IBM X Force Exchange is a collaborative threat intelligence platform that helps organizations identify and respond to cyber threats effectively.
Enhance your security operations with AI agents that can automatically analyze threats and orchestrate responses.



IBM X Force Exchange delivers comprehensive threat intelligence and security insights. Relevance AI transforms this intelligence into automated actions through AI agents that can detect, analyze and respond to security threats.
Rapid Threat Mitigation
The agent can swiftly respond to threats, minimizing potential damage.
Proactive Vulnerability Insights
Continuous monitoring allows the agent to identify and address vulnerabilities before exploitation.
Enhanced Decision-Making
The agent leverages real-time intelligence to inform security strategies and actions.
Relevance AI gives you access to IBM X Force Exchange's threat intelligence capabilities within your AI agent workflows.
What you’ll need
You don't need to be a developer to set up this integration. Follow this simple guide to get started:
- An IBM X-Force Exchange account
- A Relevance AI account with API access enabled
- Authorization credentials (secured via OAuth authentication)
Security & Reliability
The integration leverages IBM X-Force Exchange's secure OAuth authentication, ensuring authorized access to threat intelligence data. Relevance AI manages API operations seamlessly in the background—handling authentication headers, request formatting, and response parsing automatically.
Built-in data validation and standardization ensure consistent threat intelligence processing across your security workflows.
No training on your data
Your data remains private and is never utilized for model training purposes.
Security first
We never store anything we don’t need to. The inputs or outputs of your tools are never stored.

Best Practices for Non-Technical Users
To get the most out of the IBM X-Force Exchange + Relevance AI integration without writing code:
- Use proper authentication: Ensure your API credentials are correctly configured and securely stored.
- Structure your queries: Format API requests with specific indicators and clear parameters.
- Leverage threat intelligence: Focus on relevant threat data types for your security analysis needs.
- Monitor rate limits: Stay within API usage limits to maintain consistent data flow.
- Validate responses: Check response status codes and data formats before processing results.