CINXE.COM
What Is Extended Detection and Response (XDR)? | IBM
<!DOCTYPE HTML> <html lang="en"> <head> <meta charset="UTF-8"/> <meta name="languageCode" content="en"/> <meta name="countryCode" content="us"/> <meta name="searchTitle" content="What Is Extended Detection and Response (XDR)?"/> <meta name="focusArea" content="Security - All"/> <title>What Is Extended Detection and Response (XDR)? | IBM</title> <script defer="defer" type="text/javascript" src="https://rum.hlx.page/.rum/@adobe/helix-rum-js@%5E2/dist/rum-standalone.js" data-routing="program=131558,environment=1281329,tier=publish"></script> <link rel="icon" href="/content/dam/adobe-cms/default-images/favicon.svg"/> <meta name="keywords" content="Extended detection and response"/> <meta name="description" content="Extended detection and response (XDR) is an open cybersecurity architecture that integrates security tools and unifies security operations across all security layers."/> <meta name="template" content="article"/> <meta name="viewport" content="width=device-width, initial-scale=1"/> <meta name="robots" content="index, follow, max-image-preview:large"/> <meta name="ibm.com.search.appid" content="thinkhub"/> <meta name="ibm.com.search.scopes" content="thinkhub"/> <meta name="dcterms.date" content="2023-03-03T00:00:00.000"/> <meta name="ibm.search.facet.field_hierarchy_01" content="taxonomy : Topics / Cybersecurity / Threat management / Threat detection and response / Extended detection and response"/> <meta name="ibm.search.facet.field_hierarchy_02"/> <meta name="ibm.search.facet.field_hierarchy_03" content="taxonomy : Content Format / Article"/> <meta name="ibm.search.facet.field_hierarchy_04" content="taxonomy : Content Type / Explainer"/> <meta name="ibm.search.facet.field_hierarchy_05"/> <meta name="ibm.search.facet.field_keyword_01" content="Extended detection and response"/> <meta name="ibm.search.facet.field_keyword_09" content="https://prod-cloud-publish.aem.ibm.net/content/dam/connectedassets-adobe-cms/worldwide-content/stock-assets/getty/image/photography/42/1e/pi-2107773.component.crop-thumbnail-16-by-9-retina.ts=0.jpg/content/adobe-cms/us/en/think/topics/xdr/jcr:content/root/leadspace_container/leadspace_article"/> <meta name="ibm.search.facet.field_keyword_14"/> <meta name="ibm.search.facet.field_text_01" content="03 March 2023"/> <meta name="ibm.search.facet.field_text_03" content="Explainer"/> <link rel="canonical" href="https://www.ibm.com/think/topics/xdr"/> <link rel="preload" href="/etc.clientlibs/adobe-cms/clientlibs/clientlib-masthead-container.lc-b26f958162efaa6f8eab64f9ba97ad45-lc.min.js" as="script"> <link rel="preload" href="/etc.clientlibs/adobe-cms/clientlibs/clientlib-leadspace.lc-2d50e2fcd68a57f32e42baf02c067083-lc.min.js" as="script"> <script type="text/javascript"> !function(e, a, n, t) { var i = e.head; if (i) { if (a) return; var o = e.createElement("style"); o.id = "alloy-prehiding", o.innerText = n, i.appendChild(o), setTimeout(function() { o.parentNode && o.parentNode.removeChild(o) }, t) } } (document, document.location.href.indexOf("adobe_authoring_enabled") !== -1, "body { opacity: 0 !important }", 900); </script> <script src="https://assets.adobedtm.com/0f2de1d5b89a/565c2aeb0d39/launch-560e54b3e83c.min.js" type="text/javascript" async="async"></script> <script type="text/javascript" async="async"> var adobeDataLayer = window.adobeDataLayer || []; </script> <script type="text/javascript"> window.searchKey = { templateName: 'article', taxonomylist: 'taxonomy : Topics \/ Cybersecurity \/ Threat management \/ Threat detection and response \/ Extended detection and response', L0Tag: 'Topics,Brands,Industries,Geography,Compliance Entities,Products,Events,Computer Languages,Content Format,Series,Content Type,CMaaS Focus Areas,brands,Deployment Types,Product Types,Search Index,Unified Taxonomy', } </script> <link rel="alternate" hreflang="en-us" href="https://www.ibm.com/think/topics/xdr"/> <script type="text/javascript"> var languageCode = document.getElementsByName('languageCode')[0].content; var countryCode = document.getElementsByName('countryCode')[0].content; var focusArea = document.getElementsByName('focusArea')[0].content; /* Define digital data object based on _appInfo object */ window._ibmAnalytics = { settings: { name: "AEM Sites", tealiumProfileName: "aem-sites" }, }; window.digitalData = { page: { category: { primaryCategory: '', }, pageInfo: { language: languageCode + '-' + countryCode, ibm: { siteID: 'MarketingAEM', country: countryCode, messaging: { routing: { focusArea: focusArea, languageCode: languageCode, regionCode: countryCode }, translation: { languageCode: languageCode, regionCode: countryCode } }, sections: 0, patterns: 0, }, carbon: { '@carbon/web-components': 'v1.47.1', '@carbon/ibmdotcom-web-components': 'v1.51.1', 'carbon-for-aem': 'v0.19.0', }, }, }, }; </script> <script type="application/ld+json"> { "@context": "https://schema.org", "@type": "BlogPosting", "mainEntityOfPage": { "@type": "WebPage", "@id": "https://www.ibm.com/think/topics/xdr" }, "headline": "Extended detection and response", "image": [ "https://www.ibm.com/content/dam/connectedassets-adobe-cms/worldwide-content/stock-assets/getty/image/photography/42/1e/pi-2107773.jpg" ], "datePublished": "", "dateModified": "2025-01-13T14:04:04.391Z", "author": {"@type": "Organization","name": "IBM","url": "https://www.ibm.com"} } </script> <!-- Instana script specific to Dev environment start --> <!-- <script> (function(s,t,a,n){s[t]||(s[t]=a,n=s[a]=function(){n.q.push(arguments)}, n.q=[],n.v=2,n.l=1*new Date)})(window,"InstanaEumObject","ineum"); ineum('reportingUrl', 'https://eum-orange-saas.instana.io'); ineum('key', 'mFJnYtpBSiCKl9zenWHXtg'); ineum('trackSessions'); </script> <script defer crossorigin="anonymous" src=https://eum.instana.io/1.7.2/eum.min.js integrity="sha384-cgeSlevgebehPauohUhsnAeBrpjXzaj94mSv3L2EXjCQH0RRb9xSQ2ErGOWkthIJ"></script>--> <!-- Instana script specific to Dev environment end --> <meta property="og:url" content="https://www.ibm.com/think/topics/xdr"/> <meta property="og:type" content="website"/> <meta property="og:title" content="What Is Extended Detection and Response (XDR)? | IBM"/> <meta property="og:description" content="Extended detection and response (XDR) is an open cybersecurity architecture that integrates security tools and unifies security operations across all security layers."/> <meta property="og:image" content="https://assets.ibm.com/is/image/ibm/ibm-8bar-logo-2560x2560?$original$"/> <script src="https://1.www.s81c.com/common/stats/ibm-common.js" type="text/javascript" async="async"></script> <link rel="preload" href="https://hybrid-cloud-widgets-production.s3.us.cloud-object-storage.appdomain.cloud/loader.js" as="script"/> <script src="https://hybrid-cloud-widgets-production.s3.us.cloud-object-storage.appdomain.cloud/loader.js" type="application/javascript"></script> <link rel="stylesheet" href="/etc.clientlibs/adobe-cms/clientlibs/clientlib-base.lc-30313e00669f877069f15dd099f23454-lc.min.css" type="text/css"> <link rel="stylesheet" href="/etc.clientlibs/adobe-cms/clientlibs/clientlib-idlStylesCarbon.lc-cb338454784b041f689bc70d1113fcc5-lc.min.css" type="text/css"> <link rel="stylesheet" href="/etc.clientlibs/adobe-cms/clientlibs/clientlib-idlStyles.lc-f50a659a9c41c9bb537184e18175e0f3-lc.min.css" type="text/css"> <link rel="stylesheet" href="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/tag/v1/latest/plex.css"/> <link rel="stylesheet" href="https://1.www.s81c.com/common/carbon/plex/sans.css"/> </head> <body class="content-page page basicpage publish" id="content-page-a001557534" data-fullwidthtemplate="false"> <c4d-video-cta-container> <div class="root container responsivegrid"> <div id="container-25343bfcda" class="cmp-container"> <div class="masthead"> <c4d-masthead-container data-endpoint="#" auth-method="profile-api" has-contact="true" has-profile has-search has-cart></c4d-masthead-container> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-masthead-container.lc-b26f958162efaa6f8eab64f9ba97ad45-lc.min.js"></script> <script> let l0Json = "{\x22profileMenu\x22:{\x22signedout\x22:[{\x22title\x22:\x22My IBM\x22,\x22url\x22:\x22https:\/\/myibm.ibm.com\/?lnk=mmi\x22},{\x22title\x22:\x22Log in\x22,\x22url\x22:\x22https:\/\/login.ibm.com\/oidc\/endpoint\/default\/authorize?redirect_uri=https%3A%2F%2Fmyibm.ibm.com%2FOIDCHandler.html\x26response_type=token\x26client_id=v18LoginProdCI\x26scope=openid\x26state=https%3A%2F%2Fwww.ibm.com\x26nonce=8675309\x22}],\x22signedin\x22:[{\x22title\x22:\x22My IBM\x22,\x22url\x22:\x22https:\/\/myibm.ibm.com\/?lnk=mmi\x22},{\x22title\x22:\x22Log in\x22,\x22url\x22:\x22https:\/\/login.ibm.com\/oidc\/endpoint\/default\/authorize?redirect_uri=https%3A%2F%2Fmyibm.ibm.com%2FOIDCHandler.html\x26response_type=token\x26client_id=v18LoginProdCI\x26scope=openid\x26state=https%3A%2F%2Fwww.ibm.com\x26nonce=8675309\x22}]},\x22mastheadNav\x22:{\x22links\x22:[{\x22title\x22:\x22AI\x22,\x22url\x22:\x22\x22,\x22submenu\x22:{\x22sections\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22Overview\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/artificial\u002Dintelligence\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Consulting\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/consulting\/artificial\u002Dintelligence\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22watsonx\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/watsonx\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Research\x22,\x22url\x22:\x22https:\/\/research.ibm.com\/artificial\u002Dintelligence\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Assistants\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/ai\u002Dassistants\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Ethics and governance\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/impact\/ai\u002Dethics\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Granite models\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/granite\x22,\x22description\x22:\x22\x22},\x22links\x22:[]}]}],\x22viewAll\x22:{\x22title\x22:\x22\x22,\x22url\x22:\x22\x22}}},{\x22title\x22:\x22Hybrid Cloud\x22,\x22url\x22:\x22\x22,\x22submenu\x22:{\x22sections\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22Overview\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/hybrid\u002Dcloud\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Quantum computing\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/quantum\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Cloud platform\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/cloud\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Research\x22,\x22url\x22:\x22https:\/\/research.ibm.com\/hybrid\u002Dcloud\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Consulting\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/consulting\/cloud\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[]}]}],\x22viewAll\x22:{\x22title\x22:\x22\x22,\x22url\x22:\x22\x22}}},{\x22title\x22:\x22Products\x22,\x22url\x22:\x22\x22,\x22submenu\x22:{\x22sections\x22:[{\x22heading\x22:{\x22title\x22:\x22Featured\x22,\x22description\x22:\x22\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22API Connect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/api\u002Dconnect?lnk=flatitem\x22,\x22description\x22:\x22Software to rapidly create, protect, socialize and manage APIs\x22},{\x22title\x22:\x22Concert\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/concert?lnk=flatitem\x22,\x22description\x22:\x22Software to simplify and optimize application management\x22},{\x22title\x22:\x22Environmental Intelligence\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/environmental\u002Dintelligence?lnk=flatitem\x22,\x22description\x22:\x22SaaS for predicting and responding to weather and climate events\x22},{\x22title\x22:\x22Envizi\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/envizi?lnk=flatitem\x22,\x22description\x22:\x22ESG data management, reporting and analysis SaaS\x22},{\x22title\x22:\x22FlashSystem\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/flashsystem?lnk=flatitem\x22,\x22description\x22:\x22Primary storage for performance and latency sensitive workloads\x22},{\x22title\x22:\x22Hybrid Cloud Mesh\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/hybrid\u002Dcloud\u002Dmesh?lnk=flatitem\x22,\x22description\x22:\x22SaaS for deploying and managing hybrid and multicloud networks\x22},{\x22title\x22:\x22IBM Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/cloud?lnk=flatitem\x22,\x22description\x22:\x22On\u002Ddemand cloud computing platform and APIs\x22},{\x22title\x22:\x22IBM Z\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/z?lnk=flatitem\x22,\x22description\x22:\x22Flagship mainframe with on\u002Dchip AI and quantum\u002Dsafe cryptography\x22},{\x22title\x22:\x22Instana\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/instana?lnk=flatitem\x22,\x22description\x22:\x22Software for application performance monitoring and automation\x22},{\x22title\x22:\x22MaaS360\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/maas360?lnk=flatitem\x22,\x22description\x22:\x22Unified endpoint management software for many device types\x22},{\x22title\x22:\x22Maximo\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/maximo?lnk=flatitem\x22,\x22description\x22:\x22Software for asset management and related workflows\x22},{\x22title\x22:\x22Planning Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/planning\u002Danalytics?lnk=flatitem\x22,\x22description\x22:\x22Software to automate financial and operational planning\x22},{\x22title\x22:\x22Robotic Process Automation (RPA)\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/robotic\u002Dprocess\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22Software to automate workflows and business processes\x22},{\x22title\x22:\x22Storage Defender\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Ddefender?lnk=flatitem\x22,\x22description\x22:\x22Data resiliency software for threat detection and data recovery\x22},{\x22title\x22:\x22Turbonomic\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/turbonomic?lnk=flatitem\x22,\x22description\x22:\x22Software to manage and optimize IT resource usage\x22},{\x22title\x22:\x22watsonx\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/watsonx?lnk=flatitem\x22,\x22description\x22:\x22AI and data platform\x22},{\x22title\x22:\x22watsonx Assistant\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dassistant?lnk=flatitem\x22,\x22description\x22:\x22Virtual agents customizable to any domain\x22},{\x22title\x22:\x22watsonx Orchestrate\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dorchestrate?lnk=flatitem\x22,\x22description\x22:\x22Personal\u002Dassistant software that automates repetitive tasks\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22AI \x26 machine learning\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/artificial\u002Dintelligence?lnk=flathl\x22,\x22description\x22:\x22Use IBM Watson’s AI or build your own machine learning models\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloud Pak for AIOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Daiops?lnk=flatitem\x22,\x22description\x22:\x22DevOps management tool with AI analysis and recommendations\x22},{\x22title\x22:\x22Cloud Pak for Data\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Ddata?lnk=flatitem\x22,\x22description\x22:\x22Tools for data analysis, organization and management\x22},{\x22title\x22:\x22Knowledge Catalog\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/knowledge\u002Dcatalog?lnk=flatitem\x22,\x22description\x22:\x22SaaS to catalog data, AI models, metadata, policies and more\x22},{\x22title\x22:\x22Watson Discovery\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watson\u002Ddiscovery?lnk=flatitem\x22,\x22description\x22:\x22AI to search in and answer questions about business documents\x22},{\x22title\x22:\x22Watson Natural Language Understanding\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/natural\u002Dlanguage\u002Dunderstanding?lnk=flatitem\x22,\x22description\x22:\x22API for text analysis and metadata extraction\x22},{\x22title\x22:\x22Watson Speech to Text\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/speech\u002Dto\u002Dtext?lnk=flatitem\x22,\x22description\x22:\x22API for real\u002Dtime speech recognition and transcription\x22},{\x22title\x22:\x22Watson Studio\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watson\u002Dstudio?lnk=flatitem\x22,\x22description\x22:\x22IDE to build, run and manage