Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    IBM Acquires Agile 3 Solutions to Improve Risk Management Capabilities

    Written by

    Sean Michael Kerner
    Published January 23, 2017
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      IBM announced on Jan. 23 its intent to acquire privately-held Agile 3 Solutions in an effort to further improve IBM Security’s risk management capabilities. Financial terms of the deal are not being publicly disclosed.

      Agile 3 Solutions is an IT risk management vendor with several different products and services. Among Agile 3’s products is a service called Business Exposure and Risk Management (BERM), which aims to help provide visibility into potential security risks that could impact a business. The Business Program Management and Compliance (BPMC) service from Agile 3 provides a management dashboard for organizations to track metrics that are aligned with compliance efforts. The Agile 3 Business GRC: iDNA is a platform that helps organizations to map potential threats against business assets.

      Gregg Barrow, Partner, Global Competency Leader, Data and Application Security Services at IBM Security, explained that Agile 3 Solutions provides specific technology that is able to harvest information about risks and exposures to sensitive data across an organization. He noted that in addition to collecting and analyzing business risk information, the Agile 3 technology provides an intuitive, graphical user dashboard that is designed specifically for executive-level use.

      “The Agile 3 dashboard provides Line of Business-level detail that helps executives understand what pieces of data are at risk, how significant the risk is, which Line of Business is responsible for the data, and more items,” Barrow told eWEEK. “Agile 3’s technology is able to collect its own business-level risk data and can also be fed data from data security and other products to collect, analyze and present a single business-level view of business risk to data.”

      While Agile 3 does provides capabilities that can fit into the Governance, Risk and Compliance (GRC) market, Barrow commented that Agile 3 does not directly compete with GRC tools. Rather he noted that Agile 3 is focused on providing a data security risk assessment of the enterprise data, how to remediate risk and communicate the risk posture to the business.

      “Agile 3 Solutions integrates with IBM Security Guardium capabilities to remediate data security concerns,” Barrow said.

      In terms of where the Agile 3 technology will fit into the IBM Security product portfolio, Barrow said that it will augment the existing data security capabilities from IBM Security Guardium and IBM Data and Application Security Services. He noted that Agile 3 recently partnered with the Guardium team to engage with clients, and jointly perform proof of concepts.

      “Agile 3 has the ability to apply its technology broadly across the IBM Security portfolio,” Barrow said. “In the coming months, IBM Security will be exploring ways to further integrate Agile 3 technology and leverage it across areas of the portfolio.”

      IBM calls its approach to layering and embedding security across an organization, the ‘security immune system.’ The basic idea is that by layering security across the entire ‘body’ of an organization, technology can fight threats in a way similar to how antibodies fight disease. The Agile 3 technology is set to become another element in the growing IBM security immune system.

      “By having a broad set of tightly integrated security capabilities woven throughout a company’s infrastructure, these systems can work together to proactive[ly] detect and combat various threats throughout the multiple stages of an attack’s lifecycle,” Barrow said.

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.