Skip to main content
TrustRadius
IBM Security QRadar SIEM

IBM Security QRadar SIEM

Overview

What is IBM Security QRadar SIEM?

IBM Security QRadar is security information and event management (SIEM) Software.

Read more
Recent Reviews

QRadar review.

8 out of 10
March 31, 2024
Incentivized
We have used IBM Security QRadar SIEM to provide security to our costumers (B2B) and also for our own corporate security. IBM Securty …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Popular Features

View all 13 features
  • Rules-based and algorithmic detection thresholds (40)
    9.2
    92%
  • Correlation (60)
    8.9
    89%
  • Integration with Identity and Access Management Tools (56)
    8.4
    84%
  • Custom dashboards and workspaces (60)
    7.6
    76%

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is IBM Security QRadar SIEM?

IBM Security QRadar is security information and event management (SIEM) Software.

Entry-level set up fee?

  • No setup fee
For the latest information on pricing, visithttps://www.ibm.com/products/qradar…

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

12 people also want pricing

Alternatives Pricing

What is Microsoft Sentinel?

Microsoft Sentinel (formerly Azure Sentinel) is designed as a birds-eye view across the enterprise. It is presented as a security information and event management (SIEM) solution for proactive threat detection, investigation, and response.

Return to navigation

Features

Security Information and Event Management (SIEM)

Security Information and Event Management is a category of security software that allows security analysts to look at a more comprehensive view of security logs and events than would be possible by looking at the log files of individual, point security tools

8.7
Avg 7.8
Return to navigation

Product Details

What is IBM Security QRadar SIEM?

IBM QRadar SIEM helps users to remediate threats faster by prioritizing high-fidelity alerts to help catch threats.

QRadar analytics monitor threat intel, network and user behavior anomalies to prioritize where immediate attention and remediation is needed. When threat actors trigger multiple detection analytics, move across the network or change their behaviors, QRadar SIEM will track each tactic and technique being used. More important, it will correlate, track and identify related activities throughout a kill chain, with a single high-fidelity case, automatically prioritized for the user.


https://ibm.biz/QRadar_SIEM_product_page



IBM Security QRadar SIEM Features

Security Information and Event Management (SIEM) Features

  • Supported: Correlation
  • Supported: Integration with Identity and Access Management Tools
  • Supported: Custom dashboards and workspaces
  • Supported: Behavioral analytics and baselining
  • Supported: Rules-based and algorithmic detection thresholds
  • Supported: Reporting and compliance management

Additional Features

  • Supported: Open architecture to deploy on premises, on cloud, or as a service.
  • Supported: Investigation speed faster with automated triage and contextual intelligence
  • Supported: Better visibility by removing silos and unifying input and shared insights
  • Supported: Integrates with existing tools to leave data where it is and leveraging current environment.

IBM Security QRadar SIEM Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

IBM Security QRadar is security information and event management (SIEM) Software.

Microsoft Sentinel, Splunk Enterprise Security (ES), and LogRhythm NextGen SIEM Platform are common alternatives for IBM Security QRadar SIEM.

Reviewers rate Centralized event and log data collection highest, with a score of 9.9.

The most common users of IBM Security QRadar SIEM are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(259)

Attribute Ratings

Reviews

(1-4 of 4)
Companies can't remove reviews or game the system. Here's why
April 08, 2022

