IT security consulting

Deep expertise to build effective
and efficient security practices

At IBM, our IT Security Consulting practice partners with you to help build effective security programs that not only protect your infrastructure, but also enhance your business operations. Our 4,000+ dedicated security consultants have access to the world’s largest known database of threats. And they bring deep and broad industry expertise to the table, with an average of 10+ years of IT security consulting experience in disciplines including compliance, data protection, application services, risk management, identity and access management, cyber security, mobility, cloud, and incident planning and response.


Reduce risk
Find existing holes in your security strategy and learn how to better protect critical business assets


Mitigate threats
Limit the impact of security incidents through advanced preparation and incident response


Achieve compliance
Ensure your systems adhere to the latest government and industry specifications

What we offer

IBM’s IT Security Consulting is built around a highly-skilled team of security consultants that employ some of the most sophisticated tools in the industry. They make use of the latest threat intelligence and countermeasures to help you build effective, efficient security programs in the following areas:


Connect with an IBM IT security consultant

Tips and insights. No obligation. No strings attached.

Michael Montecillo

Managed Security Services Threat and Intelligence Principal

Michael Montecillo is the IBM Security Services Threat Research and Intelligence Principal. He has more than eight years of experience in information security, having served as a Vulnerability Management Coordinator and Forensic Investigator for state governments as well as the Principal Security Analyst for an industry analysis firm. As the Threat Research and Intelligence Principal within IBM Security Services he conducts research on emerging threat trends and works to ensure that client security needs are met with standard offerings. Michael has won two State Police awards for Professional Excellence and has published more than 30 research articles.

Read Mike's latest article:

Share us with your network
and start a conversation today

2014 Cost of Data Breach Study

2014 Cost of Data Breach Study

Industry-leading benchmarks from Ponemon Institute, sponsored by IBM.

Get the latest reports

  • Building a Security Operations Center

    Learn how to optimize your security intelligence to better safeguard your business from threats

  • Security incident response plan that actually works

    Top ten mistakes which security organizations make with their Computer Security Incident Response Plans.

  • Q2 2014 X-Force report

    Underestimating your security tactics? Attackers won't!


Latest news

IBM To Help Companies Implement New Cybersecurity Framework to Protect Nation's Critical Infrastructure

Cyber security by the numbers

See how cyber security events break down by industry and find out who's behind the majority of attacks.

Surviving the security skills crisis

Read Forrester Consulting's assessment of the current security skills landscape and how to overcome it.


Connect with IBM Security