Skip to main content
TrustRadius
IBM Security QRadar SOAR

IBM Security QRadar SOAR

Overview

What is IBM Security QRadar SOAR?

IBM Security® QRadar® SOAR is designed to help your security team respond to cyberthreats with confidence, automate with intelligence and collaborate with consistency. It guides your team in resolving incidents by codifying established incident response processes into dynamic playbooks.

Read more
Recent Reviews

Good SIEM

7 out of 10
September 27, 2023
Incentivized
We use IBM Security QRadar SOAR as our primary SIEM tool. We injust logs from various other system and tools to gather intelligence and …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is IBM Security QRadar SOAR?

IBM Security® QRadar® SOAR is designed to help your security team respond to cyberthreats with confidence, automate with intelligence and collaborate with consistency. It guides your team in resolving incidents by codifying established incident response processes into dynamic playbooks.

Entry-level set up fee?

  • No setup fee
For the latest information on pricing, visithttps://www.ibm.com/products/qradar…

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

22 people also want pricing

Alternatives Pricing

What is KnowBe4 PhishER?

PhishER is presented as a lightweight Security Orchestration, Automation and Response (SOAR) platform to orchestrate threat response and manage the high volume of potentially malicious email messages reported by users. And, with automatic prioritization of emails, PhishER helps InfoSec and Security…

Return to navigation

Product Demos

Accelerating Response Time with IBM Security QRadar

mediacenter.ibm.com

IBM Security QRadar SOAR demo

mediacenter.ibm.com
Return to navigation

Product Details

What is IBM Security QRadar SOAR?

IBM Security® QRadar® SOAR is designed to improve SOC efficiency and ensure users' response processes are met with an intelligent automation and orchestration solution, which timestamps key actions, aides threat investigation, and helps users manage their response to 180+ international privacy and data breach regulations. It features prebuilt connectors for a broad ecosystem of connectors, while managing the organization's response.

  • Respond and Remediate Faster – using open standards ingest alerts from disparate data sources into a unified dashboard for improved investigation and response across the security, IT and other key stakeholders.
  • Customized Case Management – pre-built playbooks that adapt to any unique business processes using customizable layouts and tailored response. This facilitates getting started quicker, reduces complexity, and helps improve the incident response process.
  • Close the Skill Gap – create automations that bring together artifact correlation, threat enrichment, case investigation, and prioritization so analysts can process triaged cases faster. The playbook evolves as the investigation proceeds, with threat enrichment happening at each stage of the process.

IBM Security QRadar SOAR Features

  • Supported: Case management
  • Supported: Dynamic playbooks
  • Supported: Integrations out of the box
  • Supported: Deployment flexibility
  • Supported: Visual workflow
  • Supported: Privacy breach response
  • Supported: Automation

IBM Security QRadar SOAR Screenshots

Screenshot of the IBM Security QRadar SOAR Breach Response solution. The software helps customers manage more than 180 global privacy reporting regulations including GDPR.Screenshot of the Playbooks Landing page, that shows all active playbooks in a single view, including how many are actively running, disabled, or are in draft.Screenshot of IBM Security QRadar SOAR’s Playbook Designer canvas, designed to lower the barrier to entry necessary to build automations through a graphical interface.Screenshot of the Tasks view shows all response tasks, organized by phase, that have either completed or are set to be executed.Screenshot of Threat Investigator automatically correlates incident information, curating an incident timeline from start to finish, including related artifacts and MITRE ATT&CK mappings.

IBM Security QRadar SOAR Video

IBM Security QRadar SOAR Competitors

IBM Security QRadar SOAR Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows, Linux, Mac
Mobile ApplicationNo

Frequently Asked Questions

IBM Security® QRadar® SOAR is designed to help your security team respond to cyberthreats with confidence, automate with intelligence and collaborate with consistency. It guides your team in resolving incidents by codifying established incident response processes into dynamic playbooks.

Palo Alto Networks Cortex XSOAR, FortiSOAR, and Splunk SOAR are common alternatives for IBM Security QRadar SOAR.

