Skip to main content
TrustRadius
IBM X-Force Incident Response and Intelligence Services (IRIS)

IBM X-Force Incident Response and Intelligence Services (IRIS)

Overview

What is IBM X-Force Incident Response and Intelligence Services (IRIS)?

IBM X-Force IRIS can be deployed on-site to provide a complete cybersecurity incident response, threat intelligence, and breach remediation platform.

Read more
Recent Reviews
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is IBM X-Force Incident Response and Intelligence Services (IRIS)?

IBM X-Force IRIS can be deployed on-site to provide a complete cybersecurity incident response, threat intelligence, and breach remediation platform.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

1 person also want pricing

Alternatives Pricing

What is TheHive?

TheHive is an open source and free cybersecurity incident response platform.

What is CrowdStrike Falcon?

CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment with no…

Return to navigation

Product Details

What is IBM X-Force Incident Response and Intelligence Services (IRIS)?

IBM X-Force Incident Response and Intelligence Services (IRIS) Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(3)

Reviews

(1-1 of 1)
Companies can't remove reviews or game the system. Here's why
Ruth Carson | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
This product mitigates business operations with flexible workflow control models. It responds quickly to cyber threats that affect network infrastructure. The entire configuration process was driven real-time data analytics. It generates insights that provides intelligence data for driving our targets. It has unlocked most hidden inefficiencies that could lead to poor performance. It has solved security challenges with 100% of secure work environment.
  • Faster response to cyber attacks.
  • Generation of data analytics.
  • Provision of intelligence insights for driving organization growth.
  • The developed data orchestration models performs perfectly.
  • This is great product with effective revenue generation models.
  • I am impressed by the operation of the features.
The application monitors data networks in the organization to generate positive infrastructure for controlling workflows. It enables my team to plan and collaborate from unified data connecting system that provides positive decision-making base. It has basic networking capacity of eliminating bottlenecks that slows workflows. The customer support team provides best technical support and leads for gaining maximum benefits. The cost and licensing terms can favor any business enterprise.
  • Customizable security models.
  • Reliable integration capabilities.
  • Proactive customer support team.
  • Generation of intelligence reports.
Incident Response Platforms (6)
85%
8.5
Company-wide Incident Reporting
80%
8.0
Integration with Other Security Systems
90%
9.0
Attack Chain Visualization
70%
7.0
Centralized Dashboard
100%
10.0
Machine Learning to Prevent Incidents
80%
8.0
Live Response for Rapid Remediation
90%
9.0
  • The main security challenges have been solved.
  • The efficient work environment has lead to positive ROI.
Secure work environment with this platform has enhanced effective workflow infrastructure. The cost of deployment and configuration capabilities with other security applications lead to main decision of acquiring this tool. The security control dashboards gives reliable performance reports that leads to quick decision-making when there are malware attacks. It gives lifecycle report for most work processes and threat intelligence information that enables my team to track workloads effectively.
Return to navigation