AI models\x22},{\x22title\x22:\x22Watson Text to Speech\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/text\u002Dto\u002Dspeech?lnk=flatitem\x22,\x22description\x22:\x22API for real\u002Dtime text to speech conversion\x22},{\x22title\x22:\x22Z Anomaly Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/z\u002Danomaly\u002Danalytics?lnk=flatitem\x22,\x22description\x22:\x22Operational anomaly detection software for mainframes\x22},{\x22title\x22:\x22watsonx\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/watsonx?lnk=flatitem\x22,\x22description\x22:\x22AI and data platform\x22},{\x22title\x22:\x22watsonx Assistant\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dassistant?lnk=flatitem\x22,\x22description\x22:\x22Virtual agents customizable to any domain\x22},{\x22title\x22:\x22watsonx Code Assistant\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dcode\u002Dassistant?lnk=flatitem\x22,\x22description\x22:\x22AI tool to generate code\x22},{\x22title\x22:\x22watsonx Orders\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dorders?lnk=flatitem\x22,\x22description\x22:\x22AI voice agent for taking restaurant orders\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/analytics?lnk=flathl\x22,\x22description\x22:\x22Aggregate and analyze large datasets\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Business Analytics Enterprise\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/business\u002Danalytics\u002Denterprise?lnk=flatitem\x22,\x22description\x22:\x22Software for business planning and analysis\x22},{\x22title\x22:\x22CPLEX\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ilog\u002Dcplex\u002Doptimization\u002Dstudio?lnk=flatitem\x22,\x22description\x22:\x22Software to build and solve complex optimization models\x22},{\x22title\x22:\x22Cloud Pak for Data\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Ddata?lnk=flatitem\x22,\x22description\x22:\x22Tools for data analysis, organization and management\x22},{\x22title\x22:\x22Cognos Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cognos\u002Danalytics?lnk=flatitem\x22,\x22description\x22:\x22Software for business intelligence and performance management\x22},{\x22title\x22:\x22Databand\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databand?lnk=flatitem\x22,\x22description\x22:\x22Data observability software for data engineers and DataOps teams\x22},{\x22title\x22:\x22InfoSphere Information Server\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/information\u002Dserver?lnk=flatitem\x22,\x22description\x22:\x22Data integration suite for ETL, governance and analysis\x22},{\x22title\x22:\x22Manta Data Lineage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/manta\u002Ddata\u002Dlineage?lnk=flatitem\x22,\x22description\x22:\x22Software to visualize the flow of data from origin to consumption\x22},{\x22title\x22:\x22Netezza\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/netezza?lnk=flatitem\x22,\x22description\x22:\x22Data warehousing and analytics system on custom hardware\x22},{\x22title\x22:\x22Optim\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/infosphere\u002Doptim?lnk=flatitem\x22,\x22description\x22:\x22Software to manage test, production, and archived data\x22},{\x22title\x22:\x22Planning Analytics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/planning\u002Danalytics?lnk=flatitem\x22,\x22description\x22:\x22Software to automate financial and operational planning\x22},{\x22title\x22:\x22SPSS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/spss?lnk=flatitem\x22,\x22description\x22:\x22Software for statistical analysis and business intelligence\x22},{\x22title\x22:\x22Spectrum Computing\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/high\u002Dperformance\u002Dcomputing?lnk=flatitem\x22,\x22description\x22:\x22Software to optimize resources in complex computing clusters\x22},{\x22title\x22:\x22StreamSets\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/streamsets?lnk=flatitem\x22,\x22description\x22:\x22Graphical interface to build and manage streaming data pipelines\x22},{\x22title\x22:\x22Watson Discovery\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watson\u002Ddiscovery?lnk=flatitem\x22,\x22description\x22:\x22AI to search in and answer questions about business documents\x22},{\x22title\x22:\x22Watson Studio\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watson\u002Dstudio?lnk=flatitem\x22,\x22description\x22:\x22IDE to build, run and manage AI models\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Asset lifecycle management\x22,\x22description\x22:\x22Manage and maintain physical assets\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Environmental Intelligence\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/environmental\u002Dintelligence?lnk=flatitem\x22,\x22description\x22:\x22SaaS for predicting and responding to weather and climate events\x22},{\x22title\x22:\x22Envizi\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/envizi?lnk=flatitem\x22,\x22description\x22:\x22ESG data management, reporting and analysis SaaS\x22},{\x22title\x22:\x22Maximo\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/maximo?lnk=flatitem\x22,\x22description\x22:\x22Software for asset management and related workflows\x22},{\x22title\x22:\x22TRIRIGA\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/tririga?lnk=flatitem\x22,\x22description\x22:\x22Software for real estate and workplace management\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Business automation\x22,\x22description\x22:\x22Automate workflows and business processes\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Blueworks Live\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/blueworkslive?lnk=flatitem\x22,\x22description\x22:\x22SaaS for collaboratively modeling business processes\x22},{\x22title\x22:\x22Business Automation Manager Open Editions\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/business\u002Dautomation\u002Dmanager\u002Dopen\u002Deditions?lnk=flatitem\x22,\x22description\x22:\x22Workflow automation and decision management software\x22},{\x22title\x22:\x22Business Automation Workflow\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/business\u002Dautomation\u002Dworkflow?lnk=flatitem\x22,\x22description\x22:\x22Cloud Pak for Business Automation add\u002Don to automate workflows\x22},{\x22title\x22:\x22Cloud Pak for Business Automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Dbusiness\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22Operations management software with AI insights\x22},{\x22title\x22:\x22Datacap\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/data\u002Dcapture\u002Dand\u002Dimaging?lnk=flatitem\x22,\x22description\x22:\x22Document management for IBM Cloud Pak for Business Automation\x22},{\x22title\x22:\x22Event Automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/event\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22No\u002Dcode tool for building automated event driven workflows\x22},{\x22title\x22:\x22FileNet Content Manager\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/filenet\u002Dcontent\u002Dmanager?lnk=flatitem\x22,\x22description\x22:\x22Content management solution for Cloud Pak for Business Automation\x22},{\x22title\x22:\x22Operational Decision Manager\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/operational\u002Ddecision\u002Dmanager?lnk=flatitem\x22,\x22description\x22:\x22Cloud Pak for Business Automation addon for rule\u002Dbased decisions\x22},{\x22title\x22:\x22Process Mining\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/process\u002Dmining?lnk=flatitem\x22,\x22description\x22:\x22Software to extract process data from business applications\x22},{\x22title\x22:\x22Robotic Process Automation (RPA)\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/robotic\u002Dprocess\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22Software to automate workflows and business processes\x22},{\x22title\x22:\x22watsonx Orchestrate\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/watsonx\u002Dorchestrate?lnk=flatitem\x22,\x22description\x22:\x22Personal\u002Dassistant software that automates repetitive tasks\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Containers\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/containers?lnk=flathl\x22,\x22description\x22:\x22Allocate compute infrastructure on demand\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloud Satellite\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/satellite?lnk=flatitem\x22,\x22description\x22:\x22Platform for running managed cloud services on any infrastructure\x22},{\x22title\x22:\x22Code Engine\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/code\u002Dengine?lnk=flatitem\x22,\x22description\x22:\x22Managed serverless runtime for containers, batch jobs, or code\x22},{\x22title\x22:\x22Container Registry\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/container\u002Dregistry?lnk=flatitem\x22,\x22description\x22:\x22Private SaaS registry for container storage and management\x22},{\x22title\x22:\x22Kubernetes Service\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/kubernetes\u002Dservice?lnk=flatitem\x22,\x22description\x22:\x22Managed Kubernetes for high availability container deployments\x22},{\x22title\x22:\x22Red Hat OpenShift on IBM Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/openshift?lnk=flatitem\x22,\x22description\x22:\x22Managed service with tools for security, management and monitoring\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Databases\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/database?lnk=flathl\x22,\x22description\x22:\x22Store, query and analyze structured data\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloudant\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloudant?lnk=flatitem\x22,\x22description\x22:\x22Managed PCI\u002Dcompliant JSON document store on Apache CouchDB\x22},{\x22title\x22:\x22Db2\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/db2\u002Ddatabase?lnk=flatitem\x22,\x22description\x22:\x22Data management software including IBM Db2 Database\x22},{\x22title\x22:\x22Db2 for z\/OS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/db2\u002Dfor\u002Dzos?lnk=flatitem\x22,\x22description\x22:\x22IBM Db2 Database for IBM Z mainframes\x22},{\x22title\x22:\x22IBM Cloud Databases for Elastic Search\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Delasticsearch?lnk=flatitem\x22,\x22description\x22:\x22JSON document store for full\u002Dtext search\x22},{\x22title\x22:\x22IBM Cloud Databases for EnterpriseDB\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Denterprisedb?lnk=flatitem\x22,\x22description\x22:\x22PostgreSQL with added performance, security and management features\x22},{\x22title\x22:\x22IBM Cloud Databases for MongoDB\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Dmongodb?lnk=flatitem\x22,\x22description\x22:\x22Managed NoSQL JSON document store\x22},{\x22title\x22:\x22IBM Cloud Databases for MySQL\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Dmysql?lnk=flatitem\x22,\x22description\x22:\x22Managed SQL database\x22},{\x22title\x22:\x22IBM Cloud Databases for PostgreSQL\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Dpostgresql?lnk=flatitem\x22,\x22description\x22:\x22Managed SQL database with advanced features\x22},{\x22title\x22:\x22IBM Cloud Databases for etcd\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/databases\u002Dfor\u002Detcd?lnk=flatitem\x22,\x22description\x22:\x22Distributed key\u002Dvalue store\x22},{\x22title\x22:\x22Information Management System (IMS)\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ims?lnk=flatitem\x22,\x22description\x22:\x22Database and management system for high\u002Dvolume transactions\x22},{\x22title\x22:\x22Informix\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/informix?lnk=flatitem\x22,\x22description\x22:\x22Embeddable database for SQL, NoSQL, time\u002Dseries and spatial data\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22DevOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/devops?lnk=flathl\x22,\x22description\x22:\x22Manage infrastructure, environments and deployments\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Application Delivery Foundation for z\/OS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Ddelivery\u002Dfoundation\u002Dfor\u002Dzos?lnk=flatitem\x22,\x22description\x22:\x22Application development and DevOps tools for z\/OS\x22},{\x22title\x22:\x22Application Discovery and Delivery Intelligence\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Ddiscovery\u002Dand\u002Ddelivery\u002Dintelligence?lnk=flatitem\x22,\x22description\x22:\x22Analysis tool for visualizing applications, data and jobs on z\/OS\x22},{\x22title\x22:\x22Cloud Continuous Delivery\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/continuous\u002Ddelivery?lnk=flatitem\x22,\x22description\x22:\x22Toolchains to automate building and deploying applications\x22},{\x22title\x22:\x22Cloud Pak for AIOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Daiops?lnk=flatitem\x22,\x22description\x22:\x22DevOps management tool with AI analysis and recommendations\x22},{\x22title\x22:\x22DevOps Build\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/devops\u002Dbuild?lnk=flatitem\x22,\x22description\x22:\x22Management tool for configuring and running software builds\x22},{\x22title\x22:\x22DevOps Code ClearCase\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/devops\u002Dcode\u002Dclearcase?lnk=flatitem\x22,\x22description\x22:\x22Configuration management system for software asset access control\x22},{\x22title\x22:\x22DevOps Deploy\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/devops\u002Ddeploy?lnk=flatitem\x22,\x22description\x22:\x22Automation software for continuous delivery and deployment\x22},{\x22title\x22:\x22DevOps Test\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/devops\u002Dtest?lnk=flatitem\x22,\x22description\x22:\x22Continuous testing and virtualization platform\x22},{\x22title\x22:\x22DevOps Velocity\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/devops\u002Dvelocity?lnk=flatitem\x22,\x22description\x22:\x22Release management software for pipeline orchestration and analytics\x22},{\x22title\x22:\x22Engineering Lifecycle Management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/engineering\u002Dlifecycle\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22Software for product and application lifecycle management\x22},{\x22title\x22:\x22IBM i Modernization Engine\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ibm\u002Di\u002Dmerlin?lnk=flatitem\x22,\x22description\x22:\x22Development and modernization tools for IBM i applications\x22},{\x22title\x22:\x22Rational ClearQuest\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/rational\u002Dclearquest?lnk=flatitem\x22,\x22description\x22:\x22Change management software\x22},{\x22title\x22:\x22Rational Software Architect Designer\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/rational\u002Dsoftware\u002Darchitect\u002Ddesigner?lnk=flatitem\x22,\x22description\x22:\x22Tools to create, evaluate, and communicate software architecture\x22},{\x22title\x22:\x22Test Accelerator for Z\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/test\u002Daccelerator\u002Dz?lnk=flatitem\x22,\x22description\x22:\x22Test automation and test generation framework for z\/OS\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22IT automation\x22,\x22description\x22:\x22Automate IT infrastructure management\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Apptio\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/apptio?lnk=flatitem\x22,\x22description\x22:\x22Hybrid cloud financial management and planning software\x22},{\x22title\x22:\x22Cloud App Configuration\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Dconfiguration?lnk=flatitem\x22,\x22description\x22:\x22Feature management and configuration service for web and mobile apps\x22},{\x22title\x22:\x22Cloud App ID\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Did?lnk=flatitem\x22,\x22description\x22:\x22Authentication and user management service for web and mobile apps\x22},{\x22title\x22:\x22Cloud Monitoring\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dmonitoring?lnk=flatitem\x22,\x22description\x22:\x22Hosted monitoring tool for organization\u002Dwide system performance\x22},{\x22title\x22:\x22Cloud Pak for AIOps\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Daiops?lnk=flatitem\x22,\x22description\x22:\x22DevOps