Security automation made easy
October 26, 2023

Security automation made easy

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with IBM Security QRadar SOAR

We use IBM Security QRadar SOAR for automating regular security analyst tasks and reducing the time to triage and respond to detection alarms for security events of critical or high risk category. By implementing playbooks on IBM QRadar SOAR, we are able to put into action the corrective and preventative security controls across different tools with the click of a button.
  • Security Automation
  • Reducing mean time to respond (MTTR)
  • Integration with security tooling and controls
  • Lower false positive rate
  • Training and support
  • Onboarding security tools and applications directly on the portal
  • Total cost of ownership for the organization
  • Security Orchestration
  • Integration with EDRs, NGFWs and Email Gateway
  • Implementing automation via playbooks
  • Reduced the response time for any security event
  • Ability to scale across different security tools over time
  • Reduced dependency on the on-call engineer to triage a security alert
  • User-friendly environment
Overall, IBM Security QRadar SOAR offered the same set of functionality that was needed by the organization as offered by Splunk SOAR, but the former is less expensive and solves all the purpose within budget. In addition, integration with other IBM products was easier and made implementation of a SOAR solution much faster.

Do you think IBM Security QRadar SOAR delivers good value for the price?

Yes

Are you happy with IBM Security QRadar SOAR's feature set?

Yes

Did IBM Security QRadar SOAR live up to sales and marketing promises?

Yes

Did implementation of IBM Security QRadar SOAR go as expected?

Yes

Would you buy IBM Security QRadar SOAR again?

Yes

IBM Security QRadar SOAR is particularly useful in guarding againt a phishing event. When a malware downloaded via a phishing email was detected, IBM Security QRadar SOAR was able to automate a response by isolating the infected device, blocking the malicious URL and removing the emails from all the user inbox based on hash signatures identified as attachment.