Skip to main content
TrustRadius
IBM Security QRadar SOAR

IBM Security QRadar SOAR

Overview

What is IBM Security QRadar SOAR?

IBM Security® QRadar® SOAR is designed to help your security team respond to cyberthreats with confidence, automate with intelligence and collaborate with consistency. It guides your team in resolving incidents by codifying established incident response processes into dynamic playbooks.

Read more
Recent Reviews

Good SIEM

7 out of 10
September 27, 2023
Incentivized
We use IBM Security QRadar SOAR as our primary SIEM tool. We injust logs from various other system and tools to gather intelligence and …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is IBM Security QRadar SOAR?

IBM Security® QRadar® SOAR is designed to help your security team respond to cyberthreats with confidence, automate with intelligence and collaborate with consistency. It guides your team in resolving incidents by codifying established incident response processes into dynamic playbooks.

Entry-level set up fee?

  • No setup fee
For the latest information on pricing, visithttps://www.ibm.com/products/qradar…

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

22 people also want pricing

Alternatives Pricing

What is KnowBe4 PhishER?

PhishER is presented as a lightweight Security Orchestration, Automation and Response (SOAR) platform to orchestrate threat response and manage the high volume of potentially malicious email messages reported by users. And, with automatic prioritization of emails, PhishER helps InfoSec and Security…

Return to navigation

Product Demos

Accelerating Response Time with IBM Security QRadar

mediacenter.ibm.com

IBM Security QRadar SOAR demo

mediacenter.ibm.com
Return to navigation

Product Details

What is IBM Security QRadar SOAR?

IBM Security® QRadar® SOAR is designed to improve SOC efficiency and ensure users' response processes are met with an intelligent automation and orchestration solution, which timestamps key actions, aides threat investigation, and helps users manage their response to 180+ international privacy and data breach regulations. It features prebuilt connectors for a broad ecosystem of connectors, while managing the organization's response.

  • Respond and Remediate Faster – using open standards ingest alerts from disparate data sources into a unified dashboard for improved investigation and response across the security, IT and other key stakeholders.
  • Customized Case Management – pre-built playbooks that adapt to any unique business processes using customizable layouts and tailored response. This facilitates getting started quicker, reduces complexity, and helps improve the incident response process.
  • Close the Skill Gap – create automations that bring together artifact correlation, threat enrichment, case investigation, and prioritization so analysts can process triaged cases faster. The playbook evolves as the investigation proceeds, with threat enrichment happening at each stage of the process.

IBM Security QRadar SOAR Features

  • Supported: Case management
  • Supported: Dynamic playbooks
  • Supported: Integrations out of the box
  • Supported: Deployment flexibility
  • Supported: Visual workflow
  • Supported: Privacy breach response
  • Supported: Automation

IBM Security QRadar SOAR Screenshots

Screenshot of the IBM Security QRadar SOAR Breach Response solution. The software helps customers manage more than 180 global privacy reporting regulations including GDPR.Screenshot of the Playbooks Landing page, that shows all active playbooks in a single view, including how many are actively running, disabled, or are in draft.Screenshot of IBM Security QRadar SOAR’s Playbook Designer canvas, designed to lower the barrier to entry necessary to build automations through a graphical interface.Screenshot of the Tasks view shows all response tasks, organized by phase, that have either completed or are set to be executed.Screenshot of Threat Investigator automatically correlates incident information, curating an incident timeline from start to finish, including related artifacts and MITRE ATT&CK mappings.

IBM Security QRadar SOAR Video

IBM Security QRadar SOAR Competitors

IBM Security QRadar SOAR Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows, Linux, Mac
Mobile ApplicationNo

Frequently Asked Questions

IBM Security® QRadar® SOAR is designed to help your security team respond to cyberthreats with confidence, automate with intelligence and collaborate with consistency. It guides your team in resolving incidents by codifying established incident response processes into dynamic playbooks.

Palo Alto Networks Cortex XSOAR, FortiSOAR, and Splunk SOAR are common alternatives for IBM Security QRadar SOAR.