management tool with AI analysis and recommendations\x22},{\x22title\x22:\x22Cloud Schematics\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/schematics?lnk=flatitem\x22,\x22description\x22:\x22Management and provisionining of cloud infrastructure with code\x22},{\x22title\x22:\x22Concert\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/concert?lnk=flatitem\x22,\x22description\x22:\x22Software to simplify and optimize application management\x22},{\x22title\x22:\x22Event Notifications\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/event\u002Dnotifications?lnk=flatitem\x22,\x22description\x22:\x22Notification and workflow automation service for IBM Cloud events\x22},{\x22title\x22:\x22Flexera One\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/flexera\u002Done?lnk=flatitem\x22,\x22description\x22:\x22IT asset management software\x22},{\x22title\x22:\x22IBM Cloud Logs\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dlogs?lnk=flatitem\x22,\x22description\x22:\x22Logging and observability service for applications and infrastructure\x22},{\x22title\x22:\x22Instana\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/instana?lnk=flatitem\x22,\x22description\x22:\x22Software for application performance monitoring and automation\x22},{\x22title\x22:\x22Turbonomic\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/turbonomic?lnk=flatitem\x22,\x22description\x22:\x22Software to manage and optimize IT resource usage\x22},{\x22title\x22:\x22Z IntelliMagic Vision for z\/OS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/z\u002Dintellimagic\u002Dvision\u002Dfor\u002Dzos?lnk=flatitem\x22,\x22description\x22:\x22Infrastructure performance management and monitoring software\x22},{\x22title\x22:\x22Z Service Management Suite\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/z\u002Dservice\u002Dmanagement\u002Dsuite?lnk=flatitem\x22,\x22description\x22:\x22Monitoring, control, and automation suite for Z\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Middleware\x22,\x22description\x22:\x22Connect your applications, data and events\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22API Connect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/api\u002Dconnect?lnk=flatitem\x22,\x22description\x22:\x22Software to rapidly create, protect, socialize and manage APIs\x22},{\x22title\x22:\x22App Connect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Dconnect?lnk=flatitem\x22,\x22description\x22:\x22Codeless connectors for your data, apps and APIs\x22},{\x22title\x22:\x22Aspera\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/aspera?lnk=flatitem\x22,\x22description\x22:\x22System to transfer, sync or stream huge data globally\x22},{\x22title\x22:\x22CICS Transaction Server for z\/OS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cics\u002Dtransaction\u002Dserver?lnk=flatitem\x22,\x22description\x22:\x22Application server for online transaction processing\x22},{\x22title\x22:\x22Cloud Pak for Applications\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Dapplications?lnk=flatitem\x22,\x22description\x22:\x22Kubernetes\u002Dbased platform for hybrid cloud applications\x22},{\x22title\x22:\x22Cloud Pak for Integration\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Dintegration?lnk=flatitem\x22,\x22description\x22:\x22Tools to connect all of your apps, data and events\x22},{\x22title\x22:\x22DataPower\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/datapower\u002Dgateway?lnk=flatitem\x22,\x22description\x22:\x22Physical or virtual multi\u002Dprotocol network gateway\x22},{\x22title\x22:\x22Event Streams\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/event\u002Dstreams?lnk=flatitem\x22,\x22description\x22:\x22PaaS stream processing based on Apache Kafka\x22},{\x22title\x22:\x22IBM Cloud Messages for RabbitMQ\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/messages\u002Dfor\u002Drabbitmq?lnk=flatitem\x22,\x22description\x22:\x22Managed open\u002Dsource message broker\x22},{\x22title\x22:\x22IBM webMethods\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/webmethods?lnk=flatitem\x22,\x22description\x22:\x22iPaaS capabilities including app integration, API management, B2B integration and managed file transfer\x22},{\x22title\x22:\x22Information Management System\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ims?lnk=flatitem\x22,\x22description\x22:\x22Hierarchical database and transaction processor for Z\x22},{\x22title\x22:\x22MQ\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/mq?lnk=flatitem\x22,\x22description\x22:\x22Software and hardware for messaging between distributed systems\x22},{\x22title\x22:\x22z\/OS Connect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/zos\u002Dconnect?lnk=flatitem\x22,\x22description\x22:\x22Software to build and serve RESTful APIs to z\/OS applications\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Network\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/networking?lnk=flathl\x22,\x22description\x22:\x22Run and manage public, private and virtual networks\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloud Pak for Network Automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dpak\u002Dfor\u002Dnetwork\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22Management software for telco network operations\x22},{\x22title\x22:\x22Hybrid Cloud Mesh\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/hybrid\u002Dcloud\u002Dmesh?lnk=flatitem\x22,\x22description\x22:\x22SaaS for deploying and managing hybrid and multicloud networks\x22},{\x22title\x22:\x22NS1 Connect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ns1\u002Dconnect?lnk=flatitem\x22,\x22description\x22:\x22Authoritative DNS and traffic steering as a service\x22},{\x22title\x22:\x22Rapid Network Automation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/rapid\u002Dnetwork\u002Dautomation?lnk=flatitem\x22,\x22description\x22:\x22No\u002Dcode tool to build automation workflows across apps and APIs\x22},{\x22title\x22:\x22SevOne Network Performance Management\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/sevone\u002Dnetwork\u002Dperformance\u002Dmanagement?lnk=flatitem\x22,\x22description\x22:\x22Software to collect and analyze network performance data\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Operating systems\x22,\x22description\x22:\x22Run critical workloads on specialized operating systems\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22AIX\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/aix?lnk=flatitem\x22,\x22description\x22:\x22UNIX operating system for Power servers\x22},{\x22title\x22:\x22IBM i\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ibm\u002Di?lnk=flatitem\x22,\x22description\x22:\x22Integrated operating system for Power servers\x22},{\x22title\x22:\x22Linux\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/linux?lnk=flatitem\x22,\x22description\x22:\x22Run Linux workloads on IBM servers\x22},{\x22title\x22:\x22z\/OS\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/zos?lnk=flatitem\x22,\x22description\x22:\x22Flagship OS for continuous, high\u002Dvolume mainframe operation\x22},{\x22title\x22:\x22z\/TPF\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/z\u002Dtransaction\u002Dprocessing\u002Dfacility?lnk=flatitem\x22,\x22description\x22:\x22Real\u002Dtime operating system for mainframes\x22},{\x22title\x22:\x22z\/VM\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/zvm?lnk=flatitem\x22,\x22description\x22:\x22Hypervisor and virtualization software for IBM Z and LinuxONE\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Quantum\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/quantum?lnk=flathl\x22,\x22description\x22:\x22Run code on real quantum systems using a full\u002Dstack SDK\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Qiskit Runtime\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/quantum\/qiskit?lnk=flatitem\x22,\x22description\x22:\x22Cloud service for executing quantum workloads at scale\x22},{\x22title\x22:\x22Quantum Safe\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/quantum\/quantum\u002Dsafe?lnk=flatitem\x22,\x22description\x22:\x22Technology and consulting services for quantum\u002Dsafe cryptography\x22},{\x22title\x22:\x22Quantum Systems\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/quantum\/technology?lnk=flatitem\x22,\x22description\x22:\x22Quantum computing systems accessible on the cloud\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Security \x26 identity\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/security?lnk=flathl\x22,\x22description\x22:\x22Cloud\u002Dnative software to secure resources and simplify compliance\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Cloud AppID\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/app\u002Did?lnk=flatitem\x22,\x22description\x22:\x22Authentication and user profiles as a service for mobile and web apps\x22},{\x22title\x22:\x22Cloud Security and Compliance Center\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/security\u002Dand\u002Dcompliance\u002Dcenter?lnk=flatitem\x22,\x22description\x22:\x22SaaS to define and audit the compliance posture of your cloud\x22},{\x22title\x22:\x22Data Security Broker\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/data\u002Dsecurity\u002Dbroker?lnk=flatitem\x22,\x22description\x22:\x22Administrative console to enable data encryption in the cloud\x22},{\x22title\x22:\x22Guardium\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/guardium?lnk=flatitem\x22,\x22description\x22:\x22Suite for data encryption, management and simplified compliance\x22},{\x22title\x22:\x22Key Protect for IBM Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/key\u002Dprotect?lnk=flatitem\x22,\x22description\x22:\x22Tool to provision and store keys for apps across IBM Cloud services\x22},{\x22title\x22:\x22MaaS360\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/maas360?lnk=flatitem\x22,\x22description\x22:\x22Unified endpoint management for mobile workforces\x22},{\x22title\x22:\x22QRadar EDR\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/qradar\u002Dedr?lnk=flatitem\x22,\x22description\x22:\x22Advanced AI threat detection and response for endpoints\x22},{\x22title\x22:\x22QRadar SIEM\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/qradar\u002Dsiem?lnk=flatitem\x22,\x22description\x22:\x22Threat detection and prioritization for real\u002Dtime visibility\x22},{\x22title\x22:\x22QRadar SOAR\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/qradar\u002Dsoar?lnk=flatitem\x22,\x22description\x22:\x22Automation and workflow management for security operations\x22},{\x22title\x22:\x22Trusteer\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/trusteer?lnk=flatitem\x22,\x22description\x22:\x22Software to authenticate customers, detect fraud and assess risk\x22},{\x22title\x22:\x22Verify\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/verify?lnk=flatitem\x22,\x22description\x22:\x22Identity, authentication, and access control software\x22},{\x22title\x22:\x22zSecure\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/zsecure?lnk=flatitem\x22,\x22description\x22:\x22Security, risk management and compliance tools for Z hardware\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Servers\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/servers?lnk=flathl\x22,\x22description\x22:\x22Run workloads on hybrid cloud infrastructure\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22IBM Cloud Bare Metal Servers\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/bare\u002Dmetal\u002Dservers?lnk=flatitem\x22,\x22description\x22:\x22Dedicated hardware for maximum performance\x22},{\x22title\x22:\x22IBM Cloud Virtual Servers for VPC\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/virtual\u002Dservers?lnk=flatitem\x22,\x22description\x22:\x22Virtual servers with Intel Xeon or IBM Z CPUs\x22},{\x22title\x22:\x22LinuxONE 4\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/linuxone\u002D4?lnk=flatitem\x22,\x22description\x22:\x22Physical and virtual servers for running Linux\x22},{\x22title\x22:\x22Power\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/power?lnk=flatitem\x22,\x22description\x22:\x22Physical and virtual servers with IBM Power CPUs\x22},{\x22title\x22:\x22z16\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/z16?lnk=flatitem\x22,\x22description\x22:\x22Flagship mainframe with on\u002Dchip AI and quantum\u002Dsafe cryptography\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/storage?lnk=flathl\x22,\x22description\x22:\x22Software, hardware and services for critical and operational workloads and data\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Ceph\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dceph?lnk=flatitem\x22,\x22description\x22:\x22Multi\u002Dprotocol software\u002Ddefined enterprise storage platform\x22},{\x22title\x22:\x22Cloud Block Storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/block\u002Dstorage?lnk=flatitem\x22,\x22description\x22:\x22Managed service optimized for low latency and high transfer rates\x22},{\x22title\x22:\x22Cloud File Storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/file\u002Dstorage?lnk=flatitem\x22,\x22description\x22:\x22Managed service for flash\u002Dbacked, durable, NFS\u002Dbased file storage\x22},{\x22title\x22:\x22Cloud Object Storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/cloud\u002Dobject\u002Dstorage?lnk=flatitem\x22,\x22description\x22:\x22Unstructured data storage accessible via cloud APIs\x22},{\x22title\x22:\x22DS8000\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/ds8000?lnk=flatitem\x22,\x22description\x22:\x22High\u002Dcapacity, high\u002Davailability mainframe storage system\x22},{\x22title\x22:\x22Defender\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Ddefender?lnk=flatitem\x22,\x22description\x22:\x22Data resiliency software for threat detection and data recovery\x22},{\x22title\x22:\x22FlashSystem\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/flashsystem?lnk=flatitem\x22,\x22description\x22:\x22All\u002Dflash array with performance and capacity for any workload\x22},{\x22title\x22:\x22Fusion\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dfusion?lnk=flatitem\x22,\x22description\x22:\x22Container\u002Dnative storage and data orchestration for OpenShift\x22},{\x22title\x22:\x22Insights\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dinsights?lnk=flatitem\x22,\x22description\x22:\x22Storage AIOps for metrics\u002Dpowered analysis and decisions\x22},{\x22title\x22:\x22Protect\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dprotect?lnk=flatitem\x22,\x22description\x22:\x22Data resiliency, backup and recovery delivered via SaaS\x22},{\x22title\x22:\x22Protect for Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dprotect\u002Dfor\u002Dcloud?lnk=flatitem\x22,\x22description\x22:\x22Backup and recovery SaaS for data in public cloud services\x22},{\x22title\x22:\x22SAN Switches\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/storage\u002Darea\u002Dnetwork?lnk=flatitem\x22,\x22description\x22:\x22Scalable and highly available storage area network solutions\x22},{\x22title\x22:\x22Scale\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dscale?lnk=flatitem\x22,\x22description\x22:\x22Software defined storage for AI and high performance workloads\x22},{\x22title\x22:\x22Scale System\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/storage\u002Dscale\u002Dsystem?lnk=flatitem\x22,\x22description\x22:\x22All\u002Dflash or hybrid performant storage for cloud scale use\u002Dcases\x22},{\x22title\x22:\x22Tape Systems\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/tape\u002Dstorage?lnk=flatitem\x22,\x22description\x22:\x22Software and hardware for encrypted and air\u002Dgapped archives\x22}]}]},{\x22heading\x22:{\x22title\x22:\x22Supply chain\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/supply\u002Dchain?lnk=flathl\x22,\x22description\x22:\x22Manage the flow of goods and services\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22 IBM Envizi: Supply Chain Intelligence\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/envizi\/supply\u002Dchain\x22,\x22description\x22:\x22Capture and aggregate supplier and product\u002Dlevel transaction data for Scope 3 emissions and reporting\x22},{\x22title\x22:\x22Sterling Order and Fulfillment Suite\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/order\u002Dfulfillment\u002Dsuite?lnk=flatitem\x22,\x22description\x22:\x22Complete order management system with AI and machine learning\x22}]}]}],\x22viewAll\x22:{\x22title\x22:\x22View all products\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\x22}}},{\x22title\x22:\x22Consulting\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/consulting?lnk=L0G\x22},{\x22title\x22:\x22Support\x22,\x22url\x22:\x22\x22,\x22submenu\x22:{\x22sections\x22:[{\x22heading\x22:{\x22title\x22:\x22\x22,\x22description\x22:\x22\x22},\x22groups\x22:[{\x22heading\x22:{\x22title\x22:\x22What\x27s New\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/new?