IBM’s X-Force Exchange Delivers Cyber Threat Data from the Cloud

Image Attribution: Flickr

IBM’s X-Force Exchange is a 700TB database that contains data on cyber attacks. IBM has announced that they’ve released X-Force Exchange into the IBM cloud. By putting the X-Force Exchange database in the cloud, organizations can gain insights on malicious code.
IBM mentions that X-Force Exchange provides actionable threat data relating to the cyber crimes happening around the world. X-Force Exchange has the ability to provide real-time indications of an attack, thus allowing an organization to react accordingly.
Cyber security professionals agree that criminal online operations typically use the same types of tools in their exploits. Criminals online are highly motivated to steal personal and corporate information. Many organizations are simply over matched when confronted by cyber criminals. IBM believes that its X-Force Exchange can give businesses a single authority that gives them all of the information they that need to defend against a cyber attack.
IBM says that data used in X-Force Exchange has been collected by other software products such as its QRadar Security Intelligence Platform. IBM says that X-Force Exchange:

  • Provides complete access to an encyclopedia of cyber attack knowledge
  • Delivers it in a cloud form, so organizations can easily adapt the solution
  • Highlights information on over 15B security events that are processed each day
  • Details insights on malware attacks from over 270M endpoints
  • Analyzes threats from over 25B images and web pages
  • Provides spam and phishing attack intelligence
  • Delivers information on the reputation of over 1M known malicious IP addresses

IBM’s Brendan Hannigan says, “The IBM X-Force Exchange platform will foster collaboration on a scale necessary to counter the rapidly rising and sophisticated threats that companies are facing from cybercriminals.” Hannigan adds, “We’re taking the lead by opening up our own deep and global network of cyber threat research, customers, technologies and experts. By inviting the industry to join our efforts and share their own intelligence, we’re aiming to accelerate the formation of the networks and relationships we need to fight hackers.”