The most common users of IBM Security QRadar SOAR are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(47)

Attribute Ratings

Reviews

(1-13 of 13)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
Our whole organization's security is managed by IBM Security QRadar SOAR, we have defined alerts within the application so whenever an alert is triggered, it automatically investigates the problem and provides us with a document containing the time and location where it happened and ip address and url if available and some few other data. And ever since we started using IBM Security QRadar SOAR, our organisation had a better ROI as unlike IBM SEIM, it not only raises an alert but also automatically starts the investigation process.
  • Have very good UI which makes defining alerts really easy.
  • Does not only raise an alert like IBM SEIM but also starts the investigation process.
  • Provides a detailed document after the investigation process for further analysis.
  • The document contains all the required data about the problem. Such as the time when it happed and the ip address related to it etc.
  • Not very stable and sometimes becomes unresponsive and requires a restart.
  • Customer support should be improved.
If your you're already using IBM products then I would suggest you to start using IBM Security QRadar SOAR as your primary security solution as it integrates well with other IBM products and if you're using IBM SEIM, then I would strongly suggest to switch to IBM Security QRadar SOAR as unlike IBM SEIM, it also automatically starts the investigation process and provides you with the result.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
IBM Security QRadar SOAR lets us enhance and manage our network security and it also requires less manual effort as most of the things are predefined and automated. It automatically checks for updates every hour and updates their virus and malware database frequently and makes sure that you're getting the latest protection. It also constantly scans your devices for any malicious emails, application or website that may inject malicious code on your device and automatically quarantines it or deletes it depending on your predefined rules.
  • Updates every hour making sure we get the latest protection.
  • Can set predefined rules to automate it.
  • Quick response time and protects us from malicious emails, applications and websites.
  • Can't run custom scripts.
  • The software license is very expensive.
It is a very powerful security solution that updates very frequently and has very few false positives. Though the license for the software is expensive but for such powerful security solution, the cost is justified.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We are using the solution for network & security needs. For SOC side, we use the power of IBM Security QRadar SOAR to enrich alerts, prioritize alerts and correlate incidents. This helps us present related alerts in a unified dashboard thus reduces noise and saves us time.
Other than presenting alerts, the automated playbooks approach to trigger actions regarding the output of the playbook, such as blocking an IP address on your DDoS device, quarantining a file hash on your firewall or your ips device, blocking spam/malicious domains on your email security device and automating many of the daily tasks to ensure and enhance security has never been easier.
The most important issue at anywhere is manpower at the moment and with IBM Security QRadar SOAR, while we reduce MTTR to alerts, we also reduced the required manpower and manual labor which is a win-win on the long run.
  • The solution is really easy to integrate with other technologies.
  • You can customize any kind of integration as long as you have the programming knowledge.
  • The platform has user-friendly interface and requires without extensive training.
  • There is a learning curve. Extensive training is not essential but some form of training is must have to use.
  • While python language is the solution to all automation needs, for a big company like IBM, I expect one out-of-box integration a day. Being able to do it, does not mean every customer around the world should write it from scratch. Application library is limited
  • The user interfaces and ease-of-use of the solution should evolve every day. It needs to become a solution where a newcomer to the solution can do nearly everything within 2 weeks, without relying on anyone or anything.
IBM Security QRadar SOAR is versatile. All the major players in SOAR field require the administrator to have coding experience but with IBM it is different. IBM's solution is a full-fledged automation solution, and not some threat-based or limited one. Meaning whatever comes to your mind, if you can write the code, you can do it. This goes from daily tasks from SOC to daily tasks of your network or security administrator or any other administrator. You can manage your ITSM solution if you want to, IBM is a playground and there is much to discover in its capabilities.
If you do not have the knowledge or if you want a SOC/Threat Based SOAR solution, meaning you want automation but you want it to be limited to an area and out-of-box, you may choose other alternatives.