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Community\x22,\x22url\x22:\x22https:\/\/community.ibm.com\/community\/user\/community?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Developer\x22,\x22url\x22:\x22https:\/\/developer.ibm.com\/?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Call for Code\x22,\x22url\x22:\x22https:\/\/developer.ibm.com\/callforcode\/?lnk=flatitem\x22},{\x22title\x22:\x22Generative AI\x22,\x22url\x22:\x22https:\/\/developer.ibm.com\/generative\u002Dai\u002Dfor\u002Ddevelopers\/?lnk=flatitem\x22},{\x22title\x22:\x22Open Source @ IBM\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/opensource\/?lnk=flatitem\x22},{\x22title\x22:\x22Products\x22,\x22url\x22:\x22https:\/\/developer.ibm.com\/components\/?lnk=flatitem\x22},{\x22title\x22:\x22Technologies\x22,\x22url\x22:\x22https:\/\/developer.ibm.com\/technologies\/?lnk=flatitem\x22}]},{\x22heading\x22:{\x22title\x22:\x22Documentation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/docs\/en?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22All product documentation\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/docs\/en?lnk=flatitem\x22},{\x22title\x22:\x22IBM Cloud documentation\x22,\x22url\x22:\x22https:\/\/cloud.ibm.com\/docs?lnk=flatitem\x22},{\x22title\x22:\x22IBM Redbooks\x22,\x22url\x22:\x22https:\/\/www.redbooks.ibm.com\/?lnk=flatitem\x22}]},{\x22heading\x22:{\x22title\x22:\x22IBM Cloud platform support\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/cloud\/support?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[]},{\x22heading\x22:{\x22title\x22:\x22Implementation\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Expert Labs\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/products\/expertlabs?lnk=flatitem\x22}]},{\x22heading\x22:{\x22title\x22:\x22Support\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/mysupport\/s\/?language=en_US\x26lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Download fixes, updates \x26 drivers\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/support\/fixcentral?lnk=flatitem\x22},{\x22title\x22:\x22Download licensed software \u002D Passport Advantage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/software\/passportadvantage\/pao_customer.html?lnk=flatitem\x22},{\x22title\x22:\x22IBM Software Licensing\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/about\/software\u002Dlicensing\/?lnk=flatitem\x22},{\x22title\x22:\x22Open a case\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/mysupport\/s\/redirecttoopencasepage?lnk=flatitem\x22},{\x22title\x22:\x22View more\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/mysupport\/s\/?language=en_US\x26lnk=flatitem\x22},{\x22title\x22:\x22View support plans\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/support\/pages\/ibm\u002Dsupport\u002Dofferings?lnk=flatitem\x22},{\x22title\x22:\x22View your cases\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/mysupport\/s\/my\u002Dcases?lnk=flatitem\x22}]},{\x22heading\x22:{\x22title\x22:\x22Technology Lifecycle Services\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/services\/technology\u002Dlifecycle\u002Dservices?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Enterprise networking and security\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/services\/networking\u002Dsupport?lnk=flatitem\x22},{\x22title\x22:\x22Servers and storage\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/services\/systems\u002Dsupport?lnk=flatitem\x22},{\x22title\x22:\x22Software\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/services\/software\u002Dsupport?lnk=flatitem\x22}]},{\x22heading\x22:{\x22title\x22:\x22Training\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/training\/?lnk=flathl\x22,\x22description\x22:\x22\x22},\x22links\x22:[{\x22title\x22:\x22Courses\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/training\/search?q=course\x26lnk=flatitem\x22},{\x22title\x22:\x22Digital learning subscriptions\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/training\/subscriptions?lnk=flatitem\x22},{\x22title\x22:\x22Learning paths \x26 collections\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/training\/learning\u002Dpaths\u002Dand\u002Dcollections?lnk=flatitem\x22},{\x22title\x22:\x22Professional certifications\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/training\/credentials?lnk=flatitem\x22}]}]}],\x22viewAll\x22:{\x22title\x22:\x22\x22,\x22url\x22:\x22\x22}}},{\x22title\x22:\x22Think\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think?lnk=L0G\x22}]}}"; const searchPlaceholderText = "Search all of IBM"; const links = JSON.parse(l0Json).mastheadNav.links; const unAuthenticated = JSON.parse(l0Json).profileMenu.signedout; const authenticated = JSON.parse(l0Json).profileMenu.signedin; const mastheadContainerEl = document.querySelector('c4d-masthead-container'); mastheadContainerEl.navLinks = links; mastheadContainerEl.unauthenticatedProfileItems = unAuthenticated; mastheadContainerEl.authenticatedProfileItems = authenticated; const appendSearchPlaceholderText = () => { const typeheadEl = mastheadContainerEl.querySelector('c4d-search-with-typeahead'); if (typeheadEl) { typeheadEl.searchPlaceholder = searchPlaceholderText; observer.disconnect(); } } let observer = new MutationObserver(appendSearchPlaceholderText); observer.observe(mastheadContainerEl, {subtree: true, childList: true}); </script> <script> var json = "{\x22title\x22:\x22Think\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\x22,\x22menuItems\x22:[{\x22title\x22:\x22Artificial intelligence\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/artificial\u002Dintelligence\x22},{\x22title\x22:\x22Cloud\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/cloud\x22},{\x22title\x22:\x22Security\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/security\x22},{\x22title\x22:\x22Videos\x22,\x22submenu\x22:{\x22columns\x22:1,\x22menuSections\x22:[{\x22span\x22:1,\x22items\x22:[{\x22title\x22:\x22Overview\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/videos\x22},{\x22title\x22:\x22AI Academy\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/videos\/ai\u002Dacademy\x22},{\x22title\x22:\x22Rethink use cases\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/videos\/rethink\x22},{\x22title\x22:\x22Think 2024 on demand\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/videos\/think\u002Dkeynotes\x22}]}]}},{\x22title\x22:\x22Reports\x22,\x22submenu\x22:{\x22columns\x22:1,\x22menuSections\x22:[{\x22span\x22:1,\x22items\x22:[{\x22title\x22:\x22AI in Action 2024\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/reports\/ai\u002Din\u002Daction\x22},{\x22title\x22:\x22State of Sustainability Readiness Report 2024\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/reports\/sustainability\u002Dreadiness\x22},{\x22title\x22:\x22Cost of a Data Breach 2024\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/reports\/data\u002Dbreach\x22},{\x22title\x22:\x22IBM X\u002DForce Threat Intelligence Index 2024\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/reports\/threat\u002Dintelligence\x22},{\x22title\x22:\x22CEO’s Guide to Generative AI\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/thought\u002Dleadership\/institute\u002Dbusiness\u002Dvalue\/en\u002Dus\/report\/ceo\u002Dgenerative\u002Dai\x22},{\x22title\x22:\x22Hybrid by Design: The great tech reset\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/thought\u002Dleadership\/institute\u002Dbusiness\u002Dvalue\/en\u002Dus\/report\/hybrid\u002Dby\u002Ddesign\x22},{\x22title\x22:\x222024 CEO Study\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/thought\u002Dleadership\/institute\u002Dbusiness\u002Dvalue\/en\u002Dus\/c\u002Dsuite\u002Dstudy\/ceo\x22},{\x22title\x22:\x22View all IBV reports\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/thought\u002Dleadership\/institute\u002Dbusiness\u002Dvalue\x22}]}]}},{\x22title\x22:\x22Podcasts\x22,\x22submenu\x22:{\x22columns\x22:1,\x22menuSections\x22:[{\x22span\x22:1,\x22items\x22:[{\x22title\x22:\x22Overview\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/podcasts\x22},{\x22title\x22:\x22Mixture of Experts\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/podcasts\/mixture\u002Dof\u002Dexperts\x22},{\x22title\x22:\x22Transformers Podcast\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/podcasts\/transformers\u002Dpodcast\x22},{\x22title\x22:\x22AI in Action\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/podcasts\/ai\u002Din\u002Daction\x22},{\x22title\x22:\x22Smart Talks with IBM\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/podcasts\/smart\u002Dtalks\x22}]}]}},{\x22title\x22:\x22Events\x22,\x22submenu\x22:{\x22columns\x22:1,\x22menuSections\x22:[{\x22span\x22:1,\x22items\x22:[{\x22title\x22:\x22Think 2025\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/events\/think\x22},{\x22title\x22:\x22Think on Tour\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/events\/think\/on\u002Dtour\x22},{\x22title\x22:\x22TechXchange\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/community\/ibm\u002Dtechxchange\u002Dconference\/\x22}]}]}},{\x22title\x22:\x22More\x22,\x22submenu\x22:{\x22columns\x22:2,\x22footer\x22:{\x22title\x22:\x22View all\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/search\x22},\x22menuSections\x22:[{\x22span\x22:1,\x22heading\x22:{\x22headingLevel\x22:2,\x22title\x22:\x22Topics\x22},\x22items\x22:[{\x22title\x22:\x22Analytics\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/analytics\x22},{\x22title\x22:\x22Asset management\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/asset\u002Dmanagement\x22},{\x22title\x22:\x22Business automation\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/business\u002Dautomation\x22},{\x22title\x22:\x22Business operations\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/business\u002Doperations\x22},{\x22title\x22:\x22Compute and servers\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/compute\x22},{\x22title\x22:\x22DevOps\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/devops\x22},{\x22title\x22:\x22IT automation\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/it\u002Dautomation\x22},{\x22title\x22:\x22IT infrastructure\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/it\u002Dinfrastructure\x22},{\x22title\x22:\x22Middleware\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/middleware\x22},{\x22title\x22:\x22Network\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/network\x22},{\x22title\x22:\x22Quantum\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/quantum\x22},{\x22title\x22:\x22Storage\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/storage\x22},{\x22title\x22:\x22Sustainability\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/sustainability\x22}]},{\x22span\x22:1,\x22heading\x22:{\x22headingLevel\x22:2,\x22title\x22:\x22Content types\x22},\x22items\x22:[{\x22title\x22:\x22Explainers\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/topics\x22},{\x22title\x22:\x22Insights\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/insights\x22},{\x22title\x22:\x22News\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/news\x22},{\x22title\x22:\x22Newsletters\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/subscribe\x22},{\x22title\x22:\x22Reference architectures\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/architectures\x22}]},{\x22span\x22:1,\x22heading\x22:{\x22headingLevel\x22:2,\x22title\x22:\x22Industries\x22},\x22items\x22:[{\x22title\x22:\x22Automotive\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/automotive\x22},{\x22title\x22:\x22Banking\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/banking\u002Dfinancial\u002Dmarkets\x22},{\x22title\x22:\x22Consumer Goods\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/consumer\u002Dgoods\x22},{\x22title\x22:\x22Energy \x26 Utilities\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/energy\x22},{\x22title\x22:\x22Government\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/government\x22},{\x22title\x22:\x22Healthcare\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/healthcare\x22},{\x22title\x22:\x22Manufacturing\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/manufacturing\x22},{\x22title\x22:\x22Retail\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/retail\x22},{\x22title\x22:\x22Telecommunications\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/telecommunications\x22},{\x22title\x22:\x22Travel\x22,\x22target\x22:\x22_self\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/think\/travel\u002Dtransportation\x22}]}]}}],\x22actions\x22:{\x22login\x22:null,\x22cta\x22:{\x22title\x22:\x22Subscribe\x22,\x22url\x22:\x22https:\/\/www.ibm.com\/account\/reg\/signup?formid=news\u002Durx\u002D52954\x22}},\x22linkOrContactModule\x22:false,\x22optinalCta\x22:true}"; document.querySelector('c4d-masthead-container').l1Data = JSON.parse(json); document.querySelector('.masthead').classList.add("hasNavigation"); document.documentElement.style.setProperty('--anker-navigation-spacing', '-6rem'); document.addEventListener('DOMContentLoaded', () => { document.querySelector('c4d-masthead-l1').overviewText = 'Overview'; }); </script> <script type="text/javascript"> if(window.location.href.includes("/careers")){ document.querySelector('c4d-masthead-container').setAttribute("has-search","false"); document.querySelector('c4d-masthead-container').setAttribute("has-profile","false"); } </script> </div> <div class="leadspace-container container responsivegrid"> <div id="leadspace-container-2f177ffef7" class="cmp-container"> <div class="leadspace-article"> <div class="cds--leadspace-article"> <section class="cds--leadspace-article__section"> <div class="cds--leadspace-article__container--left"> <div class="cds--leadspace-article__row"> <div class="cds--leadspace-article__title"> <h1 class="article-heading-title expressive-heading-05"> What is extended detection and response (XDR)? </h1> </div> </div> <div class="cds--leadspace-article__row"> <div class="image--responsive"> <c4d-image id="image--1755287479" alt="Young businessman using a laptop and headphones during a late night at work" slot="media" default-src="/content/dam/connectedassets-adobe-cms/worldwide-content/stock-assets/getty/image/photography/42/1e/pi-2107773.component.crop-2by1-xl.ts=1736777043018.jpg/content/adobe-cms/us/en/think/topics/xdr/jcr:content/root/leadspace_container/leadspace_article" class="" caption-alignment="left"> <c4d-image-item media="(min-width: 1312px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/stock-assets/getty/image/photography/42/1e/pi-2107773.component.crop-2by1-xl-retina.ts=1736777043018.jpg/content/adobe-cms/us/en/think/topics/xdr/jcr:content/root/leadspace_container/leadspace_article"></c4d-image-item> <c4d-image-item media="(min-width: 1312px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/stock-assets/getty/image/photography/42/1e/pi-2107773.component.crop-2by1-xl.ts=1736777043018.jpg/content/adobe-cms/us/en/think/topics/xdr/jcr:content/root/leadspace_container/leadspace_article"></c4d-image-item> <c4d-image-item media="(min-width: 1056px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/stock-assets/getty/image/photography/42/1e/pi-2107773.component.crop-2by1-l-retina.ts=1736777043018.jpg/content/adobe-cms/us/en/think/topics/xdr/jcr:content/root/leadspace_container/leadspace_article"></c4d-image-item> <c4d-image-item media="(min-width: 1056px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/stock-assets/getty/image/photography/42/1e/pi-2107773.component.crop-2by1-l.ts=1736777043018.jpg/content/adobe-cms/us/en/think/topics/xdr/jcr:content/root/leadspace_container/leadspace_article"></c4d-image-item> <c4d-image-item media="(min-width: 672px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/stock-assets/getty/image/photography/42/1e/pi-2107773.component.crop-2by1-m-retina.ts=1736777043018.jpg/content/adobe-cms/us/en/think/topics/xdr/jcr:content/root/leadspace_container/leadspace_article"></c4d-image-item> <c4d-image-item