The most common users of IBM Security QRadar SOAR are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(47)

Attribute Ratings

Reviews

(1-13 of 13)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
Our whole organization's security is managed by IBM Security QRadar SOAR, we have defined alerts within the application so whenever an alert is triggered, it automatically investigates the problem and provides us with a document containing the time and location where it happened and ip address and url if available and some few other data. And ever since we started using IBM Security QRadar SOAR, our organisation had a better ROI as unlike IBM SEIM, it not only raises an alert but also automatically starts the investigation process.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
IBM Security QRadar SOAR lets us enhance and manage our network security and it also requires less manual effort as most of the things are predefined and automated. It automatically checks for updates every hour and updates their virus and malware database frequently and makes sure that you're getting the latest protection. It also constantly scans your devices for any malicious emails, application or website that may inject malicious code on your device and automatically quarantines it or deletes it depending on your predefined rules.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We are using the solution for network & security needs. For SOC side, we use the power of IBM Security QRadar SOAR to enrich alerts, prioritize alerts and correlate incidents. This helps us present related alerts in a unified dashboard thus reduces noise and saves us time.
Other than presenting alerts, the automated playbooks approach to trigger actions regarding the output of the playbook, such as blocking an IP address on your DDoS device, quarantining a file hash on your firewall or your ips device, blocking spam/malicious domains on your email security device and automating many of the daily tasks to ensure and enhance security has never been easier.
The most important issue at anywhere is manpower at the moment and with IBM Security QRadar SOAR, while we reduce MTTR to alerts, we also reduced the required manpower and manual labor which is a win-win on the long run.
Score 3 out of 10
Vetted Review
Verified User
Incentivized
We use IBM Security QRadar SOAR to automate our process the incident response, so when the incident is generated on our SIEM IBM QRADAR, the SOAR collect the informations from offense and populate in an incident case, allow us to attach many artifacts to enrich our investigations and provide better visibility.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
I use IBM Security QRadar SOAR to protect my company from computer scans and security. I have a great sense of security without cyber crimes and scans. I would not want to operate without having this protection backing me. I am able to show others the benefits of having it and it is an easy sell.
Score 4 out of 10
Vetted Review
Verified User
Incentivized
QRadar SOAR is mainly used for incident response and rapid threat detection. When an alert is triggered by any of our security systems, the data is integrated and aggregated and then sent to Qradar SOAR. It then initiates predefined actions, such as notifying our security team of the threat. Unfortunately, the automation mechanisms lack maturity and are not stable. Therefore, the solution is only suitable for collaboration and security event management.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use IBM Security QRadar SOAR for automating regular security analyst tasks and reducing the time to triage and respond to detection alarms for security events of critical or high risk category. By implementing playbooks on IBM QRadar SOAR, we are able to put into action the corrective and preventative security controls across different tools with the click of a button.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
QRadar SOR is primarily employed in our construction company to enhance our incident response capabilities and detect threats promptly. When an alert is triggered by any of our security systems, the platform automatically correlates data from multiple sources to asses the severity and validity of the alerts. It the initiates predefined response actions, such as isolating affected systems, notifying our security team containing the threat.
September 27, 2023

Good SIEM

Score 7 out of 10
Vetted Review
Verified User
Incentivized
We use IBM Security QRadar SOAR as our primary SIEM tool. We injust logs from various other system and tools to gather intelligence and custom alerting. We use an MSSP service to leverage this data for threat intelligence and hunting.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
IBM Security Qradar SOAR has greatly helped the Information Security team to automate many actions such as automatic blocking of IPs, users, etc.Today SOAR is our main Information Security tool as it is integrated with other security toolsof the environment. Today all decision-making is carried out through SOAR.We use SOAR from the initial handling of an incident to the containment and recovery process.All SOC actions are documented and audited within SOAR.
Score 7 out of 10
Vetted Review
Verified User
Incentivized
We were already using the IBM cloud storage suite and so engaging their SOAR presented a couple of perks for us. We've been using IBM SOAR to automate our network security. With the great increase in online purchases, necessitated resilient security to address cybersecurity and what better way than with automated Security response software.
stephanie baker | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We have deployed IBM resilient SOAR to ensure optimum security in our network and systems. It has a robust capability to detect camouflaged threats easily and rapidly. It identifies threats in order of how much damage a threat can cause to our systems. Its AI-powered threat intelligence tracks the most consequential threats. Once a threat has been picked out, it provides automated cognizance of the root cause. It has been helpful in making sure we have a smooth workflow through its instant alerts whenever a threat is detected.
Gokul Karuppiah | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
In our organization (Healthcare Recovery Department) we have been using this application for the past two years. Ee replaced a tool called HPBSM which creates the incidence when the application is having an outage. To Replace the HPBSM we came to the tool of IBM Resilient Incident Response. IBM Resilient is used in our recovery application which is created in the net for increasing/classifying the severities of incidents and notifying IT in the event of an outage or cyber attacks caused. lt is also used by the IT team to classify the incidents and take measurable action on time when threats or outages happen.
Return to navigation