Score 3 out of 10
Vetted Review
Verified User
Incentivized
We use IBM Security QRadar SOAR to automate our process the incident response, so when the incident is generated on our SIEM IBM QRADAR, the SOAR collect the informations from offense and populate in an incident case, allow us to attach many artifacts to enrich our investigations and provide better visibility.
  • enrich events
  • triage incidents
  • many ways to automations
  • Improving support to shell script
  • Improving stability
  • Improving support a Trend Micro XDR to contain threats
We experience many errors or bugs during trying to integrate our apps with IBM Security QRadar SOAR .
Score 8 out of 10
Vetted Review
Verified User
Incentivized
I use IBM Security QRadar SOAR to protect my company from computer scans and security. I have a great sense of security without cyber crimes and scans. I would not want to operate without having this protection backing me. I am able to show others the benefits of having it and it is an easy sell.
  • User-friendly
  • Easy to manage users
  • Easily understood interface
  • Easier training for new users
I would scan all incoming emails and links. Everyone would be able to scan items on their computers before opening them. If there is a threat, it is easily managed by the features.
Score 4 out of 10
Vetted Review
Verified User
Incentivized
QRadar SOAR is mainly used for incident response and rapid threat detection. When an alert is triggered by any of our security systems, the data is integrated and aggregated and then sent to Qradar SOAR. It then initiates predefined actions, such as notifying our security team of the threat. Unfortunately, the automation mechanisms lack maturity and are not stable. Therefore, the solution is only suitable for collaboration and security event management.
  • Manual Incident Management.
  • Security mechanisms are at a high level.
  • Interface clarity.
  • You still have to generate reports manually. Reports are very limited and practically not useful.
  • The solution should not be SOAR class. Automations usually don't work. It's apparent that it's not designed for that.
  • Lack of flexibility.
  • Practically no support. The reported integration problems have not been resolved.
IBM QRadar SOAR is a very good solution for collaborating on security events. Quite a few companies will be happy with such a tool. Good default settings. Clear interface. Great granularity of user permissions. Unfortunately, it is not suitable as a SOAR-class solution. As an incident management system, it meets most of the requirements.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use IBM Security QRadar SOAR for automating regular security analyst tasks and reducing the time to triage and respond to detection alarms for security events of critical or high risk category. By implementing playbooks on IBM QRadar SOAR, we are able to put into action the corrective and preventative security controls across different tools with the click of a button.
  • Security Automation
  • Reducing mean time to respond (MTTR)
  • Integration with security tooling and controls
  • Lower false positive rate
  • Training and support
  • Onboarding security tools and applications directly on the portal
  • Total cost of ownership for the organization
IBM Security QRadar SOAR is particularly useful in guarding againt a phishing event. When a malware downloaded via a phishing email was detected, IBM Security QRadar SOAR was able to automate a response by isolating the infected device, blocking the malicious URL and removing the emails from all the user inbox based on hash signatures identified as attachment.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
QRadar SOR is primarily employed in our construction company to enhance our incident response capabilities and detect threats promptly. When an alert is triggered by any of our security systems, the platform automatically correlates data from multiple sources to asses the severity and validity of the alerts. It the initiates predefined response actions, such as isolating affected systems, notifying our security team containing the threat.
  • QRadar's ability to collect, analyze and normalize vast amount of security data from various sources is remarkable.
  • QRadar allows us to define and automate incident response playbooks which have been amazing for streamlining the response to security incidents.
  • It offers and extensive library of pre-built connectors and support for common security standards facilitating seamless integration with a wide range of security tools.
  • Although QRadar offers reporting capabilities, building custom reports can be challenging for non-technical users. A more user-friendly report builder with predefined templates could make this process more accessible.
A malware outbreak occurred in one of our construction site servers. IBM Security QRadar SOAR not only detected the malware but also orchestrated a response. It quarantined the infected server, initiated a scan and cleanup, informed the IT team and ensured compliance checks were run before restoring the server to the network. I would recommend QRadar to all industries looking to better their security posture.
September 27, 2023