media="(min-width: 672px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/stock-assets/getty/image/photography/42/1e/pi-2107773.component.crop-2by1-m.ts=1736777043018.jpg/content/adobe-cms/us/en/think/topics/xdr/jcr:content/root/leadspace_container/leadspace_article"></c4d-image-item> <c4d-image-item media="(min-width: 481px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/stock-assets/getty/image/photography/42/1e/pi-2107773.component.crop-2by1-s-retina.ts=1736777043018.jpg/content/adobe-cms/us/en/think/topics/xdr/jcr:content/root/leadspace_container/leadspace_article"></c4d-image-item> <c4d-image-item media="(min-width: 481px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/stock-assets/getty/image/photography/42/1e/pi-2107773.component.crop-2by1-s.ts=1736777043018.jpg/content/adobe-cms/us/en/think/topics/xdr/jcr:content/root/leadspace_container/leadspace_article"></c4d-image-item> <c4d-image-item media="(max-width: 480px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/stock-assets/getty/image/photography/42/1e/pi-2107773.component.crop-2by1-xs-retina.ts=1736777043018.jpg/content/adobe-cms/us/en/think/topics/xdr/jcr:content/root/leadspace_container/leadspace_article"></c4d-image-item> <c4d-image-item media="(max-width: 480px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/stock-assets/getty/image/photography/42/1e/pi-2107773.component.crop-2by1-xs.ts=1736777043018.jpg/content/adobe-cms/us/en/think/topics/xdr/jcr:content/root/leadspace_container/leadspace_article"></c4d-image-item> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-image.lc-048b87a201e74013bc54445146fdadd0-lc.min.js"></script> </c4d-image> </div> </div> </div> <div class="cds--leadspace-article__container--right"> <div class="cds--leadspace-article__row cds--leadspace-article__row--border"> <div class="cds--leadspace-article__tags"> <div class="tag-group"> <a href="https://www.ibm.com/think/security"> <cds-tag> Security </cds-tag> </a> </div> </div> </div> <div class="cds--leadspace-article__row cds--leadspace-article__row--border"> <h4 class="article-heading productive-heading-02"> 3 March 2023 </h4> </div> <div class="cds--leadspace-article__row--border cds--leadspace-article__row--share"> <div class="cds-btn--share-module"> <div class="cds-btn--share-module__container"> <div class="cds-btn--share-module__copy-button"> <cds-button href="https://www.ibm.com/think/topics/xdr" kind="secondary"> <svg xmlns="http://www.w3.org/2000/svg" slot="icon" width="16" height="16" fill="currentColor" viewBox="0 0 32 32" aria-hidden="true"> <path d="M29.25,6.76a6,6,0,0,0-8.5,0l1.42,1.42a4,4,0,1,1,5.67,5.67l-8,8a4,4,0,1,1-5.67-5.66l1.41-1.42-1.41-1.42-1.42,1.42a6,6,0,0,0,0,8.5A6,6,0,0,0,17,25a6,6,0,0,0,4.27-1.76l8-8A6,6,0,0,0,29.25,6.76Z"/> <path d="M4.19,24.82a4,4,0,0,1,0-5.67l8-8a4,4,0,0,1,5.67,0A3.94,3.94,0,0,1,19,14a4,4,0,0,1-1.17,2.85L15.71,19l1.42,1.42,2.12-2.12a6,6,0,0,0-8.51-8.51l-8,8a6,6,0,0,0,0,8.51A6,6,0,0,0,7,28a6.07,6.07,0,0,0,4.28-1.76L9.86,24.82A4,4,0,0,1,4.19,24.82Z"/> </svg> </cds-button> <div class="cds-btn--share-module__tooltip hide"> Link copied </div> </div> <cds-button target="_blank" href="mailto:?subject=Extended%20detection%20and%20response&body=https://www.ibm.com/think/topics/xdr" kind="secondary"> <svg xmlns="http://www.w3.org/2000/svg" slot="icon" width="16" height="16" fill="currentColor" viewBox="0 0 32 32" aria-hidden="true"> <path d="M28,6H4A2,2,0,0,0,2,8V24a2,2,0,0,0,2,2H28a2,2,0,0,0,2-2V8A2,2,0,0,0,28,6ZM25.8,8,16,14.78,6.2,8ZM4,24V8.91l11.43,7.91a1,1,0,0,0,1.14,0L28,8.91V24Z"/> </svg> </cds-button> <cds-button target="_blank" href="https://www.linkedin.com/shareArticle?url=https://www.ibm.com/think/topics/xdr&title=Extended%20detection%20and%20response" kind="secondary"> <svg xmlns="http://www.w3.org/2000/svg" slot="icon" width="16" height="16" fill="currentColor" viewBox="0 0 32 32" aria-hidden="true"> <path d="M26.2,4H5.8C4.8,4,4,4.8,4,5.7v20.5c0,0.9,0.8,1.7,1.8,1.7h20.4c1,0,1.8-0.8,1.8-1.7V5.7C28,4.8,27.2,4,26.2,4z M11.1,24.4 H7.6V13h3.5V24.4z M9.4,11.4c-1.1,0-2.1-0.9-2.1-2.1c0-1.2,0.9-2.1,2.1-2.1c1.1,0,2.1,0.9,2.1,2.1S10.5,11.4,9.4,11.4z M24.5,24.3 H21v-5.6c0-1.3,0-3.1-1.9-3.1c-1.9,0-2.1,1.5-2.1,2.9v5.7h-3.5V13h3.3v1.5h0.1c0.5-0.9,1.7-1.9,3.4-1.9c3.6,0,4.3,2.4,4.3,5.5V24.3z"/> </svg> </cds-button> <cds-button target="_blank" href="https://www.facebook.com/share.php?u=https://www.ibm.com/think/topics/xdr" kind="secondary"> <svg xmlns="http://www.w3.org/2000/svg" slot="icon" width="16" height="16" fill="currentColor" viewBox="0 0 32 32" aria-hidden="true"> <path d="M26.67,4H5.33A1.34,1.34,0,0,0,4,5.33V26.67A1.34,1.34,0,0,0,5.33,28H16.82V18.72H13.7V15.09h3.12V12.42c0-3.1,1.89-4.79,4.67-4.79.93,0,1.86,0,2.79.14V11H22.37c-1.51,0-1.8.72-1.8,1.77v2.31h3.6l-.47,3.63H20.57V28h6.1A1.34,1.34,0,0,0,28,26.67V5.33A1.34,1.34,0,0,0,26.67,4Z" transform="translate(0 0)"/> </svg> </cds-button> <cds-button target="_blank" href="http://twitter.com/intent/tweet?text=Extended%20detection%20and%20response&url=https://www.ibm.com/think/topics/xdr" kind="secondary"> <svg xmlns="http://www.w3.org/2000/svg" slot="icon" width="16" height="16" fill="currentColor" viewBox="0 0 32 32" aria-hidden="true"> <path d="m18.2342,14.1624l8.7424-10.1624h-2.0717l-7.591,8.8238-6.0629-8.8238h-6.9929l9.1684,13.3432-9.1684,10.6568h2.0718l8.0163-9.3183,6.4029,9.3183h6.9929l-9.5083-13.8376h.0005Zm-2.8376,3.2984l-.9289-1.3287L7.0763,5.5596h3.1822l5.9649,8.5323.9289,1.3287,7.7536,11.0907h-3.1822l-6.3272-9.05v-.0005Z"/> </svg> </cds-button> </div> </div> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-cweb-button.lc-7b18ea41f204cdf4af92bdf038d07d4e-lc.min.js"></script> </div> </div> </section> </div> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-leadspace.lc-2d50e2fcd68a57f32e42baf02c067083-lc.min.js"></script> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-cweb-tag.lc-110787fad411e9bb4388c3f3211925b3-lc.min.js"></script> </div> </div> </div> <div class="table-of-contents container responsivegrid"> <c4d-table-of-contents data-cmp-is="table-of-contents" data-autoid="c4d--tableofcontents" class="cmp-table-of-contents" stickyoffset="96"> <div id="table-of-contents-bddcff21bf" class="cmp-table-of-contents table-of-contents-article cds-row"> <div class="body-article-8 container responsivegrid cds--col"> <div id="body-article-8-0488320e24" class="cmp-container"> <div class="standalone-title enhanced-title text"> <h2 class="expressive-heading-05 "> What is XDR? </h2> <a data-title="What is XDR?" name="What+is+XDR%3F"></a> </div> <div class="rich-text text"><div class="cms-richtext lead-in" id="rich-text-4614e0f25b" data-dynamic-inner-content="description"> <p>Extended detection and response, or XDR, is an open <a href="https://www.ibm.com/topics/cybersecurity" target="_self" rel="noopener noreferrer">cybersecurity</a> architecture that integrates security tools and unifies security operations across all security layers—users, endpoints, email, applications, networks, cloud workloads and data.</p> </div></div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-fde245df34" data-dynamic-inner-content="description"> <p>With XDR, security solutions that aren’t necessarily designed to work together can interoperate seamlessly on threat prevention, detection, investigation and response.</p> <p>XDR eliminates visibility gaps between security tools and layers, enabling overburdened security teams to detect and resolve threats faster and more efficiently, and to capture more complete, contextual data for making better security decisions and preventing future cyber attacks.</p> <p>XDR was first defined in 2018, but the way security professionals and industry analysts talk about XDR has been evolving rapidly ever since. For example, many security experts first describe XDR as <a href="https://www.ibm.com/topics/edr" target="_self" rel="noopener noreferrer">endpoint detection and response (EDR)</a> on steroids, extended to span all enterprise security layers. But today experts see XDR’s potential as much more than the sum of the tools and functionalities it integrates, emphasizing benefits such as end-to-end threat visibility, a unified interface, and optimized workflows for threat detection, investigation and response.</p> <p>Also, analysts and vendors have categorized XDR solutions as either <em>native XDR</em>, which integrates security tools from the solution vendor only, or <em>open XDR</em>, which integrates all of the security tools in an organization’s security ecosystem regardless of vendor. But it has become increasingly clear that enterprise security teams and <a href="https://www.ibm.com/topics/security-operations-center" target="_self" rel="noopener noreferrer">security operations centers (SOCs)</a> expect even native XDR solutions to be open, providing the flexibility to integrate third-party security tools they use now or may prefer to use in the future.</p> </div></div> <div class="experiencefragment"> <div id="experiencefragment-0a035c536b" class="cmp-experiencefragment cmp-experiencefragment--blueprint---think-ad---xf---do-not-modify"> <div class="xf-content-height"> <div class="root container responsivegrid"> <div id="container-6e3cad7f99" class="cmp-container"> <div class="think-ad"><div class="cds--think-ad theme-white think-ad-theme--blue-cyan-gradient"> <div class="cds--think-ad__container" data-attribute1="think-ad"> <div class="cds--think-ad__media"> <div class="cds--image "> <picture> <source media="(min-width: 1312px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/pm/ul/g/cb/1c/23_11_p-028_1200x1200.component.think-ad-xl-retina.ts=1734532003827.jpeg/content/experience-fragments/adobe-cms/us/en/site-v2/think-hub/article/_8_column_general_ad/blueprint---think-ad---xf---do-not-modify/cybersecurity-thinkad-article-newsletter/jcr:content/root/think_ad_copy/image"/> <source media="(min-width: 1312px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/pm/ul/g/cb/1c/23_11_p-028_1200x1200.component.think-ad-xl.ts=1734532003827.jpeg/content/experience-fragments/adobe-cms/us/en/site-v2/think-hub/article/_8_column_general_ad/blueprint---think-ad---xf---do-not-modify/cybersecurity-thinkad-article-newsletter/jcr:content/root/think_ad_copy/image"/> <source media="(min-width: 1056px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/pm/ul/g/cb/1c/23_11_p-028_1200x1200.component.think-ad-l-retina.ts=1734532003827.jpeg/content/experience-fragments/adobe-cms/us/en/site-v2/think-hub/article/_8_column_general_ad/blueprint---think-ad---xf---do-not-modify/cybersecurity-thinkad-article-newsletter/jcr:content/root/think_ad_copy/image"/> <source media="(min-width: 1056px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/pm/ul/g/cb/1c/23_11_p-028_1200x1200.component.think-ad-l.ts=1734532003827.jpeg/content/experience-fragments/adobe-cms/us/en/site-v2/think-hub/article/_8_column_general_ad/blueprint---think-ad---xf---do-not-modify/cybersecurity-thinkad-article-newsletter/jcr:content/root/think_ad_copy/image"/> <source media="(min-width: 672px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/pm/ul/g/cb/1c/23_11_p-028_1200x1200.component.think-ad-m-retina.ts=1734532003827.jpeg/content/experience-fragments/adobe-cms/us/en/site-v2/think-hub/article/_8_column_general_ad/blueprint---think-ad---xf---do-not-modify/cybersecurity-thinkad-article-newsletter/jcr:content/root/think_ad_copy/image"/> <source media="(min-width: 672px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/pm/ul/g/cb/1c/23_11_p-028_1200x1200.component.think-ad-m.ts=1734532003827.jpeg/content/experience-fragments/adobe-cms/us/en/site-v2/think-hub/article/_8_column_general_ad/blueprint---think-ad---xf---do-not-modify/cybersecurity-thinkad-article-newsletter/jcr:content/root/think_ad_copy/image"/> <source media="(min-width: 481px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/pm/ul/g/cb/1c/23_11_p-028_1200x1200.component.think-ad-s-retina.ts=1734532003827.jpeg/content/experience-fragments/adobe-cms/us/en/site-v2/think-hub/article/_8_column_general_ad/blueprint---think-ad---xf---do-not-modify/cybersecurity-thinkad-article-newsletter/jcr:content/root/think_ad_copy/image"/> <source media="(min-width: 481px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/pm/ul/g/cb/1c/23_11_p-028_1200x1200.component.think-ad-s.ts=1734532003827.jpeg/content/experience-fragments/adobe-cms/us/en/site-v2/think-hub/article/_8_column_general_ad/blueprint---think-ad---xf---do-not-modify/cybersecurity-thinkad-article-newsletter/jcr:content/root/think_ad_copy/image"/> <source media="(max-width: 480px) and (min-resolution: 192dpi)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/pm/ul/g/cb/1c/23_11_p-028_1200x1200.component.think-ad-xs-retina.ts=1734532003827.jpeg/content/experience-fragments/adobe-cms/us/en/site-v2/think-hub/article/_8_column_general_ad/blueprint---think-ad---xf---do-not-modify/cybersecurity-thinkad-article-newsletter/jcr:content/root/think_ad_copy/image"/> <source media="(max-width: 480px)" srcset="/content/dam/connectedassets-adobe-cms/worldwide-content/pm/ul/g/cb/1c/23_11_p-028_1200x1200.component.think-ad-xs.ts=1734532003827.jpeg/content/experience-fragments/adobe-cms/us/en/site-v2/think-hub/article/_8_column_general_ad/blueprint---think-ad---xf---do-not-modify/cybersecurity-thinkad-article-newsletter/jcr:content/root/think_ad_copy/image"/> <img id="image--176036134" class="aem--image__img" src="/content/dam/connectedassets-adobe-cms/worldwide-content/pm/ul/g/cb/1c/23_11_p-028_1200x1200.component.think-ad-xl.ts=1734532003827.jpeg/content/experience-fragments/adobe-cms/us/en/site-v2/think-hub/article/_8_column_general_ad/blueprint---think-ad---xf---do-not-modify/cybersecurity-thinkad-article-newsletter/_jcr_content/root/think_ad_copy/image" alt="Man looking at computer" loading="lazy"/> </picture> </div> </div> <div class="cds--think-ad__content"> <h3 class="cds--think-ad__heading expressive-heading-03"> Strengthen your security intelligence </h3> <p class="cds--think-ad__copy body-short-01"> Stay ahead of threats with news and insights on security, AI and more, weekly in the Think Newsletter. </p> <div class="cds--think-ad__buttons"> <div class="cds--buttongroup"> <a href="https://www.ibm.com/account/reg/signup?formid=news-urx-52954" target="_blank" kind="primary" class="cds--btn cds--btn--primary" data-link-type="local" cta-type="local"> <span data-link-text>Subscribe today</span> <!-- LTR - Left to Right version --> <svg xmlns="http://www.w3.org/2000/svg" class="cds--card__cta c4d-ce--cta__icon" width="20" height="20" focusable="false" fill="currentColor" viewBox="0 0 20 20" aria-hidden="true"> <path d="M11.8 2.8L10.8 3.8 16.2 9.3 1 9.3 1 10.7 16.2 10.7 10.8 16.2 11.8 17.2 19 10z"></path> </svg> <!-- RTL - Right to Left version --> </a> </div> </div> </div> </div> </div> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-caem-star-rating.lc-5b3b3916bf2ff9827060f96b08c2bba1-lc.min.js"></script> </div> </div> </div> </div> </div> </div> <div class="standalone-title enhanced-title text"> <h2 class="expressive-heading-05 "> Benefits of XDR </h2> <a data-title="Benefits of XDR" name="Benefits+of+XDR"></a> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-970fa2f65e" data-dynamic-inner-content="description"> <p>Today organizations are bombarded by advanced threats (also called advanced persistent threats). These threats sneak past endpoint prevention measures and lurk in the network for weeks or months—moving around, gaining permissions, stealing data, and gathering information from the different layers of the IT infrastructure in preparation for a large-scale attack or data breach. Many of the most damaging and costly cyber attacks and data breaches—<a href="https://www.ibm.com/topics/ransomware" target="_self" rel="noopener noreferrer">ransomware</a> attacks, business email compromise (BEC), <a href="https://www.ibm.com/think/topics/ddos" target="_self" rel="noopener noreferrer">distributed denial of service (DDoS)</a> attacks, cyber espionage—are examples of advanced threats.</p> <p>Organizations have armed themselves with scores of cybersecurity tools and technologies to fight these threats and close off the attack vectors, or methods, that cybercriminals use to launch them. Some of these tools focus on specific infrastructure layers; others collect log data and telemetry across multiple layers.