IBM Qradar Review

Score 9 out of 10
Vetted Review
Verified User
Incentivized
Qradar helps me and our clients get reliable and well-performing SIEM functionalities. We have created a broad spectrum of use-cases to cover the detection of various security threats with ease. The support team was always helpful if we had questions about the product and we could resolve all issues that came up so far really fast.
  • SIEM functionalities.
  • Offense rule creation.
  • Log searching.
  • Possibility to edit multiple rules at once is missing.
  • There should be more build-in notifications options than just E-Mail and local notifications.
IBM Qradar is best suited for medium to large businesses that want to have a singular platform to gain insight into what all of their hosts and servers are doing exactly at the moment. They can also create complex rules to get alerts („offenses“) based on various log parameters for security or observability use cases.
  • Log aggregation.
  • Offense generation.
  • Security
  • Observability
  • Easy deployment saves costs in opposite to other SIEM solutions in the long run.
  • Reliable operation makes less regular maintenance needed (beside updates).
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We are using Qradar as a soc service as Managed service partner managing soc with 500 eps even count, Major problem with the system is disconnection of device from Qradar console with having network issues as switch usually generating few logs and in the interval of 7-8 days, some of the devices removed automatically from the console and no alert triggered in this case. We have manually re-configure the Syslog configuration to map this device. Integration with DLP is quite difficult and does fine any significant impact for integration with DLP. Overall product is good for medium enterprise organizations as firewall level Threats & fast positive alert detection rates ate very high in terms of another tool. Scope: Real-time monitoring 24*7 related to network threat protection, any kind of unauthorized access, abnormal behavior detection, etc…
  • Automative of Threat protection
  • advanced search queries are easy to understand. This allows you to perform specific searches that really speed up the investigation process.
  • Device must be connected once configuration completed to integrate with console,
  • Licensing model: the EPS (events per second) cap limits the number of logs that can be ingested in Qradar Can produce a lot of false positives
  • Pricing structure should be cheeper and enhancement could be faster
Detection of false-positive alert is high and responsive integration of the device is quite difficult
  • Filter data event & high end anaylytics
  • Threat detection process
  • Our object is to secure organisation network which we can achieve with this product
Market reviews and stable product
Eduardo Ramirez | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Mainly IBM Security QRadar at Tristate is for SIEM, but also we use features for early threat detection.
  • 100% SIEM
  • Robust, logging collector
  • Good integration, through API with other platforms
  • I think API could be easier, I mean for non API experts.
  • Also I think upgrades can be more friendly for non Red Hat experts!!!
In my last 3-4 years of exposure to QRadar as SIEM, I would say it is the best. We are able to see all traffic detailed on a single pane of glass. The only thing is like any other SIEM you need to know what to do with all information, otherwise, it could be useless so definitely training is needed.
  • SIEM
  • Logs
Security Information and Event Management (SIEM) (14)
91.42857142857142%
9.1
Centralized event and log data collection
100%
10.0
Correlation
90%
9.0
Event and log normalization/management
100%
10.0
Deployment flexibility
70%
7.0
Integration with Identity and Access Management Tools
90%
9.0
Custom dashboards and workspaces
100%
10.0
Host and network-based intrusion detection
100%
10.0
Log retention
100%
10.0
Data integration/API management
90%
9.0
Behavioral analytics and baselining
90%
9.0
Rules-based and algorithmic detection thresholds
90%
9.0
Response orchestration and automation
70%
7.0
Reporting and compliance management
100%
10.0
Incident indexing/searching
90%
9.0
  • ROI has been positive for TSGT, we were able to fix many other things to save money using QRadar.
Recently used ExtraHop, Vectra Cognito, and SolarWinds Log collector.
Score 7 out of 10
Vetted Review
Verified User
Incentivized
QRadar is being used across our organisation, aggregating logs from all servers and network devices. It provides visibility of potential threats and attacks, and the data is analysed and reported upon daily. Its grouping of security events into "flows" assists greatly with understanding the timeline of a particular set of events. We also integrate the output of other security tools such as Cisco Umbrella and Qualysguard into our QRadar instance to provide a holistic view of our threat landscape.
  • Event grouping
  • Searching and filtering
  • All-in-one appliances for "drop-in" installation and setup
  • More responsive support
  • Harmonised prices throughout different worldwide markets
  • Tidy up UI and make it more intuitive
It works well in medium-to-large companies who have the budget for such a full-featured product. It may be less suitable for small-to-medium enterprises with tighter margins and a more controlled security budget, though the QRadar Community Edition could provide a more cost-effective solution. It's also well-suited to organisations with a diverse technology estate as it integrates well with many popular hardware and software offerings.
  • Reliability
  • Usability
  • Speed
Security Information and Event Management (SIEM) (14)
91.42857142857142%
9.1
Centralized event and log data collection
100%
10.0
Correlation
90%
9.0
Event and log normalization/management
80%
8.0
Deployment flexibility
90%
9.0
Integration with Identity and Access Management Tools
100%
10.0
Custom dashboards and workspaces
90%
9.0
Host and network-based intrusion detection
100%
10.0
Log retention
90%
9.0
Data integration/API management
90%
9.0
Behavioral analytics and baselining
90%
9.0
Rules-based and algorithmic detection thresholds
90%
9.0
Response orchestration and automation
90%
9.0
Reporting and compliance management
90%
9.0
Incident indexing/searching
90%
9.0
  • Increased understanding of threat landscape
  • Greatly reduced time spent manually trawling through logs
  • Ability to carry out forensic analysis as part of a post incident review
Return to navigation