced an extension of its Incident Response Platform (IRP), which integrates with IBM security intelligence technology. This allows security teams to efficiently streamline the process of escalating security incidents between IBM Security QRadar and the Resilient IRP. Joint customers will now have access to immediate, actionable response playbooks.
Resilient Systems’ IRP is freely available to these organizations and their security teams through IBM Security App Exchange, a marketplace where developers across the industry can share applications based on IBM Security technologies. As threats evolve faster than ever, collaborative development amongst the security community will help organizations adapt quickly and speed innovation in the fight against cybercrime.
The new application leverages IBM Security QRadar, the company’s security intelligence platform, which analyzes data across an organization’s IT infrastructure in real time to identify potential security threats. Leveraging QRadar’s new open application programming interfaces (APIs) allows Resilient and IBM customers to quickly escalate incidents from QRadar directly into the Resilient platform.
Once an incident is escalated from IBM Security QRadar, the Resilient IRP generates a detailed, customized response plan that empowers team members to act quickly to mitigate any threat. Additionally, users can import and track artifacts and Indicators of Compromise (IOCs), and leverage built-in threat intelligence feeds – including IBM X-Force Exchange – to gain valuable context that informs an intelligent and decisive response.
“Organizations realize they need to respond to cyber incidents faster; improving their ability to respond directly effects their resilience in the face of attacks,” said John Bruce, co-founder and CEO of Resilient Systems. “Integrating with IBM Security’s QRadar gives our joint customers the edge they need to analyze, respond, and resolve threats quickly and effectively.”
This integration provides two ways to create incidents from QRadar within the Resilient platform: manually and automatically. In the manual escalation workflow, users can send incidents to the Resilient Systems application from the QRadar Offenses screen. Additionally, they can add IP address artifacts to existing Resilient incidents. In the automatic escalation workflow, users configure the conditions for QRadar to send offenses to Resilient automatically.
Joint Resilient Systems and IBM customers can benefit from this integration immediately by integrating the Resilient Incident Response Platform with IBM Security QRadar through the IBM Security App Exchange.
About Resilient Systems
Resilient Systems’ mission is to help organizations thrive in the face of any cyberattack or business crisis. Our award-winning Incident Response Platform (IRP) empowers security teams to analyze, respond to and mitigate incidents faster, smarter and more efficiently. Resilient is fast becoming the industry standard solution for incident response. The IRP integrates all other security technologies into a single hub and provides easy workflow customization and process automation. Armed with Resilient, security teams can have best-in-class response capabilities. Headquartered in the US and UK, Resilient Systems has more than 100 global customers, including 30 of the Fortune 500 and partners in more than 19 countries.
Learn more at resilientsystems.com.
About IBM Security
IBM’s security platform provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. IBM operates one of the world’s broadest security research and development, and delivery organizations. For more information, please visit www.ibm.com/security, follow @IBMSecurity on Twitter or visit the IBM Security Intelligence blog.