IBM Security announced Monday (Jan. 23) it is acquiring Agile 3 Solutions, a developer of software used by the C-suite and senior executives to better visualize, understand and manage risks associated with the protection of sensitive data.
In a press release, IBM said the addition of Agile 3 Solutions’ capabilities to IBM Security’s portfolio adds a tool to improve C-suite decision-making as businesses prepare to defend themselves against cybercrime. “After thousands of client engagements, we’ve seen security move from the back office to the front office and, now, to the board room,” said Marc van Zadelhoff, general manager of IBM Security, in the press release announcing the deal. “Adding Agile 3 Solutions to the IBM Security immune system of capabilities gives our team the ability to not only protect critical data but demonstrate why it is at risk and how to remediate that risk. Knowing what your crown jewel data is, and understanding its susceptibility to exploitation via external or insider threats, is an imperative for any organization.”
According to IBM, cybersecurity has become a board-level issue, and as a result, there is an increasing need for the C-suite and the board to understand their security stance through the lens of business risk, not just the technical security data and metrics lenses. Business leaders have to equip themselves to make risk-based decisions and prioritize investments toward cybersecurity readiness and resilience. IBM pointed to Gartner, which predicted that, by 2017, 80 percent of IT risk and security organizations will report metrics to non-IT executive decision-makers, but only 20 percent will be considered useful.
“Having worked closely with IBM Security as a business partner, our team is excited by the opportunity to join the leader in enterprise security,” said Raghu Varadan, founder and CEO of Agile 3 Solutions, in the same press release. “Our mission has been to bring the C-suite into the security decision-making process on their terms. Now, with IBM Security, we’re bringing together the ability to not only influence decisions but to take action to protect business-critical data.”