</p> <p>In most cases these tools are siloed—they don't talk to each other. This leaves security teams to correlate the alerts manually to separate the actual incidents from false positives and triage the incidents according to severity—and coordinate them manually to mitigate and remediate threats. According to <a href="https://www.ibm.com/resources/guides/cyber-resilient-organization-study/" target="_self" rel="noopener noreferrer">IBM's Cyber Resilient Organization Study 2021</a>, 32% of organizations reported using 21 to 30 individual security tools in response to each threat; 13% reported using 31 or more tools.</p> <p>As a result, advanced threats take too long to identify and contain. <a href="https://www.ibm.com/reports/data-breach" target="_self" rel="noopener noreferrer">IBM's Cost of a Data Breach 2022</a> report reveals that the average <a href="https://www.ibm.com/think/topics/data-breach" target="_self" rel="noopener noreferrer">data breach</a> took 277 days to detect and resolve. Based on this average, a breach that occurred January 1 would not be contained until October 4.</p> <p>By breaking down the siloes between layer-specific point solutions, XDR promises overextended security teams and SOCs the end-to-end visibility and integration they need to identify threats faster, respond to them faster and resolve them faster—and to minimize the damage they cause.</p> <p>In the relatively short time since its introduction, XDR is making a difference. According Cost of a Data Breach 2022, organizations with XDR deployed shortened their data breach lifecycle by 29 and lowered breach costs 9% on average compared to organizations without XDR.</p> </div></div> <div class="experiencefragment"> <div id="experiencefragment-a746e53613" class="cmp-experiencefragment cmp-experiencefragment--blueprint---media-player-ad-video---xf---do-not-edit"> <div class="xf-content-height"> <div class="root container responsivegrid"> <div id="container-06d4dca198" class="cmp-container"> <div class="media-player-ad-video"> <div class="media-player-ad-video__container theme-media-player-ad--image-bkg-light" data-theme="image-bkg-light" data-autoid=""> <div class="media-player-ad-video__content"> <div class="media-player-ad-video__top"> <div class="media-player-ad-video__eyebrow"> Mixture of Experts | 14 February, episode 42 </div> </div> <div class="media-player-ad-video__video"> <c4d-video-player-container video-id="1_5t0nxa01" aspect-ratio="16x9" playing-mode="inline" hide-caption> <script src="/etc.clientlibs/adobe-cms/components/content/atoms/video/clientlibs.lc-8675c49600f564093b2ef6979ea3ce64-lc.min.js"></script> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-video-player.lc-e330a027c5ad5af45d6b2121772be896-lc.min.js"></script> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-video-player-container.lc-55363444860a24db3d70e267bce0f5c1-lc.min.js"></script> </c4d-video-player-container> <div id="c4d-analytics-data" data-title-c4d="Extended detection and response" data-last-modified-c4d="Mon Jan 13 14:04:04 UTC 2025" data-last-published-c4d="Mon Jan 13 14:04:04 UTC 2025" data-template-c4d="/conf/adobe-cms-editable/settings/wcm/templates/article" data-playing-mode-c4d="inline"> </div> </div> <h3 class="expressive-heading-03 media-player-ad-video__heading"> Decoding AI: Weekly News Roundup </h3> <div class="media-player-ad-video__text"> <span class=" normal cms-richtext"> <p>Join our world-class panel of engineers, researchers, product leaders and more as they cut through the AI noise to bring you the latest in AI news and insights.</p> </span> </div> <div class="media-player-ad-video__link"> <c4d-link-with-icon cta-type="local" href="https://www.ibm.com/think/podcasts/mixture-of-experts" icon-placement="right" target="_blank" data-link-type="local" data-dynamic-properties="{"ctaUrl":"href"}" data-video-modal-type="media-center"> <span class="cds--link-text" data-link-text data-dynamic-inner-content="ctaLabel">Watch the latest podcast episodes</span> <!-- LTR - Left to Right version --> <svg xmlns="http://www.w3.org/2000/svg" slot="icon" width="20" height="20" focusable="false" fill="currentColor" viewBox="0 0 20 20" aria-hidden="true"> <path d="M11.8 2.8L10.8 3.8 16.2 9.3 1 9.3 1 10.7 16.2 10.7 10.8 16.2 11.8 17.2 19 10z"></path> </svg> <!-- RTL - Right to Left version --> </c4d-link-with-icon> </div> </div> <div class="media-player-ad-video__wrapper"> <div class="media-player-ad-video__wrapper__background"></div> <div class="media-player-ad-video__wrapper__overlay"></div> </div> </div> </div> </div> </div> </div> </div> </div> <div class="standalone-title enhanced-title text"> <h2 class="expressive-heading-05 "> How XDR works </h2> <a data-title="How XDR works" name="How+XDR+works"></a> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-e528cb94dd" data-dynamic-inner-content="description"> <p>XDR is typically consumed as a cloud-based or <a href="https://www.ibm.com/topics/saas" target="_self" rel="noopener noreferrer">software as a service (SaaS)</a> solution; one industry analyst, Gartner, defines XDR as 'SaaS-based'. It may also be the core technology driving a cloud or security solution provider's managed detection and response (MDR) offering.</p> <p>XDR security solutions can integrate:</p> <ul><li>Individual security tools (or point solutions) such as antivirus, <a href="https://www.ibm.com/topics/ueba" target="_self" rel="noopener noreferrer">user and entity behavior analytics (UEBA)</a>, or firewalls;<br /> <br /> </li><li>Layer-specific security solutions such as EDR, endpoint protection platforms (EPPs), <a href="https://www.ibm.com/topics/ndr" target="_self" rel="noopener noreferrer">network detection and response (NDR)</a> or network traffic analysis (NTA);<br /> <br /> </li><li>Solutions that collect data or coordinate workflows across security layers, including security information and event management (<a href="https://www.ibm.com/topics/siem" target="_self" rel="noopener noreferrer">SIEM</a>) or <a href="https://www.ibm.com/topics/security-orchestration-automation-response" target="_self" rel="noopener noreferrer">security orchestration, automation and response (SOAR)</a>.</li></ul> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Continuous data collection</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-a63d204695" data-dynamic-inner-content="description"> <p>XDR collects log data and telemetry from all of the integrated security tools, effectively creating a continuously updated record of everything that happens in the infrastructure - log-ins (successful and unsuccessful), network connections and traffic flows, email messages and attachments, files created and saved, application and device processes, configuration and registry changes. XDR also collects specific alerts generated by the various security products.</p> <p>Open XDR solutions typically collect this data using an open application programming interface, or <a href="https://www.ibm.com/topics/api" target="_self" rel="noopener noreferrer">API</a>. (Native XDR solutions may require a lightweight data collection tool, or agent, installed on devices and applications.) All collected data is normalized and stored in a central cloud-based database or data lake</p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Real-time analysis and threat detection</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-4b7caf5808" data-dynamic-inner-content="description"> <p>XDR uses advanced analytics and <a href="https://www.ibm.com/think/topics/machine-learning" target="_self" rel="noopener noreferrer">machine learning</a> algorithms to identify patterns indicating known threats or suspicious activity in real-time, as they unfold.</p> <p>To do this, XDR correlates data and telemetry across the various infrastructure layers with data from <a href="https://www.ibm.com/topics/threat-intelligence" target="_self" rel="noopener noreferrer">threat intelligence</a> services, which deliver continuously updated information new and recent cyberthreat tactics, vectors and more. Threat intelligence services can be proprietary (operated by the XDR provider), third-party, or community based. Most XDR solutions also map data to MITRE ATT&CK, a freely accessible global knowledge base of hackers' cyberthreat tactics and techniques.</p> <p>XDR analytics and machine learning algorithms can also do their own sleuthing, comparing real-time data to historical data and established baselines to identify suspicious activity, aberrant end-user behaviors, and anything that might indicate a cybersecurity incident or threat. They also can separate the 'signals,' or legitimate threats, from the 'noise' of false positives, so that security analysts can focus on the incidents that matter. Perhaps most important, the machine learning algorithms continuously learn from the data, to get better at detecting threats over time.</p> <p>XDR summarizes important data and analytic results in a central management console that also serves as the solution's user interface (UI). From the console, security team members can get full visibility into every security issue, enterprise-wide, and launch investigations, threat responses and remediations anywhere in the extended infrastructure.</p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Automated detection and response capabilities</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-c8a5f0ab11" data-dynamic-inner-content="description"> <p>Automation is what puts the rapid response in XDR. Based on predefined rules set by the security team—or 'learned' over time by machine learning algorithms—XDR enables automated responses that help speed threat detection and resolution while freeing security analysts to focus on more important work. XDR can automate tasks such as:</p> <ul><li>Triaging and prioritization of alerts according to severity;<br /> <br /> </li><li>Disconnecting or shutting down impacted devices, logging users off the network, halting system/application/device processes, and taking data sources offline;<br /> <br /> </li><li>Launching antivirus/anti-malware software to scan other endpoints on the network for the same threat;<br /> <br /> </li><li>Triggering relevant SOAR <a href="https://www.ibm.com/topics/incident-response" target="_self" rel="noopener noreferrer">incident response</a> playbooks (automated workflows that orchestrate multiple security products in response to a specific security incident).</li></ul> <p>XDR can also automate threat investigation and remediation activities (see the next section). All this automation helps security teams respond to incidents faster and prevent or minimize the damage they cause.</p> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Threat investigation and remediation</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-2914b2d779" data-dynamic-inner-content="description"> <p>Once a security threat is isolated, XDR platforms provide capabilities that security analysts can use to further investigate the threat. For example, forensic analytics and 'track back' reports help security analysts pinpoint the root cause of a threat, identify the various files it impacted, and identify the vulnerability or vulnerabilities the attacker exploited enter and move around the network, gain access to authentication credentials, or perform other malicious activities.</p> <p>Armed with this information, analysts can coordinate remediation tools to eliminate the threat. Remediation might involve:</p> <ul><li>Destroying malicious files and wiping them off endpoints, servers and network devices;<br /> <br /> </li><li>Restoring damaged device and application configurations, registry settings, data and application files;<br /> <br /> </li><li>Applying updates or patches to eliminate vulnerabilities that led to the incident;<br /> <br /> </li><li>Updating detection rules to prevent a recurrence.</li></ul> </div></div> <div class="standalone-title enhanced-title text"> <h3 class="expressive-heading-04 ">Support for threat hunting</h3> </div> <div class="rich-text text"><div class="cms-richtext " id="rich-text-1395a7e971" data-dynamic-inner-content="description"> <p><a href="https://www.ibm.com/topics/threat-hunting" target="_self" rel="noopener noreferrer">Threat hunting</a> (also called cyberthreat hunting) is a proactive security exercise in which a security analyst searches the network for as-yet unknown threats, or known threats yet to be detected or remediated by the organization’s automated cybersecurity tools.</p> <p>Again, advanced threats can lurk for months before they're detected, preparing for a large-scale attack or breach. Effective and timely threat hunting can reduce the time it takes to find and remediate these threats, which can limit or prevent damage from the attack.</p> <p>Threat hunters use a variety of tactics and techniques that rely on the same data sources, analytics and automation capabilities XDR uses for threat detection, response and remediation. For example, a threat hunter might want to search for a particular file, configuration change or other artifact based on forensic analytics, or on MITRE ATT&CK data describing a particular attacker's methods.</p> <p>To support these efforts, XDR makes its analytics and automation capabilities available to security analysts via UI-driven or programmatic means, so they can perform ad-hoc searches data queries, correlations to threat intelligence, and other investigations. Some XDR solutions include tools created specifically for threat hunting such as simple scripting languages (for automating common tasks) and even natural language querying tools.</p> </div></div> </div> </div> <div class="body-article-4 container responsivegrid cds--col"> <div id="body-article-4-6f964e5260" class="cmp-container"> <div class="experiencefragment"> <div id="experiencefragment-4cfb778335" class="cmp-experiencefragment cmp-experiencefragment--blueprint-cardlistitem-xf"> <div class="xf-content-height"> <div class="root container responsivegrid"> <div id="container-9f68167468" class="cmp-container"> <div class="card-list-item card link button"> <c4d-card href="https://www.ibm.com/account/reg/signup?formid=urx-53217" target="_blank" pictogram-placement="top" cta-type="local" aria-label="alt text" data-video-modal-type="media-center" grid-mode="condensed" no-poster="true" data-attribute1="featuredasset"> <c4d-card-eyebrow slot="eyebrow" aria-hidden="true"> Report </c4d-card-eyebrow> <c4d-card-heading role="heading" aria-level="3" slot="heading"> X-Force Cloud Threat Landscape Report 2024 </c4d-card-heading> <p>Understand the latest threats and strengthen your cloud defenses with the X-Force Cloud Threat Landscape Report. </p> <c4d-card-footer icon-placement="right" cta-type="local" href="https://www.ibm.com/account/reg/signup?formid=urx-53217" target="_blank" data-video-modal-type="media-center" slot="footer" aria-hidden="true" class="cds--card__footer-icon-size"> <span>Read the report</span> </c4d-card-footer> <span slot="icon" class="ibm_icon_arrowright_local"></span></c4d-card-footer> </c4d-card> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-content-group.lc-b3d9c02d980e6d12bb41b5b3f2fcd5c9-lc.min.js"></script> </div> </div> </div> </div> </div> </div> <div class="article-content-slot"> </div> </div> </div> </div> </c4d-table-of-contents> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-table-of-contents.lc-27e8bdb50740d86329d753e2419f539c-lc.min.js"></script> </div> <div class="body-article-16 container responsivegrid cds--col"><div class="cds--grid"> <div class="cds--row"> <div class="cds--col-lg-16 cds--no-gutter"> <div class="cds--content-section"> <div id="container-762ccebdfd" class="cmp-container"> <div class="experiencefragment"> <div id="experiencefragment-a786da4865" class="cmp-experiencefragment cmp-experiencefragment--blueprint-carousel-xf"> <div class="xf-content-height"> <div class="root container responsivegrid"> <div id="container-2c18c108fc" class="cmp-container"> <div class="carousel"> <div class="cds--grid "> <div class="cds--row"> <div class="cds--col-lg-16 "> <div class="cds--content-block"> <div class="cds--full-width-intro-container"> <div class="intro-section--flex "> <div class="intro-section--heading-wrapper"> <h2 class="expressive-heading-05"> Resources </h2> </div> <div class="intro-section--content-wrapper"> <span> </span> <c4d-link-list type="vertical"> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-cibm-cta.lc-07b5c9e0985171611c73aee4a84443a6-lc.min.js"></script> </c4d-link-list> </div> </div> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-link-list.lc-ce5ae56ac1a30ed4a9ecb09831e0da3d-lc.min.js"></script> </div> <c4d-carousel class=" c4d--carousel--16-col" data-attribute1="resources"> <div class="carousel-item"> <c4d-card href="https://www.ibm.com/account/reg/signup?formid=urx-52629" target="_blank" pictogram-placement="top" cta-type="local" aria-label="alt text" data-video-modal-type="media-center" grid-mode="condensed" no-poster="true"> <c4d-card-eyebrow slot="eyebrow" aria-hidden="true"> Report </c4d-card-eyebrow> <c4d-card-heading role="heading" aria-level="3" slot="heading"> IBM X-Force Threat Intelligence Index 2024 </c4d-card-heading> <p>Gain insights to prepare and respond to cyberattacks with greater speed and effectiveness with the IBM X-Force Threat Intelligence Index.