IBM to buy Resilient Systems, bringing security guru Bruce Schneier on board

New incident-response services will bolster IBM's security chops

IBM will acquire Resilient Systems, it announced Monday, and along with the company, it will gain a big name in the security world: Bruce Schneier.

Resilient makes an incident-response platform that automates and orchestrates the processes for dealing with cyber incidents such as breaches and lost devices, and enabling companies to respond more quickly. The acquisition will give IBM Security the industry's first integrated end-to-end platform combining analytics, forensics, vulnerability management and incident response, the company said.

IBM intends to bring Resilient's full staff of roughly 100 on board once the acquisition is completed, including cryptographer and security guru Bruce Schneier, Resilient's CTO.

The transaction is expected to close later this year; terms were not disclosed.

IBM has already been beefing up its security muscle for some time, including hiring 1,000 new experts last year, it said. Late last year, it appointed Mark van Zadelhoff general manager of its security business.

The Resilient acquisition bolsters IBM's incident-response capabilities.

Toward that end, IBM on Monday also launched IBM X-Force Incident Response Services to help clients plan for, manage and respond to cyberattacks. Resilient's platform will be a key component of those new services, as will IBM’s QRadar Security Intelligence Platform. IBM plans to integrate Resilient's technology across the full IBM Security portfolio, it said.

Security has become an increasingly pressing challenge in the corporate world, because it's no longer possible to make any company fully secure, said Rob Enderle, principal analyst with Enderle Group.

"The race has now moved to how quickly an attack can be discovered and mitigated so that damage is minimized," Enderle added.

At the same time, more than two-thirds of U.S. security executives say they do not have a cybersecurity incident-response plan in place, according to a Ponemon Institute study released last fall. In 2015, the average cost of a data breach for companies participating in a separate global study was $3.8 million, the research firm found.

Cyberthreats to businesses have changed considerably over time, said Charles King, principal analyst with Pund-IT.

"During the past decade, cyber attacks have grown in number, speed and sophistication, evolving from random individual incidents to systematic assaults, often funded by organized criminals or hostile governments," King explained. "The most effective way that companies can address such incidents is with what IBM calls 'immune response' solutions that constantly monitor IT environments, detect security breaches and respond instantaneously."

The addition of Resilient should broaden the areas where companies can use IBM security and also deepen the features and performance of those tools, King said. "The deal should be good for both companies, and will certainly benefit their respective customers," he added.

Join the CSO newsletter!

Error: Please check your email address.

Tags IBM

More about X-Force

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Katherine Noyes

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts