Address: IBM UK Ltd
PO Box 41
North Harbour
11501 Burnet Road
Building 905
Floor 5, B18
Texas TX78758
IBM Singapore Pte Ltd
7 Changi Business Park
IBM Place
486072 Singapore
Telephone: 44 (0)23 9256 1000 +61 3 8531 7324
Email: [email protected] [email protected] [email protected]
Contact: Brian McGlone Chris Thompson Kamal Parmar
Address: IBM Australia Ltd
60 City Road
VIC 3006
IBM Middle East Fz.LLC
Dubai Internet City
IBM Building, 3rd Level
PO Box 27242
United Arab Emirates
Telephone: +61 3 8531 7324
Email: [email protected]
Contact: Kamal Parmar

IBM is the world’s largest IT and consulting services company with a proud history of technical innovation and leadership building on over a century of research and development.  IBM seeks to shape the future of our industry through prized research, development and technical talent around the world.


Penetration Testing

Contact: Brian McGlone
+44 (0)7764 290413
[email protected]

At IBM, penetration testing is just one of many security services that we offer.  We monitor, in real-time, some of the most complex networks in the world.  IBM also develops some of the most sophisticated testing tools in the industry, which are used by our competitors.  Teams of highly skilled security professionals identify and analyse new threats, often found and released to our clients before they are known to the public.  IBM maintains the largest database of known cyber security threats in the world.

CREST Qualified Consultants:
Practitioner Security Analysts:  Yes
Registered Penetration Testers:  Yes
Certified Web Application Testers:  No
Certified Infrastructure Testers:  Yes
Certified Wireless Testers:  No

Cyber Security Incident Response

Contact: Andy Settle
[email protected]

IBM’s Cyber Security Assessment and Response team provides technical assessments and incident response within the UKI jurisdiction.  This includes discovery, vulnerability assessment and penetration testing services for the purposes of modelling of information security threats, alongside investigative and forensic services in support of incident recovery.

The overriding purpose of the CSAR team is to provide customers with am empirical view of the threats they face, determined through a course of technical assessment activities.

CREST Qualified Consultants:
Practitioner Intrusion Analysts:  No
Registered Intrusion Analysts:  Yes
Certified Network Intrusion Analysts:  No
Certified Host Intrusion Analysts:  No
Certified Malware Reverse Engineers:  No
Certified Incident Managers:  No

Simulated Target Attack & Response (STAR) Threat Intelligence

CREST Qualified Consultants:
Registered Threat Intelligence Analysts:  Yes

Cyber Essentials

To find out more about our Cyber Essentials service, please click here.