</p> <c4d-card-footer icon-placement="right" cta-type="local" href="https://www.ibm.com/account/reg/signup?formid=urx-52629" target="_blank" data-video-modal-type="media-center" slot="footer" aria-hidden="true" class="cds--card__footer-icon-size"> <span>Read the report</span> </c4d-card-footer> <span slot="icon" class="ibm_icon_arrowright_local"></span></c4d-card-footer> </c4d-card> </div> <div class="carousel-item"> <c4d-card href="https://www.ibm.com/x-force" target="_blank" pictogram-placement="top" cta-type="local" aria-label="alt text" data-video-modal-type="media-center" grid-mode="condensed" no-poster="true"> <c4d-card-eyebrow slot="eyebrow" aria-hidden="true"> Product </c4d-card-eyebrow> <c4d-card-heading role="heading" aria-level="3" slot="heading"> IBM X-Force </c4d-card-heading> <p>Protect your organization from global threats with IBM X-Force’s threat-centric team of hackers, responders, researchers and analysts.</p> <c4d-card-footer icon-placement="right" cta-type="local" href="https://www.ibm.com/x-force" target="_blank" data-video-modal-type="media-center" slot="footer" aria-hidden="true" class="cds--card__footer-icon-size"> <span>Explore IBM X-Force</span> </c4d-card-footer> <span slot="icon" class="ibm_icon_arrowright_local"></span></c4d-card-footer> </c4d-card> </div> <div class="carousel-item"> <c4d-card href="https://www.ibm.com/account/reg/signup?formid=urx-52913" target="_blank" pictogram-placement="top" cta-type="local" aria-label="alt text" data-video-modal-type="media-center" grid-mode="condensed" no-poster="true"> <c4d-card-eyebrow slot="eyebrow" aria-hidden="true"> Report </c4d-card-eyebrow> <c4d-card-heading role="heading" aria-level="3" slot="heading"> Cost of a Data Breach Report 2024 </c4d-card-heading> <p>Data breach costs have hit a new high. Get essential insights to help your security and IT teams better manage risk and limit potential losses.</p> <c4d-card-footer icon-placement="right" cta-type="local" href="https://www.ibm.com/account/reg/signup?formid=urx-52913" target="_blank" data-video-modal-type="media-center" slot="footer" aria-hidden="true" class="cds--card__footer-icon-size"> <span>Read the report</span> </c4d-card-footer> <span slot="icon" class="ibm_icon_arrowright_local"></span></c4d-card-footer> </c4d-card> </div> <div class="carousel-item"> <c4d-card href="https://securityintelligence.com/category/incident-response/" target="_blank" pictogram-placement="top" cta-type="external" aria-label="alt text" data-video-modal-type="media-center" grid-mode="condensed" no-poster="true"> <c4d-card-eyebrow slot="eyebrow" aria-hidden="true"> Insights </c4d-card-eyebrow> <c4d-card-heading role="heading" aria-level="3" slot="heading"> Security Intelligence blog </c4d-card-heading> <p>Stay up to date with the latest trends and news about security. </p> <c4d-card-footer icon-placement="right" cta-type="external" href="https://securityintelligence.com/category/incident-response/" target="_blank" data-video-modal-type="media-center" slot="footer" aria-hidden="true" class="cds--card__footer-icon-size"> <span>Explore now</span> </c4d-card-footer> <span slot="icon" class="ibm_icon_launch_external"></span></c4d-card-footer> </c4d-card> </div> </c4d-carousel> </div> </div> </div> </div> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-carousel.lc-ea70ef705b7ae8a2f90ffbac22d6e0e9-lc.min.js"></script> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-content-block-cards.lc-092ce8027acac0a3695d25c1ceaaab88-lc.min.js"></script> </div> </div> </div> </div> </div> </div> <div class="experiencefragment"> <div id="experiencefragment-604630f79c" class="cmp-experiencefragment cmp-experiencefragment--blueprint-cta-section-xf"> <div class="xf-content-height"> <div class="root container responsivegrid"> <div id="container-8a62153b6d" class="cmp-container"> <div class="cta-section"> <a data-title="Related solutions" name="Related+solutions"></a> <c4d-cta-block class=" hide-divider-line title-plus-3-items-layout" data-attribute1="solutions" no-border> <c4d-content-block-heading class=""> Related solutions </c4d-content-block-heading> <c4d-cta-block-item-row no-border> <c4d-cta-block-item class="cds--cta-block-item__pictogram-styling" data-attribute3="1" data-attribute1="solutions"> <svg fill="currentColor" slot="media" class="detect--and--stop--advancing--threats cds--pictogram-item__pictogram" data-autoid="c4d--pictogram-item__pictogram" focusable="false" viewBox="0 0 80 80" height="80" width="80" role="img"> <use href="#detect--and--stop--advancing--threats" height="80" width="80"></use> <defs> <linearGradient id="pictogram-color-gradient-180-blue-to-purple" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#8a3ffc"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-dark-to-light" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#78a9ff"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-to-teal" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#08bdba"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-to-magenta" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#ff7eb6"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-red-to-purple" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#fa4d56"/> <stop offset="100%" stop-color="#a56eff"/> </linearGradient> <linearGradient id="pictogram-color-blue-80"> <stop stop-color="#002d9c"/> </linearGradient> <linearGradient id="pictogram-color-blue-80"> <stop stop-color="#002d9c"/> </linearGradient> <linearGradient id="pictogram-color-blue-60"> <stop stop-color="#0f62fe"/> </linearGradient> <linearGradient id="pictogram-color-cyan-50"> <stop stop-color="#1192E8"/> </linearGradient> <linearGradient id="pictogram-color-purple-60"> <stop stop-color="#8A3FFC"/> </linearGradient> <linearGradient id="pictogram-color-green-50"> <stop stop-color="#24a148"/> </linearGradient> <linearGradient id="pictogram-color-teal-50"> <stop stop-color="#009d9a"/> </linearGradient> <linearGradient id="pictogram-color-magenta-50"> <stop stop-color="#EE5396"/> </linearGradient> <linearGradient id="pictogram-color-red-60"> <stop stop-color="#DA1E28"/> </linearGradient> </defs> </svg> <div class="pictogram-svg-source"> <svg xmlns="http://www.w3.org/2000/svg" id="detect--and--stop--advancing--threats" viewBox="0 0 32 32"><path clip-rule="evenodd" d="M9,3.5 C8.724,3.5,8.5,3.724,8.5,4S8.724,4.5,9,4.5S9.5,4.276,9.5,4S9.276,3.5,9,3.5z M5,3.5C4.724,3.5,4.5,3.724,4.5,4S4.724,4.5,5,4.5 S5.5,4.276,5.5,4S5.276,3.5,5,3.5z M7,6.5C6.724,6.5,6.5,6.724,6.5,7S6.724,7.5,7,7.5S7.5,7.276,7.5,7S7.276,6.5,7,6.5z M2,4.5 C1.724,4.5,1.5,4.724,1.5,5S1.724,5.5,2,5.5S2.5,5.276,2.5,5S2.276,4.5,2,4.5z M4,8.5C3.724,8.5,3.5,8.724,3.5,9S3.724,9.5,4,9.5 S4.5,9.276,4.5,9S4.276,8.5,4,8.5 M2,9.5c-0.276,0-0.5,0.224-0.5,0.5s0.224,0.5,0.5,0.5s0.5-0.224,0.5-0.5S2.276,9.5,2,9.5z M5,10.5 c-0.276,0-0.5,0.224-0.5,0.5s0.224,0.5,0.5,0.5s0.5-0.224,0.5-0.5S5.276,10.5,5,10.5z M3,11.5c-0.276,0-0.5,0.224-0.5,0.5 s0.224,0.5,0.5,0.5s0.5-0.224,0.5-0.5S3.276,11.5,3,11.5z M6,12.5c-0.276,0-0.5,0.224-0.5,0.5s0.224,0.5,0.5,0.5s0.5-0.224,0.5-0.5 S6.276,12.5,6,12.5z M1.5,13.5C1.224,13.5,1,13.724,1,14s0.224,0.5,0.5,0.5S2,14.276,2,14S1.776,13.5,1.5,13.5z M4,14.5 c-0.276,0-0.5,0.224-0.5,0.5s0.224,0.5,0.5,0.5s0.5-0.224,0.5-0.5S4.276,14.5,4,14.5z M2.5,15.5C2.224,15.5,2,15.724,2,16 c0,0.276,0.224,0.5,0.5,0.5S3,16.276,3,16S2.776,15.5,2.5,15.5z M4,17.5c-0.276,0-0.5,0.224-0.5,0.5s0.224,0.5,0.5,0.5 s0.5-0.224,0.5-0.5S4.276,17.5,4,17.5z M7,17.5c-0.276,0-0.5,0.224-0.5,0.5s0.224,0.5,0.5,0.5s0.5-0.224,0.5-0.5S7.276,17.5,7,17.5z M7,20.5c-0.276,0-0.5,0.224-0.5,0.5s0.224,0.5,0.5,0.5s0.5-0.224,0.5-0.5S7.276,20.5,7,20.5z M3,20.5c-0.276,0-0.5,0.224-0.5,0.5 s0.224,0.5,0.5,0.5s0.5-0.224,0.5-0.5S3.276,20.5,3,20.5z M6,22.5c-0.276,0-0.5,0.224-0.5,0.5s0.224,0.5,0.5,0.5s0.5-0.224,0.5-0.5 S6.276,22.5,6,22.5z M4,23.5c-0.276,0-0.5,0.224-0.5,0.5s0.224,0.5,0.5,0.5s0.5-0.224,0.5-0.5S4.276,23.5,4,23.5z M11,23.5 c-0.276,0-0.5,0.224-0.5,0.5s0.224,0.5,0.5,0.5s0.5-0.224,0.5-0.5S11.276,23.5,11,23.5z M8,25.5c-0.276,0-0.5,0.224-0.5,0.5 s0.224,0.5,0.5,0.5s0.5-0.224,0.5-0.5S8.276,25.5,8,25.5z M5,26.5c-0.276,0-0.5,0.224-0.5,0.5s0.224,0.5,0.5,0.5s0.5-0.224,0.5-0.5 S5.276,26.5,5,26.5z M4,28.5c-0.276,0-0.5,0.224-0.5,0.5s0.224,0.5,0.5,0.5s0.5-0.224,0.5-0.5S4.276,28.5,4,28.5z M12,27.5 c-0.276,0-0.5,0.224-0.5,0.5s0.224,0.5,0.5,0.5s0.5-0.224,0.5-0.5S12.276,27.5,12,27.5z M14,30c-0.276,0-0.5,0.224-0.5,0.5 S13.724,31,14,31s0.5-0.224,0.5-0.5S14.276,30,14,30z M19,26.5c-0.276,0-0.5,0.224-0.5,0.5s0.224,0.5,0.5,0.5s0.5-0.224,0.5-0.5 S19.276,26.5,19,26.5z M19.5,0.64c-6.54,0-11.86,5.32-11.86,11.86s5.32,11.86,11.86,11.86s11.86-5.32,11.86-11.86 S26.04,0.64,19.5,0.64z M19.5,23.64c-6.143,0-11.14-4.997-11.14-11.14S13.357,1.36,19.5,1.36S30.64,6.357,30.64,12.5 S25.643,23.64,19.5,23.64z M15.254,15.254L14.009,16.5l1.245,1.245l-0.509,0.51L13.5,17.009l-1.246,1.246l-0.509-0.51L12.99,16.5 l-1.245-1.246l0.509-0.509L13.5,15.99l1.246-1.245L15.254,15.254z M26.255,13.254L25.009,14.5l1.246,1.246l-0.51,0.509L24.5,15.009 l-1.245,1.245l-0.51-0.509l1.246-1.246l-1.246-1.246l0.51-0.509l1.245,1.245l1.245-1.245L26.255,13.254z M20.255,6.254L19.009,7.5 l1.246,1.246l-0.51,0.509L18.5,8.009l-1.245,1.245l-0.509-0.509L17.991,7.5l-1.245-1.246l0.509-0.509L18.5,6.991l1.245-1.245 L20.255,6.254z" fill-rule="evenodd"/></svg> </div> <c4d-content-item-heading> Threat detection and response solutions </c4d-content-item-heading> <c4d-content-item-copy> <c4d-content-item-paragraph> <div class="cms-richtext " id="rich-text-cf3fed18fc" data-dynamic-inner-content="description"> <p>Elevate your security with our premier suite of threat detection and response solutions.</p> </div> </c4d-content-item-paragraph> </c4d-content-item-copy> <c4d-text-cta cta-type="local" icon-placement="right" href="https://www.ibm.com/threat-detection-response" target="_self" aria-label="alt text" data-dynamic-properties="{"ctaUrl":"href"}" data-dynamic-inner-content="ctaLabel" slot="footer" data-video-modal-type="media-center">Explore threat detection solutions </c4d-text-cta> </c4d-cta-block-item> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-cta-block.lc-e1ab5b8468841f4015cbbfcd7319eab5-lc.min.js"></script> <c4d-cta-block-item class="cds--cta-block-item__pictogram-styling" data-attribute3="2" data-attribute1="solutions"> <svg fill="currentColor" slot="media" class="master--threat--hunting cds--pictogram-item__pictogram" data-autoid="c4d--pictogram-item__pictogram" focusable="false" viewBox="0 0 80 80" height="80" width="80" role="img"> <use href="#master--threat--hunting" height="80" width="80"></use> <defs> <linearGradient id="pictogram-color-gradient-180-blue-to-purple" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#8a3ffc"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-dark-to-light" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#78a9ff"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-to-teal" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#08bdba"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-to-magenta" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#ff7eb6"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-red-to-purple" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#fa4d56"/> <stop offset="100%" stop-color="#a56eff"/> </linearGradient> <linearGradient id="pictogram-color-blue-80"> <stop stop-color="#002d9c"/> </linearGradient> <linearGradient id="pictogram-color-blue-80"> <stop stop-color="#002d9c"/> </linearGradient> <linearGradient id="pictogram-color-blue-60"> <stop stop-color="#0f62fe"/> </linearGradient> <linearGradient id="pictogram-color-cyan-50"> <stop stop-color="#1192E8"/> </linearGradient> <linearGradient id="pictogram-color-purple-60"> <stop stop-color="#8A3FFC"/> </linearGradient> <linearGradient id="pictogram-color-green-50"> <stop stop-color="#24a148"/> </linearGradient> <linearGradient id="pictogram-color-teal-50"> <stop stop-color="#009d9a"/> </linearGradient> <linearGradient id="pictogram-color-magenta-50"> <stop stop-color="#EE5396"/> </linearGradient> <linearGradient id="pictogram-color-red-60"> <stop stop-color="#DA1E28"/> </linearGradient> </defs> </svg> <div class="pictogram-svg-source"> <svg xmlns="http://www.w3.org/2000/svg" id="master--threat--hunting" viewBox="0 0 32 32"><path d="M18.901,4.724l0.18-0.697 c4.345,1.115,7.748,4.504,8.88,8.846l-0.697,0.182C26.198,8.966,22.994,5.774,18.901,4.724z M18.944,27.265l0.182,0.697 c4.339-1.131,7.728-4.531,8.845-8.873l-0.697-0.18C26.222,22.998,23.03,26.2,18.944,27.265z M13.09,4.727L12.91,4.03 c-4.356,1.121-7.759,4.524-8.881,8.88l0.697,0.18C5.783,8.987,8.987,5.783,13.09,4.727z M4.727,18.91L4.03,19.09 c1.122,4.357,4.525,7.76,8.882,8.881l0.18-0.697C8.988,26.218,5.783,23.014,4.727,18.91z M17.745,13.746L16,15.491l-1.746-1.745 l-0.509,0.509L15.491,16l-1.745,1.745l0.509,0.51L16,16.509l1.745,1.746l0.51-0.51L16.509,16l1.746-1.746L17.745,13.746z M9,17.64 c1.301,0,2.36,1.059,2.36,2.36S10.301,22.36,9,22.36S6.64,21.302,6.64,20S7.699,17.64,9,17.64z M9,18.36 c-0.904,0-1.64,0.735-1.64,1.64S8.096,21.64,9,21.64s1.64-0.735,1.64-1.64S9.904,18.36,9,18.36z M20,12.36 c-1.302,0-2.36-1.059-2.36-2.36S18.698,7.64,20,7.64s2.36,1.059,2.36,2.36S21.302,12.36,20,12.36z M20,11.64 c0.904,0,1.64-0.736,1.64-1.64S20.904,8.36,20,8.36S18.36,9.096,18.36,10S19.096,11.64,20,11.64z M13,15.64H1v0.72h12V15.64z M19,15.64v0.72h12v-0.72H19z M16.36,1h-0.72v12h0.72V1z M15.64,31h0.72V19h-0.72V31z"/></svg> </div> <c4d-content-item-heading> Threat detection and response services </c4d-content-item-heading> <c4d-content-item-copy> <c4d-content-item-paragraph> <div class="cms-richtext " id="rich-text-40fb49ac83" data-dynamic-inner-content="description"> <p>Protect existing investments and enhance them with AI, improve security operations and protect the hybrid cloud.</p> </div> </c4d-content-item-paragraph> </c4d-content-item-copy> <c4d-text-cta cta-type="local" icon-placement="right" href="https://www.ibm.com/services/threat-detection-response" target="_self" aria-label="alt text" data-dynamic-properties="{"ctaUrl":"href"}" data-dynamic-inner-content="ctaLabel" slot="footer" data-video-modal-type="media-center">Explore threat detection services </c4d-text-cta> </c4d-cta-block-item> <c4d-cta-block-item class="cds--cta-block-item__pictogram-styling" data-attribute3="3" data-attribute1="solutions"> <svg fill="currentColor" slot="media" class="threat--management cds--pictogram-item__pictogram" data-autoid="c4d--pictogram-item__pictogram" focusable="false" viewBox="0 0 80 80" height="80" width="80" role="img"> <use href="#threat--management" height="80" width="80"></use> <defs> <linearGradient id="pictogram-color-gradient-180-blue-to-purple" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#8a3ffc"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-dark-to-light" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#78a9ff"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-to-teal" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#08bdba"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-blue-to-magenta" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#0f62fe"/> <stop offset="100%" stop-color="#ff7eb6"/> </linearGradient> <linearGradient id="pictogram-color-gradient-180-red-to-purple" gradientTransform="rotate(90)"> <stop offset="0%" stop-color="#fa4d56"/> <stop offset="100%" stop-color="#a56eff"/> </linearGradient> <linearGradient id="pictogram-color-blue-80"> <stop stop-color="#002d9c"/> </linearGradient> <linearGradient id="pictogram-color-blue-80"> <stop stop-color="#002d9c"/> </linearGradient> <linearGradient id="pictogram-color-blue-60"> <stop stop-color="#0f62fe"/> </linearGradient> <linearGradient id="pictogram-color-cyan-50"> <stop stop-color="#1192E8"/> </linearGradient> <linearGradient id="pictogram-color-purple-60"> <stop stop-color="#8A3FFC"/> </linearGradient> <linearGradient id="pictogram-color-green-50"> <stop stop-color="#24a148"/> </linearGradient> <linearGradient id="pictogram-color-teal-50"> <stop stop-color="#009d9a"/> </linearGradient> <linearGradient id="pictogram-color-magenta-50"> <stop stop-color="#EE5396"/> </linearGradient> <linearGradient id="pictogram-color-red-60"> <stop stop-color="#DA1E28"/> </linearGradient> </defs> </svg> <div class="pictogram-svg-source"> <svg xmlns="http://www.w3.org/2000/svg" id="threat--management" viewBox="0 0 32 32"><path d="M14,16.385H8v-0.72h6V16.385z M24,15.665h-6 v0.72h6V15.665z M16.36,8.025h-0.72v6h0.72V8.025z M16.36,18.025h-0.72v6h0.72V18.025z M27.36,20.025V6.811L16,0.615L4.64,6.811 v13.214c0,6.264,5.096,11.36,11.36,11.36C22.264,31.386,27.36,26.289,27.36,20.025z M16,1.435l10.64,5.804v12.787 c0,5.867-4.772,10.64-10.64,10.64c-5.867,0-10.64-4.772-10.64-10.64V7.239L16,1.435z M14.121,21.425 c-1.624-0.581-2.939-1.897-3.521-3.521l-0.678,0.242c0.653,1.824,2.132,3.304,3.957,3.956L14.121,21.425z M22.078,18.146 L21.4,17.904c-0.582,1.624-1.898,2.939-3.521,3.521l0.242,0.678C19.944,21.45,21.424,19.972,22.078,18.146z M14.122,10.625 l-0.243-0.678c-1.824,0.653-3.303,2.132-3.956,3.956l0.678,0.243C11.182,12.522,12.498,11.206,14.122,10.625z M22.078,13.903 c-0.653-1.824-2.133-3.303-3.957-3.956l-0.242,0.678c1.623,0.581,2.939,1.897,3.521,3.521L22.078,13.903z"/></svg> </div> <c4d-content-item-heading> Incident response services </c4d-content-item-heading> <c4d-content-item-copy> <c4d-content-item-paragraph> <div class="cms-richtext " id="rich-text-8668ff56ae" data-dynamic-inner-content="description"> <p>Improve your organization’s incident response program, minimize the impact of a breach and experience rapid response to cybersecurity incidents.