EDR for threat management with AI/ML
November 21, 2023

EDR for threat management with AI/ML

Anonymous | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User

Overall Satisfaction with IBM Security QRadar EDR

It is being used to manage security management and information, the main feature used is threat detection and responses at the end point, the artificial learning and machine capabilities are used for behavioral analysis of the anomalies in the end point. Also used for tracing and souring of the incidents.
  • Monitoring
  • UI/UX
  • Analysis
  • Threat intelligence
  • scalability
  • Not easy to understand the overall features
  • system performance
  • costing for small organization
  • The 360 degree user interface
  • AI and ML capabilities
  • Behavioral analysis
  • scalability
  • Incident response
  • Incident tracing/rooting
  • real time end point analysis
The dashboard itself is comprehensive and provides a 360 degree view of the end points combined with other features to analyse the end points which could be potential anomalies, the AI and ML capabilities of EDR helps in quick analysis of the threat on the basis of similar potential vulnerabilities from the past, and it saves a lot of time as we don't have to start analysis from scratch for any similar threats.
The main feature over other tools if the AI and ML capabilities of EDR as it saves a lot of efforts and resources for proper identification and proper action can be taken in much effective way. The dashboard is also better, and automation activities are better as compared to other tools.

Do you think IBM Security QRadar EDR delivers good value for the price?

Not sure

Are you happy with IBM Security QRadar EDR's feature set?

Yes

Did IBM Security QRadar EDR live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of IBM Security QRadar EDR go as expected?

I wasn't involved with the implementation phase

Would you buy IBM Security QRadar EDR again?

Yes

It is well suited for analysis of the threat on the basis of hierarchy and its AI and ML features can be used to analyze the root source and tracing the incidents. It is less applicable at small level designs where scalability is not required when volume of incidents are less.

IBM Security QRadar EDR Feature Ratings

Anti-Exploit Technology
7
Endpoint Detection and Response (EDR)
9
Centralized Management
9
Hybrid Deployment Support
8
Infection Remediation
7
Malware Detection
8