May 23, 2018 By John Wheeler 2 min read

Once again, we are humbled and honored to be recognized as a leader in the Gartner Magic Quadrant for Managed Security Services, a title we have held five consecutive times. Last year was another significant and transformational period for IBM Security, especially for our managed security services (MSS) business.

In 2017, we were all put to the test by unprecedented breaches, which paralyzed numerous businesses across the globe. While there is no such thing as an easy breach, several IBM MSS clients had an advantage regarding timing and reaction to WannaCry, Petya, Meltdown and Spectre.

Download the 2018 Gartner Magic Quadrant for Managed Security Services (MSSP)

A Gartner Magic Quadrant for Managed Security Services Leader

The alignment between our global capabilities, technology, threat intelligence research partnerships and people allowed us to mobilize and assist clients. It also provided us the actions and speed required to significantly minimize damage and ensure the resumption of smooth business operations.

We made significant investments in 2017 to help our clients address their regulatory obligations regarding data transmission and protection. We opened local European data centers, which can offer fully Europe-based services. Clients worldwide who conduct business in Europe have the support they need to localize their data and ensure that our dedicated teams compliantly handle it.

Cyber Range: A Must-Do

In 2017, the IBM Security Cyber Range became a must-do for more than 200 organizations throughout the world. As part of our global network of IBM X-Force Command Centers (which represents IBM Managed Security Services), the Cambridge, Massachusetts Cyber Range is an immersive experience that helps clients test and prepare for an inevitable breach. Clients get a powerful simulated experience that accelerates their preparedness — and IBM Security deepens its partnership and alignment with clients against future attacks.

The business of MSS is no longer simple firewall or device policy management. Today’s customers seek a deeper threat management partnership with vendors that deliver a comprehensive view of their threat environment. They also want a collection of crucial information about vulnerabilities, emerging threats, geographical trends and market/industry trends, as well as subsequent analyses and strategies.

At IBM Security, we are compelled to deliver on that demand — and we’ve been doing it progressively through the years.

A Pivotal Year for MSS

We believe achieving a leader recognition in the Gartner Magic Quadrant for Managed Security Services wouldn’t be possible without the partnership between our valued clients and the alignment of IBM Security analysts, intelligence researchers and our global state-of-the-art facilities in fighting cybercrime.

We are thankful to work with some of the world’s leading enterprises, and we consider it a privilege to gain the valuable experience from our clients that helps drive important innovations and transformations in our business. Through this partnership, our teams and innovations are accelerating IBM Security’s capabilities in exceeding beyond traditional MSS.

Download the 2018 Gartner Magic Quadrant for Managed Security Services (MSSP)

More from Security Services

How I got started: Attack surface management

4 min read - As the threat landscape multiplies in sophistication and complexity, new roles in cybersecurity are presenting themselves more frequently than ever before. For example, attack surface management. These cybersecurity professionals are responsible for identifying, mapping and securing all external digital assets an organization owns or is connected to. This includes servers, domains, cloud assets and any other digital points that could be exploited by cyber criminals. Their role involves continuously monitoring these assets for vulnerabilities, misconfigurations or other potential security risks…

X-Force uncovers global NetScaler Gateway credential harvesting campaign

6 min read - This post was made possible through the contributions of Bastien Lardy, Sebastiano Marinaccio and Ruben Castillo. In September of 2023, X-Force uncovered a campaign where attackers were exploiting the vulnerability identified in CVE-2023-3519 to attack unpatched NetScaler Gateways to insert a malicious script into the HTML content of the authentication web page to capture user credentials. The campaign is another example of increased interest from cyber criminals in credentials. The 2023 X-Force cloud threat report found that 67% of cloud-related…

Does your security program suffer from piecemeal detection and response?

4 min read - Piecemeal Detection and Response (PDR) can manifest in various ways. The most common symptoms of PDR include: Multiple security information and event management (SIEM) tools (e.g., one on-premise and one in the cloud) Spending too much time or energy on integrating detection systems An underperforming security orchestration, automation and response (SOAR) system Only capable of taking automated responses on the endpoint Anomaly detection in silos (e.g., network separate from identity) If any of these symptoms resonate with your organization, it's…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today