QRadar Pluxee Review
March 31, 2024

QRadar Pluxee Review

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Software Version

QRadar Advisor with Watson (legacy branding)

Modules Used

  • SIEM

Overall Satisfaction with IBM Security QRadar SIEM

We use as a traditional SIEM, Logs correlation, User Behaviour, Threat Intel, and threat hunting are some examples of use cases.
  • Monitor IAM users activity
  • Correlate logs from different sources to detect security deviations
  • The search engine is very usefull to perform event deep analisys
  • Flexibility to create complex use cases in a easy and simple way
  • The report tool could be more flexible
  • Would be nice if IBM Security Qradar SIEM provided use case recommendations based on the received logs
  • Would be nice to have integrations with ITSM tools like Jira so offenses could turn in to incidents
  • It is expensive the leaders are always trying to replace with a cheaper solution
  • Although the solution is very good, the engineering is complex and may demand professional services
  • Many different areas in IT and business take advantage of detailed data stored .
In the company I work we are able to address several specific monitoring so IBM Security Qradar SIEM is very important for our security strategy.
The support it very good, the techs are very skilled the issues are always properly addressed

Do you think IBM Security QRadar SIEM delivers good value for the price?

Yes

Are you happy with IBM Security QRadar SIEM's feature set?

Yes

Did IBM Security QRadar SIEM live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of IBM Security QRadar SIEM go as expected?

I wasn't involved with the implementation phase

Would you buy IBM Security QRadar SIEM again?

Yes

For OnPrem environment based on syslog it fits very well.
Cloud security posture insights could have Built In App
The REST API integration is complex to use.

IBM Security QRadar SIEM Feature Ratings

Correlation
9
Integration with Identity and Access Management Tools
7
Custom dashboards and workspaces
4
Behavioral analytics and baselining
8
Rules-based and algorithmic detection thresholds
8
Reporting and compliance management
7