</p> </div> </c4d-content-item-paragraph> </c4d-content-item-copy> <c4d-text-cta cta-type="local" icon-placement="right" href="https://www.ibm.com/services/incident-response" target="_self" aria-label="alt text" data-dynamic-properties="{"ctaUrl":"href"}" data-dynamic-inner-content="ctaLabel" slot="footer" data-video-modal-type="media-center">Explore incident response services </c4d-text-cta> </c4d-cta-block-item> </c4d-cta-block-item-row> </c4d-cta-block> </div> </div> </div> </div> </div> </div> <div class="experiencefragment"> <div id="experiencefragment-16b609711c" class="cmp-experiencefragment cmp-experiencefragment--blueprint-next-steps-xf"> <div class="xf-content-height"> <div class="root container responsivegrid"> <div id="container-8ffc732f28" class="cmp-container"> <div class="next-steps-container"> <div data-cmp-is="next-steps-container" class="cds--next-steps-container"> <div class="cds--cta-section--g10 cds--cta-section--theme" data-dynamic-content-type="ADOBE_TARGET" data-component-name="next-steps" data-component-identifier="next-steps"> <c4d-cta-block no-border class=" cta-block-section__container" data-attribute1="next-steps"> <div role="heading" data-autoid="c4d--content-block__heading" class="cds--content-block__heading" slot="heading"> <a data-title="Take the next step" name="Take+the+next+step"></a> <span class="enhanced-title ">Take the next step</span> </div> <c4d-content-block-copy size="sm"> <c4d-content-block-paragraph> <div class="cms-richtext " id="rich-text-72d8c84cdb" data-dynamic-inner-content="description"> <p>Leverage IBM threat detection and response solutions to strengthen your security and accelerate threat detection.</p> <p> </p> </div> </c4d-content-block-paragraph> </c4d-content-block-copy> <c4d-button-group slot="action"> <c4d-button-group-item href="https://www.ibm.com/threat-detection-response" target="_self" kind="primary" aria-label="alt text" cta-type="local" data-video-modal-type="media-center" data-attribute1="next-steps" data-attribute3="1"> <span>Explore threat detection solutions</span> </c4d-button-group-item> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-button.lc-1ccc2c97318fe420b50ea01d3c14131b-lc.min.js"></script> <c4d-button-group-item href="https://www.ibm.com/account/reg/signup?formid=urx-52262" target="_blank" kind="tertiary" aria-label="alt text" cta-type="local" data-video-modal-type="media-center" data-attribute1="next-steps" data-attribute3="2"> <span>Book a threat-centric briefing</span> </c4d-button-group-item> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-button-group.lc-a07b371b9ce77ba4e90d41ec991c54f1-lc.min.js"></script> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-content-item.lc-dbe860c1c5c0fbefec2a0ef9a23b6898-lc.min.js"></script> </c4d-button-group> </c4d-cta-block> </div> </div> </div> </div> </div> </div> </div> </div> <div class="article-content-slot"> </div> </div> </div> </div> </div> </div></div> <div class="footer"> <c4d-footer-container data-cmp-is="footer" data-autoid="c4d--footer" class="cmp-footer" data-children-count="0" size="2"></c4d-footer-container> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-footer.lc-45bec0d59ca7dce5f95bf1b1d1cca838-lc.min.js"></script> </div> </div> </div> </c4d-video-cta-container> <div class="video-modal-overlay" aria-hidden="true"> <div class="video-modal-overlay__dialog"> <div class="video-modal-overlay__dialog--body"> <div class="video-modal-overlay__dialog--body__close-btn"> <svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"> <rect width="24" height="24" fill="white" fill-opacity="0.01" style="mix-blend-mode:multiply"/> <path id="Vector" d="M13.0606 12L19.5 5.56058L18.4394 4.5L12 10.9394L5.56072 4.5L4.5 5.56058L10.9394 12L4.5 18.4394L5.56072 19.5L12 13.0606L18.4394 19.5L19.5 18.4394L13.0606 12Z" fill="#161616"/> </svg> </div> <div class="video-modal-overlay__dialog--body-content"> <div class="video-modal-overlay__loading-container"> <cds-loading></cds-loading> </div> <div class="video-wms hide"> <iframe class="video-modal-content" data-original-src="https://video.ibm.com/embed/$[wmsChanneId]?volume=0&autoplay=true&controls=true" src="" webkitallowfullscreen allowfullscreen frameborder="no" referrerpolicy="no-referrer-when-downgrade"></iframe> </div> <div class="video-media-center hide"> <c4d-video-player-container video-id="" aspect-ratio="16x9" auto-play muted playing-mode="inline"></c4d-video-player-container> </div> </div> </div> </div> </div> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-cweb-loading.lc-ca618eb7785b83e9cfb87f1d1683e7cd-lc.min.js"></script> <c4d-lightbox-video-player-container></c4d-lightbox-video-player-container> <script src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-idlBundle.lc-f720c930f09453060e1c386a0ad5a4d8-lc.min.js"></script> <script src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-base.lc-18f193433bf96d7320eee136848e463b-lc.min.js"></script> <script src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-idlStyles.lc-dab35e76d7c2b5a874f52caeb87bf57c-lc.min.js"></script> <script src="/etc.clientlibs/adobe-cms/components/poc/ibm-image-dm/clientlibs/site.lc-96f41d35e09f648917c6d3f54d19b8c1-lc.min.js"></script> <script src="https://www.ibm.com/common/digitaladvisor/cm-app/latest/cm-app.min.js" defer async></script> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-cweb-code-snippet.lc-d1f19e3766d5ef4bb40f94c6a51b5bbf-lc.min.js"></script> <script defer src="/etc.clientlibs/adobe-cms/clientlibs/clientlib-pdfviewer.lc-e4412705ab74ab8b0e2e21371e0762c9-lc.min.js"></script> <!-- Added for Adobe analytics implementation ADCMS-5834 <script type="text/javascript"> adobeDataLayer.push({ "event": "linkClick", "web": { "webPageDetails": { "URL": document.URL, "name": "home" }, "webInteraction": { "linkClick":"event", "value":"1", "type": "other", "URL": document.URL, "name": "linkClick: " + document.URL } }, }) </script> !--> <!-- Added for Adobe analytics implementation ADCMS-5834 & ADCMS-6152 !--> <script type="text/javascript"> document.addEventListener("DOMContentLoaded", function() { var templatePath = "\/conf\/adobe\u002Dcms\u002Deditable\/settings\/wcm\/templates\/article"; var templateName = templatePath.split('/').pop(); const currentUrl = document.URL; const [baseUrl, queryString] = currentUrl.split('?'); const urlWithoutProtocolAndDomain = baseUrl.replace(/^https?:\/\/[^\/]+\//, ''); const segments = urlWithoutProtocolAndDomain.split('/').filter(segment => segment); const localePattern = /^[a-z]{2}-[a-z]{2}$/; const cleanedSegments = segments.filter(segment => !localePattern.test(segment)); const firstSegment = cleanedSegments[0] || ""; const secondSegment = cleanedSegments[1] || ""; const thirdSegment = cleanedSegments[2] || ""; if (currentUrl.includes("/products")) { callProductPageLoadEvent(); } function callProductPageLoadEvent(){ adobeDataLayer.push({ "event": "productPageLoad", "commerce": { "productViews": { "value": 1 } }, "productListItems": { "name": secondSegment, "productCategories": { "categoryName": thirdSegment } }, "web": { "webPageDetails": { "URL": document.URL, "name": "Extended detection and response", "siteSection": firstSegment }, "webReferrer": { "URL": document.referrer } } }); } function getCookieByName(name) { const cookieArr = document.cookie.split(';'); for (let i = 0; i < cookieArr.length; i++) { const cookie = cookieArr[i].trim(); if (cookie.startsWith(name + "=")) { return cookie.substring(name.length + 1); } } return null; } function cleanUrl(url) { let modifiedUrl = url; if (modifiedUrl.startsWith("www")) { modifiedUrl = modifiedUrl.replace(/^www\.?/, ""); } return modifiedUrl; } function getVisitDepth() { let pageVisitCount = sessionStorage.getItem('pageVisitCount'); pageVisitCount = pageVisitCount ? parseInt(pageVisitCount, 10) : 0; pageVisitCount++; sessionStorage.setItem('pageVisitCount', pageVisitCount); return pageVisitCount; } function getAmPm() { const date = new Date(); const hours = date.getHours(); return hours >= 12 ? "PM" : "AM"; } function getCurrentDay() { const date = new Date(); return new Intl.DateTimeFormat('en-US', { weekday: 'long' }).format(date); } function getDayOfMonth() { const date = new Date(); return date.getDate(); } function getDayOfWeekAsInteger() { const date = new Date(); return date.getDay(); } function getDayOfYear() { const date = new Date(); const startOfYear = new Date(date.getFullYear(), 0, 1); const diffInMillis = date - startOfYear; const dayOfYear = Math.floor(diffInMillis / (1000 * 60 * 60 * 24)) + 1; return dayOfYear; } function getCurrentHour() { var currentHour = new Date().getHours(); var formattedHour = (currentHour === 0 ? 24 : currentHour); return formattedHour + ":00"; } function getCurrentHourInADay() { const date = new Date(); let hours = date.getHours(); const period = hours >= 12 ? "PM" : "AM"; hours = hours % 12 || 12; return hours +":00" +" " + period; } function getCurrentMinute() { const date = new Date(); return date.getMinutes(); } function getCurrentMonth() { const date = new Date(); return date.getMonth() + 1; } function printCurrentMonthName() { const months = ["January", "February", "March", "April", "May", "June", "July", "August", "September", "October", "November", "December"]; const date = new Date(); const monthName = months[date.getMonth()]; return monthName; } function getQuarter(date = new Date()) { var year = date.getFullYear(); var quarters = [ { start: "Jan", end: "Mar" }, { start: "Apr", end: "Jun" }, { start: "Jul", end: "Sep" }, { start: "Oct", end: "Dec" } ]; var quarterIndex = Math.floor(date.getMonth() / 3); var start = quarters[quarterIndex].start; var end = quarters[quarterIndex].end; return start + " " + year + " - " + end + " " + year; } function getCurrentQuarter() { const date = new Date(); const month = date.getMonth(); const quarter = Math.floor(month / 3) + 1; return quarter; } function getCurrentWeek() { const date = new Date(); const startOfYear = new Date(date.getFullYear(), 0, 1); const diff = date - startOfYear; const oneWeekInMillis = 1000 * 60 * 60 * 24 * 7; const weekNumber = Math.ceil(diff / oneWeekInMillis); return weekNumber; } function getDayType() { const date = new Date(); const dayOfWeek = date.getDay(); if (dayOfWeek === 0 || dayOfWeek === 6) { return "Weekend"; } else { return "Weekday"; } } function getCurrentYear() { const date = new Date(); return date.getFullYear(); } function generateUtCodesObject() { const utCodesMeta = document.querySelector('meta[name="ut-codes"]'); const utCodesIdMeta = document.querySelector('meta[name="ut-codes-id"]'); if (utCodesMeta && utCodesIdMeta) { const utCodesContent = utCodesMeta.getAttribute('content'); const utCodesIdContent = utCodesIdMeta.getAttribute('content'); const utCodesArray = utCodesContent.split(" > "); const utCodesIdArray = utCodesIdContent.split(" > "); let utCodes = {}; utCodesArray.forEach((code, index) => { const firstTwoLetters = code.substring(0, 2); let prefix = ''; switch (firstTwoLetters) { case '10': prefix = 'BusinessUnit'; break; case '15': prefix = 'LineOfBusiness'; break; case '17': prefix = 'Market'; break; case '20': prefix = 'OfferingPortfolio'; break; case '30': prefix = 'Offering'; break; default: prefix = 'Unknown'; } const codeKey = 'ut' + firstTwoLetters + prefix; const codeName = code + ':' + (utCodesIdArray[index] || ""); utCodes[codeKey] = codeName; }); return utCodes; } return {}; } function isFirstPageVisited() { const domainKey = 'firstPageVisited_' + window.location.hostname; if (!localStorage.getItem(domainKey)) { localStorage.setItem(domainKey, 'true'); return true; } return false; } window.addEventListener('unload', () => { localStorage.clear(); }); function getQueryParamWithKey(paramName) { const urlObj = new URL(window.location.href); const value = urlObj.searchParams.get(paramName); if (urlObj.searchParams.has(paramName)) { return paramName + '=' + value; } return ''; } const cisSessionId = getCookieByName("CISSESSIONIDP07A"); let loginStatus = cisSessionId ? "logged in" : "logged out"; const utCodes = generateUtCodesObject(); adobeDataLayer.push({ "event": "pageLoad", "_ibm": { "page": { utCodes: utCodes, "firstPageFlag": isFirstPageVisited(), "internalCampaign": getQueryParamWithKey("intcmp"), "siteSection2": secondSegment, "siteSection3": thirdSegment, "pageType": templateName, "domain": cleanUrl(window.location.host), "siteLanguage": "en", "pageName": cleanUrl(window.location.host) + " | " + templateName + " | Extended detection and response", "siteCountry": "us" }, "user": { "userAgent": navigator.userAgent, "loginStatus": loginStatus }, "siteActivity": { "visitDepth": getVisitDepth() }, "timeParting": { "t_AmPM": getAmPm(), "t_Day": getCurrentDay(), "t_DayOfMonth": getDayOfMonth(), "t_DayOfWeek": getDayOfWeekAsInteger(), "t_DayOfYear": getDayOfYear(), "t_Hour": getCurrentHour(), "t_HourOfDay": getCurrentHourInADay(), "t_Minute": getCurrentMinute(), "t_Month": getCurrentMonth(), "t_MonthOfYear": printCurrentMonthName(), "t_Quarter": getQuarter(date = new Date()), "t_QuarterOfYear": getCurrentQuarter(), "t_Week": getCurrentWeek(), "t_Weekday_Weekend": getDayType(), "t_Year": getCurrentYear() } }, "web": { "webPageDetails": { "pageViews": { "value": 1 }, "URL": document.URL, "name": "Extended detection and response", "siteSection": firstSegment }, "webReferrer": { "URL": document.referrer } } }); document.addEventListener('click', function(event) { if (event.target.closest('.WACLauncher__ButtonContainer')) { handleClick(event); } }); function handleClick(event) { adobeDataLayer.push({ "event": "contactLoad", "_ibm": { "contact": { "contactBotClick": { "value": 1 }, "contactExperienceType": "Support or Sales", "contactLanguage": "en", "contactCountry": "us" }, "click": { "linkTileNumber": 1 } }, "web": { "webPageDetails": { "URL": document.URL, "name": "Extended detection and response" }, "webInteraction": { "name": "contactLoad", "URL": document.URL, "type": "other" } } }); } const legalNavItems = document.getElementsByTagName('c4d-legal-nav-item'); for (let item of legalNavItems) { const hrefValue = item.getAttribute('href'); if (hrefValue && hrefValue.includes('/contact')) { item.addEventListener('click', function(event) { handleClick(event); }); } } const mastheadItems = document.getElementsByTagName('c4d-masthead-contact'); for (let item of mastheadItems) { if (item.getAttribute('data-ibm-contact') === 'contact-link') { item.addEventListener('click', function(event) { handleClick(event); }); } } const includeTargetAttribute = "false"; if (includeTargetAttribute == 'true') { const leadspaceContainer = document.querySelector('div.leadspace-container'); if (leadspaceContainer) { leadspaceContainer.id = 'mbox-homepage-leadspace'; } } }); </script> <script type="text/javascript" src="/_PmBm/B/SB/vOol/MPkgtmUd/5rmOQhSJmhbrpi/PVQiZgE/c0tVa3hx/OjMB"></script><link rel="stylesheet" type="text/css" href="/_PmBm/B/SB/vOol/MPkgtmUd/D2mO/Q0x8ZQE/PhQrFy87/KhpZ"><script src="/_PmBm/B/SB/vOol/MPkgtmUd/D2mO/Q0x8ZQE/MQtZDyZk/B0cp" async defer></script><div id="sec-overlay" style="display:none;"><div id="sec-container"></div></div></body> </html>