Good SIEM

Score 7 out of 10
Vetted Review
Verified User
Incentivized
We use IBM Security QRadar SOAR as our primary SIEM tool. We injust logs from various other system and tools to gather intelligence and custom alerting. We use an MSSP service to leverage this data for threat intelligence and hunting.
  • Lots of data sources able to injest
  • Customizable alerting
  • Threat hunting
  • Not great reports.
  • Context around some built in alerting
  • Slow interface
I think it is great for monitoring log source across environment. Good for threat hunting and alerting. Good to leverage data for MSSP services.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
IBM Security Qradar SOAR has greatly helped the Information Security team to automate many actions such as automatic blocking of IPs, users, etc.Today SOAR is our main Information Security tool as it is integrated with other security toolsof the environment. Today all decision-making is carried out through SOAR.We use SOAR from the initial handling of an incident to the containment and recovery process.All SOC actions are documented and audited within SOAR.
  • Integration with many third-party tools
  • Automatic contentions of IPs, users and others
  • Stable system with no downtime
  • Have an external database to improve search and backup performance
IBM SOAR is highly recommended for Information Security teams that are small and want to have a quick response to incidents in a secure and audited way. It is a flexible and highly customizable tool.It is possible to create different playbooks and it has a very intuitive console. There are many applications for SOAR that make it easy to deploy for integration with third-party tools, thus helping to facilitate automation.
Score 7 out of 10
Vetted Review
Verified User
Incentivized
We were already using the IBM cloud storage suite and so engaging their SOAR presented a couple of perks for us. We've been using IBM SOAR to automate our network security. With the great increase in online purchases, necessitated resilient security to address cybersecurity and what better way than with automated Security response software.
  • It uses AI to automate security responses with incredible consistency.
  • It sends timely notifications to the entire team
  • It has a malware analysis feature which is critical when the sandbox has been compromised.
  • You still have to generate reports manually, it would be much better if it was possible to automatically schedule them for exportation.
  • It takes time to successfully deploy integrations.
We've been able to achieve airtight cybersecurity and secure data encryption with IBM SOAR (thanks to the robust in-platform capabilities). The playbooks having been properly documented with little input required to codify processes. The SOAR is agile enough to handle breaches, sending alerts to the investigative team as they happen and in real time.
It however sends plenty of false alerts, this was after we integrated it with a security deception software.
stephanie baker | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We have deployed IBM resilient SOAR to ensure optimum security in our network and systems. It has a robust capability to detect camouflaged threats easily and rapidly. It identifies threats in order of how much damage a threat can cause to our systems. Its AI-powered threat intelligence tracks the most consequential threats. Once a threat has been picked out, it provides automated cognizance of the root cause. It has been helpful in making sure we have a smooth workflow through its instant alerts whenever a threat is detected.
  • It provides great monitoring capabilities that can easily detect hidden threats.
  • Prioritizes threats according to their gravity.
  • Assembles numerous logs.
  • Scanty DSM modules.
  • failed queries during searches making me resubmit them.
  • The engine for processing queries is not as authoritative as that of other SIEMs; slowing down query processing.
IBM Resilient SOAR has excellent expediency for monitoring networks. It is great at identifying and notifying us of hidden security breaches. It has been effective for managing a vast amount of logs. However, if you are in need of a SIEM that has a very powerful engine you should look somewhere else.
Gokul Karuppiah | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
In our organization (Healthcare Recovery Department) we have been using this application for the past two years. Ee replaced a tool called HPBSM which creates the incidence when the application is having an outage. To Replace the HPBSM we came to the tool of IBM Resilient Incident Response. IBM Resilient is used in our recovery application which is created in the net for increasing/classifying the severities of incidents and notifying IT in the event of an outage or cyber attacks caused. lt is also used by the IT team to classify the incidents and take measurable action on time when threats or outages happen.
  • Increasing the severity of incidents when threats or outages happened and informing the IT team/management to take action. Our application is a .net one which is a legacy with SQL server. The number of times it is more vulnerable to threats and the action to be taken was identified using this tool.
  • Prior to using this tool, we were informed of threats by IBM customer support and we took action in around 2 to 3 hours to prevent using NOC team support. However, after we deployed this tool we were able to respond quickly based on the action plan provided along with threat level and severities.
  • Prior to deploying this tool, our incidents were provided by IBM customer support with no necessary information on the same. After this tool was installed in our organization, we were able to get the security alerts instantly and take action with the severity level for threats/attacks.
  • Not anything so far since we are highly dependent on this tool. Probably reduce the number of small alerts we get.
This is well suited for a high-level application with 1000+ users that work across timezones of EST, IST, and APT where actions can be taken across 24/7 applications. This tool is less appropriate for the small scale application for which is not much is needed. For example, where the application is used only by users 2-5 users on around 10+.
Return to navigation