The 2018 Gartner Magic Quadrant is now available – and IBM is still a leader.

We are kicking off the new year by saying thank you to our spectacular clients all around the world that push us each year to reach for innovation in our Managed Security Services (MSS). For the third consecutive year, IBM is recognized as a Leader in the Gartner Magic Quadrant for Managed Security Services.

This is especially exciting given the well-received launches of our new X-Force Command Centers, our client-interactive IBM Cyber Range, and our powerful new X-Force Red Offensive Security Services and X-Force Incident Response and Intelligence Services (IRIS). These offerings come together to help our clients build resilient programs to prepare, prevent, detect, respond and remediate against today’s threats.

People and Innovation Together Can Make Magic

The X-Force Command Centers are the heart of IBM’s Managed Security Services. They provide real-time, global, situational threat perspective generated from millions of monitored nodes and trillions of security events. Designed for continuous collaboration and exchange of global intelligence, these centers operate with agile design-thinking principles that enable our teams to quickly assimilate and adapt to highly dynamic threats and complex investigations.

The foundations of these centers run on breakthrough innovations such as Watson for Cyber Security, QRadar, Resilient Security Orchestration, Automation, and Response (SOAR) Platform, X-Force Exchange and cutting-edge technologies emerging from our research labs. Our proud women and men of IBM Managed Security Services bring this all together with world-class expertise and a strong base of methods hardened from years of battlefield experience.

Highlights From Gartner’s Magic Quadrant for Managed Security Services

The Magic Quadrant for Managed Security Services demonstrated that service providers in the Leader quadrant have significant mindshare. They are “typically appropriate options for enterprises requiring frequent interaction with MSSP for analyst expertise and advice, and comprehensive portal-based access for interfacing with the service,” according to Gartner, and receive positive reports for service and performance from clients.

**Updated** Download the 2018 Gartner Magic Quadrant for Managed Security Services (MSSP)

We at IBM Managed Security Services are thankful to our clients for their valued comments and contribution to the Gartner survey. They are the drivers behind our continuous innovation.

Our clients played a major role in many of our investment decisions in 2016, and it’s our mission to help them address the issues they and their peer organizations still struggle with: a security workforce shortage; consolidation and a singular view into threat intelligence, response and resiliency; and the strategic and tactical security challenges to operationalize on cloud.

Good Things Come in Threes

As we kick off 2017, we’ve looked back at what happened last year. What’s poignant for us at IBM Security is the acknowledgment we have received from the analyst community. In 2016, we received recognition for our managed security services from the leading analyst firms. In one form or another, three consistent messages came across about IBM Security:

  • Global delivery;
  • Innovation or state-of-the-art security technology; and
  • High value for clients.

We are grateful for the support of our global clients, the wisdom of the analyst firms and all the commitment of IBM Security practitioners and partners around the world.

Looking Ahead in 2017

Though every year has been significant since the birth of IBM Security, 2017 will also be an important year for our journey. Watson for Cyber Security is sure to bring great innovations to our managed security services clients. Our X-Force Command Center teams are excited about these innovations, and how they will be able to serve clients faster and more efficiently in the coming days, weeks and months.

**Updated** Download the 2018 Gartner Magic Quadrant for Managed Security Services (MSSP)

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

More from Security Services

How I got started: Attack surface management

4 min read - As the threat landscape multiplies in sophistication and complexity, new roles in cybersecurity are presenting themselves more frequently than ever before. For example, attack surface management. These cybersecurity professionals are responsible for identifying, mapping and securing all external digital assets an organization owns or is connected to. This includes servers, domains, cloud assets and any other digital points that could be exploited by cyber criminals. Their role involves continuously monitoring these assets for vulnerabilities, misconfigurations or other potential security risks…

X-Force uncovers global NetScaler Gateway credential harvesting campaign

6 min read - This post was made possible through the contributions of Bastien Lardy, Sebastiano Marinaccio and Ruben Castillo. In September of 2023, X-Force uncovered a campaign where attackers were exploiting the vulnerability identified in CVE-2023-3519 to attack unpatched NetScaler Gateways to insert a malicious script into the HTML content of the authentication web page to capture user credentials. The campaign is another example of increased interest from cyber criminals in credentials. The 2023 X-Force cloud threat report found that 67% of cloud-related…

Does your security program suffer from piecemeal detection and response?

4 min read - Piecemeal Detection and Response (PDR) can manifest in various ways. The most common symptoms of PDR include: Multiple security information and event management (SIEM) tools (e.g., one on-premise and one in the cloud) Spending too much time or energy on integrating detection systems An underperforming security orchestration, automation and response (SOAR) system Only capable of taking automated responses on the endpoint Anomaly detection in silos (e.g., network separate from identity) If any of these symptoms resonate with your organization, it's…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today