security Last month, IBM announced the creation of a security “tiger team” with limited detail on the team itself, its role, or its makeup. I decided to ask IBM for a bit more specifics and I’m glad I did as I came away quite impressed.To summarize, the security tiger team was created to:1. Articulate and sell IBM security solutions to “C-level” executives. In other words, align security solutions to business initiatives.2. Cut across IBM brands. Tiger team members have deep knowledge of IBM security solutions from ISS, Rational, Tivoli, Websphere, etc. The focus is on customer needs rather than internal IBM organizational boundaries.3. Act as security advocates within IBM. Aside from the external focus, the tiger team will act as the security-focused “voice of the customer” back to IBM. This should help IBM get creative with vertical solutions and new product development.The tiger team will also work with IBM security partners such as Application Security Inc. and PGP. I’ve been astounded for years at the tactical nature of security vendors. Most sell products as countermeasures for particular threats but they don’t understand the “big picture.” CEOs don’t care about firewalls and IDS, they want to make sure that their business processes are secure and meet regulatory requirements. IBM’s tiger team not only recognizes — and addresses — this fact.Who else could pull off a similar tiger team? Few vendors come to mind. Systems integrators like Accenture and federal government specialists like SAIC could. HP and Symantec could. McAfee? Check Point? I don’t think so. IBM’s tiger team may be a subtle organizational move, but other security vendors should pay keen attention to it. If IBM can sell “top down” security solutions, it could marginalize the multitude of tactical security vendors hawking point products. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe