Try our new research platform with insights from 80,000+ expert users
IBM X-Force Exchange Logo

IBM X-Force Exchange Reviews

Vendor: IBM
4.1 out of 5

What is IBM X-Force Exchange?

Featured IBM X-Force Exchange reviews

IBM X-Force Exchange mindshare

As of September 2025, the mindshare of IBM X-Force Exchange in the Threat Intelligence Platforms category stands at 1.5%, down from 2.0% compared to the previous year, according to calculations based on PeerSpot user engagement data.
Threat Intelligence Platforms Market Share Distribution
ProductMarket Share (%)
IBM X-Force Exchange1.5%
Recorded Future14.8%
CrowdStrike Falcon8.7%
Other75.0%
Threat Intelligence Platforms
 
 
Key learnings from peers

Valuable Features

Room for Improvement

ROI

Pricing

Popular Use Cases

Service and Support

Deployment

Scalability

Stability

Top industries

By visitors reading reviews
Financial Services Firm
20%
Computer Software Company
13%
University
7%
Educational Organization
7%
Manufacturing Company
5%
Retailer
4%
Comms Service Provider
4%
Non Tech Company
4%
Wholesaler/Distributor
3%
Healthcare Company
3%
Hospitality Company
3%
Logistics Company
3%
Performing Arts
3%
Real Estate/Law Firm
3%
Insurance Company
2%
Non Profit
2%
Outsourcing Company
2%
Renewables & Environment Company
2%
Government
2%
Legal Firm
2%
Media Company
2%
Pharma/Biotech Company
2%
Construction Company
2%
Consumer Goods Company
1%
Engineering Company
1%
Leisure / Travel Company
1%
Recreational Facilities/Services Company
1%
 
IBM X-Force Exchange Reviews Summary
Author infoRatingReview Summary
IT Infrastructure Security Lead at South Consult4.0No summary available
Solutions Architect at ostec4.5I use IBM X-Force Exchange as a threat intelligence platform to boost our security solutions. Despite its high cost, it significantly enhances analytical richness and reduces detection time by 30%. I haven't considered or used other solutions.
Sales leader at EFH4.5We primarily use IBM X-Force Exchange for threat intelligence, benefiting from expert human involvement. However, better integration with other systems and vendors is needed.
Director Cyber Security at a consultancy3.5No summary available