To more closely align with the way clients think about security, IBM Security is focused on providing an open security immune system that enables organizations to integrate and leverage the investments they have already made within their specific industry.

Experts Discuss the Benefits of an Industry-Focused Security Strategy

We consulted six experts from the IBM Security team about the value of an industry-focused approach to security. Here’s what they had to say about aligning security solutions and strategies with industry-specific needs.

What trends influenced IBM to move to an industry-focused approach?

Jim Brennan, vice president of strategy and offering management: As clients are increasingly using technology to differentiate themselves from their competitors, security is becoming a critical determinant of the overall resilience of their businesses. As such, they are looking for security solutions that map more directly to the specific requirements of their industry. IBM Security has had a focus on integrated security solutions since its inception, and moving toward a more industry-centric approach allows us to better meet the needs of these clients.

Salwa Rafee, global security sales and business leader, health care and life sciences: Within the health care industry, the increased focus on the importance of cybersecurity has created a more holistic approach to address the industry’s key pain points. IBM Security has designed a health care security immune system to address these specific industry concerns and map with integrated services and products to prevent, detect and respond to cyberattacks in health care. It takes intelligence and precision to stop cyberattacks and unknown threats, and siloed solutions fragment those defenses.

Are IBM’s clients contributing to the industry conversation, the solution offerings, etc.? In other words, are we asking our customers what they need and then providing it within the industry lens?

Brennan: In general, we work very closely with our clients in order to determine the types of solutions that will best meet their requirements. In the case of industry-specific needs, our approach has been to work with clients to identify the use cases that are unique to their industries. These use cases often result in specific features or offerings.

Gary Meshell, global security sales and business leader, financial services: One of the key areas that IBM is demonstrating its leadership is in the area of hybrid cloud security, where we are looking to establish an industry standard that all financial services sector (FSS) firms can adopt. To help demonstrate our leadership position, IBM has established an industry consortium with 20 financial services companies to establish a public cloud security standard whereby we are going to create a standard set of security frameworks and controls that can be utilized across any of the major public cloud providers (IBM, Azure and AWS).

Are there truly solution differentiators at the industry level, or are we force fitting offerings to meet current needs?

Brennan: Our focus on industry solutions is fairly new, so these differentiators are still being developed. But this focus is definitely having an impact early on in our offering creation process. One example of this is the Internet of Things (IoT). Rather than trying to boil the ocean when it comes to all of the different aspects of IoT, we are very much viewing it through the lens of specific industries and their needs, whether that be automotive, health care, retail, etc.

Kurt Riley, cybersecurity specialist: The noticeable difference between distribution and other verticals is that distribution companies often lack the resources in terms of people. Lots of distribution companies don’t have large IT departments and are far more interested in cloud-based or hybrid-type solutions because of this lack of resources. They want to consume services and not have to worry about managing IT departments or people.

Martin Borrett, chief technology officer (CTO), IBM Security Europe: Automotive security presents an interesting challenge, since cars have effectively become small data centers on wheels. We are leveraging IBM Security Research to develop and prototype the next generation of intrusion prevention systems (IPS) and security intelligence capabilities for cars, and discussing these innovations with clients across the automotive industry to capture mindshare as we develop these new solutions.

How does IBM stand out from all the other security offerings geared toward industries?

Brennan: IBM Security has the broadest and deepest security portfolio in the market. This allows us to bring a wide range of solutions and expertise to meet the challenges faced by any type of organization. Additionally, being part of IBM provides us with industry-specific expertise and relationships. Together, this affords us a tremendous advantage over other security vendors.

Marcel Kisch, global security sales and business leader, energy and utilities: IBM Security offers broad coverage for our energy and utilities clients with consulting services, technology and managed security services. This allows flexibility based on the individual client’s security strategy, needs and capabilities. Regulations always require a specific set of controls and cover all three: processes, roles and technology. We guide clients through security requirements. Depending on the client’s situation, we identify control gaps, provide good security practices, and implement and manage security technology on behalf of the client. This not only covers corporate networks — IBM builds an increasing footprint into operation technology protection. IBM’s end-to-end security coverage is a significant advantage for our clients.

IBM Security provides fast, integrated and efficient solutions for your industry — Learn More

More from Security Services

How I got started: Attack surface management

4 min read - As the threat landscape multiplies in sophistication and complexity, new roles in cybersecurity are presenting themselves more frequently than ever before. For example, attack surface management. These cybersecurity professionals are responsible for identifying, mapping and securing all external digital assets an organization owns or is connected to. This includes servers, domains, cloud assets and any other digital points that could be exploited by cyber criminals. Their role involves continuously monitoring these assets for vulnerabilities, misconfigurations or other potential security risks…

X-Force uncovers global NetScaler Gateway credential harvesting campaign

6 min read - This post was made possible through the contributions of Bastien Lardy, Sebastiano Marinaccio and Ruben Castillo. In September of 2023, X-Force uncovered a campaign where attackers were exploiting the vulnerability identified in CVE-2023-3519 to attack unpatched NetScaler Gateways to insert a malicious script into the HTML content of the authentication web page to capture user credentials. The campaign is another example of increased interest from cyber criminals in credentials. The 2023 X-Force cloud threat report found that 67% of cloud-related…

Does your security program suffer from piecemeal detection and response?

4 min read - Piecemeal Detection and Response (PDR) can manifest in various ways. The most common symptoms of PDR include: Multiple security information and event management (SIEM) tools (e.g., one on-premise and one in the cloud) Spending too much time or energy on integrating detection systems An underperforming security orchestration, automation and response (SOAR) system Only capable of taking automated responses on the endpoint Anomaly detection in silos (e.g., network separate from identity) If any of these symptoms resonate with your organization, it's…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today