Skip to main content
TrustRadius
IBM Security QRadar SIEM

IBM Security QRadar SIEM

Overview

What is IBM Security QRadar SIEM?

IBM Security QRadar is security information and event management (SIEM) Software.

Read more
Recent Reviews

QRadar review.

8 out of 10
March 31, 2024
Incentivized
We have used IBM Security QRadar SIEM to provide security to our costumers (B2B) and also for our own corporate security. IBM Securty …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Popular Features

View all 13 features
  • Rules-based and algorithmic detection thresholds (40)
    9.2
    92%
  • Correlation (60)
    8.9
    89%
  • Integration with Identity and Access Management Tools (56)
    8.4
    84%
  • Custom dashboards and workspaces (60)
    7.6
    76%

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is IBM Security QRadar SIEM?

IBM Security QRadar is security information and event management (SIEM) Software.

Entry-level set up fee?

  • No setup fee
For the latest information on pricing, visithttps://www.ibm.com/products/qradar…

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

11 people also want pricing

Alternatives Pricing

What is Microsoft Sentinel?

Microsoft Sentinel (formerly Azure Sentinel) is designed as a birds-eye view across the enterprise. It is presented as a security information and event management (SIEM) solution for proactive threat detection, investigation, and response.

Return to navigation

Features

Security Information and Event Management (SIEM)

Security Information and Event Management is a category of security software that allows security analysts to look at a more comprehensive view of security logs and events than would be possible by looking at the log files of individual, point security tools

8.7
Avg 7.8
Return to navigation

Product Details

What is IBM Security QRadar SIEM?

IBM QRadar SIEM helps users to remediate threats faster by prioritizing high-fidelity alerts to help catch threats.

QRadar analytics monitor threat intel, network and user behavior anomalies to prioritize where immediate attention and remediation is needed. When threat actors trigger multiple detection analytics, move across the network or change their behaviors, QRadar SIEM will track each tactic and technique being used. More important, it will correlate, track and identify related activities throughout a kill chain, with a single high-fidelity case, automatically prioritized for the user.


https://ibm.biz/QRadar_SIEM_product_page



IBM Security QRadar SIEM Features

Security Information and Event Management (SIEM) Features

  • Supported: Correlation
  • Supported: Integration with Identity and Access Management Tools
  • Supported: Custom dashboards and workspaces
  • Supported: Behavioral analytics and baselining
  • Supported: Rules-based and algorithmic detection thresholds
  • Supported: Reporting and compliance management

Additional Features

  • Supported: Open architecture to deploy on premises, on cloud, or as a service.
  • Supported: Investigation speed faster with automated triage and contextual intelligence
  • Supported: Better visibility by removing silos and unifying input and shared insights
  • Supported: Integrates with existing tools to leave data where it is and leveraging current environment.

IBM Security QRadar SIEM Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

IBM Security QRadar is security information and event management (SIEM) Software.

Microsoft Sentinel, Splunk Enterprise Security (ES), and LogRhythm NextGen SIEM Platform are common alternatives for IBM Security QRadar SIEM.

Reviewers rate Centralized event and log data collection highest, with a score of 9.9.

The most common users of IBM Security QRadar SIEM are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(258)

Attribute Ratings

Reviews

(1-25 of 81)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Group the different events that generated it in the name of the offense
  • Receive email alerts
  • Always report errors on the main page
  • Have an easy to understand interface for creating rules
  • Have the parsing of all sources
  • Frequent updating of log source parsing
  • Better breadth in the editing of reports
Saulo Prado | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • correlation events
  • search events timing
  • friendly managed rules
  • capability integration vendors
  • service support
  • Improvement in the process of consuming virtual machine resources
  • improvement in the process of analyzing errors and warnings generated by the system
March 31, 2024

QRadar Pluxee Review

Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Monitor IAM users activity
  • Correlate logs from different sources to detect security deviations
  • The search engine is very usefull to perform event deep analisys
  • Flexibility to create complex use cases in a easy and simple way
  • The report tool could be more flexible
  • Would be nice if IBM Security Qradar SIEM provided use case recommendations based on the received logs
  • Would be nice to have integrations with ITSM tools like Jira so offenses could turn in to incidents
March 31, 2024

QRadar review.

Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Correlation rules
  • Events Parsing
  • Reports
  • Integrated apps
  • Customizations (Rules, reports, parsed fields, DSM...)
  • Multi-Tenancy
  • SaaS performance and availability
  • More data on automatic reports
  • More DSMs (Some new technologies misses DSM, such as Senhasegura for example)
  • Dashboards improvement (through QRadar itself or Pulse)
  • More API customization options
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • The interface in general is clean and complete.
  • There is a satisfactory number of plugins approved for integrations with other vendors. Through DSM Universal, we have the possibility of integrating with any other solution that has these resources (information collection through API).
  • With the UBA feature, we get an excellent behavioral view of the end user.
  • A greater number of DSMs available.
  • The frequency of available updates, I know that in some cases this is good, but when we have a large environment, IBM Security QRadar SIEM upgrades take hours to complete and I see that we always have unnecessary bugs in each version. Not that this interrupts the service, but it is somewhat annoying.
  • Support for third-party applications, IBM is not responsible for the third-party applications that run in its environment, so when we have a problem, we need to contact the suppliers. This is something that I believe should improve, since IBM approves all applications and makes it available in its store, so this "between manufacturers" contact should be more direct between those responsible and not depend on customers.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Visibility to different log source types
  • Manipulation of use cases to make them conform to the need
  • Long time data correlation in real time
  • Visibility of custom searches in the profiles created for the reach of all users
  • Integration to cloud services
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • We are monitoring connections from/to the TOR Nodes to detect hidden malware.
  • We are monitoring users' password compromises by typing their password in the login box. Also, we send users notifications to change their passwords immediately.
  • We are monitoring bad HTTP(S) queries to our www sites from external agents and we are blocking bad IP addresses on our perimeter IPS Devices in real-time.
  • Improve the assets management tab as it has poor functionality.
  • Add more options and tests for creating rules and building blocks.
  • Add more options in the rules response tab to use multiple scripts and alerts.
January 03, 2024

IBM Qradar Review

Umair Javed | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • payload done great job to understand the events
  • the extension integrated in SIEM helps alot
  • offence investigation in siem much easier
  • things where i am facing issue is regex langue.
  • making rules and under standing logic also a difficult task
  • integration of any log source need to done in much easier way
Brandon Lowry | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Enables identification and prioritization of vulnerabilities in IT infrastructure for corrective action.
  • Facilitates security incident investigation and forensic analysis.
  • Provides a real-time view of security events, enabling immediate incident response.
  • Can integrate with external threat intelligence sources to enrich data and improve threat detection.
  • Enables the generation of detailed and customized reports.
  • It can be complex to use at first, requiring time and training to take full advantage of its capabilities.
  • Implementation requires significant hardware infrastructure and resources, which can be costly for some organizations.
Paige Jenkins | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Automation capability and control.
  • Supply of information in real time.
  • Server attacks are protected.
  • Excellence technical support.
  • Easy to run.
  • The capacity of tables and graphs should be improved to keep all job environments safe, so those graphs are somewhat uncomfortable for newbies.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Excellent user interface.
  • Threat-specific reports.
  • It was characterized by being customizable.
  • Integration with IBM log data.
  • It keeps track of the system to achieve the best security, always with the best tools.
  • Data analysis from other software is quick and easy.
Abhishek Kumar | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Log and Event Monitoring
  • open Architecture to integrate with other software's
  • Automate Report
  • Sometime its lag and slow Working
  • Deployment is slow
  • automatic Offences are not updated need to manual.
  • No alarm system for offences
Score 7 out of 10
Vetted Review
Verified User
Incentivized
  • It is really simple to integrate different technologies because we have to correlate it and if it is difficult to integrate sources, I won't be able to do my job. So one of the best things is the way it integrates with different vendors so it's easy for us to deploy.
  • This product can do better in a lot of things. First, better integrating machine learning and artificial intelligence so all the logs can be integrated and can show threats besides the threats that we program. If we don't program a threat, the tool is not going to show me anything. We have to program it. But there are new technologies like artificial intelligence that could make this for us so we can have more visibility of threats. Right now they don't have these capabilities and there are other products that are incorporating these capabilities.
Piyush Mittal | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Provides alerts in real time with less false positives.
  • Prioritise the high severity alerts so that analyst can focus on severe ones.
  • Identify external as well as internal attacks and risky user behavior
  • Also comes as SAAS software
  • Collecting logs from windows is somewhat painful
  • Scope for improvement in user interface
  • It ia very costly product which could be reduced.
Score 8 out of 10
Vetted Review
Verified User
  • We can forward all types of logs ex. events log, System log etc to QRADAR
  • We can customize Qradar console according to our requirement.
  • We can user Rsyslog protocol to forward logs.
  • We can download all customize report according to requirement.
  • Sometime passwordless communication getting failed from Qradar EC to Console.
  • Event processor is require to process logs which is again license base.
  • Save search option sometimes not working properly may be because of version bug.
Stephan van der Merwe | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Ingest data from multiple sources
  • Machine Learning helps analyze User behavior for possible insider threats
  • Able to import Threat Intelligence via XForce
  • Sometimes you can get lost in the large volume of data.
August 10, 2023

Goes above and beyond

Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Collecting data from logs
  • Identifying threats
  • Rapid processing speed
  • Sometimes poor technical support
  • Search queries do not always go as planned
  • Asset management can seem somewhat disorganized at times
August 09, 2023

User friendly Qradar

Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Use case creation is user freindly
  • Grouping of log source makes easy to segregate devices
  • Parsing is very easy to handle.
  • Alert management dashboard to find previous alerts
Return to navigation