We performed a comparison between Cortex XSIAM and IBM Security QRadar based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, CrowdStrike, Securonix Solutions and others in Identity Threat Detection and Response (ITDR)."It is an effective solution in terms of performance and functionalities."
"The most valuable features of Cortex XSIAM are the machine learning used to identify threats, the complexity of the environment of products, and efficiency."
"Its ability to deliver a substantial amount of security intelligence greatly enhances and optimizes our security operations program."
"It operates on a single, extensive database which enables it to excel in detecting threats and anomalies across the network and endpoints, delivering a highly effective and comprehensive security solution."
"The solution is reliable."
"It protect us from multiple authentication values, unauthorized access and antivirus threats."
"It is very stable. We have not faced interruptions in the past four and a half years."
"IBM Security QRadar has significantly improved our incident response procedures."
"Most of our clients are interested in automation. The automation part is good because they are able to detect threats and vulnerabilities in real time. It's very fast."
"The most valuable features are all the implementations, the plug-ins, and the User Behavior Analytics (UBA)."
"I think it's a very stable product that provides much more visibility than the other product."
"I have found IBM QRadar to be scalable."
"The platform isn't very developer-friendly and it should provide more flexibility and ease."
"The support could be a bit faster."
"The solution’s pricing and technical support could be improved."
"Further integration capabilities with various other software products that can seamlessly tie into Cortex XSIAM would be advantageous."
"A lot of information that we receive for the devices is IP-based, but it would help if we could have a default dashboard in which we can add more details about the assets for which we are receiving the information. For example, if it is a Windows or Linux device, we only get the IP for that particular device. We don't really get the name and other details of that particular device. For that, you have to drill down into your own asset management system. It would be good to have a place where we can probably add this information so that we don't have to look into other tools."
"The playbook guide which specifies the rules for security use cases needs to be provided to support in case the organization needs help."
"I would like the rule creation interface to be much more user-friendly in the next release."
"The solution could improve by having more out-of-the-box use cases."
"Technical support is good, but not great."
"Their technical support is not good. We opened a lot of cases and from my experience, they are not complicated issues but it takes forever to get an answer."
"The reporting system could use some upgrading."
"I would like for Yara to be supported by all components."
Cortex XSIAM is ranked 7th in Identity Threat Detection and Response (ITDR) with 4 reviews while IBM Security QRadar is ranked 4th in Security Information and Event Management (SIEM) with 198 reviews. Cortex XSIAM is rated 9.0, while IBM Security QRadar is rated 8.0. The top reviewer of Cortex XSIAM writes "A robust security operation that ensures achieving automation, stability, and scalability". On the other hand, the top reviewer of IBM Security QRadar writes "A highly stable and scalable solution that provides good technical support". Cortex XSIAM is most compared with Palo Alto Networks Cortex XSOAR, Microsoft Sentinel, Splunk SOAR, CrowdStrike Falcon and Exabeam Fusion SIEM, whereas IBM Security QRadar is most compared with Splunk Enterprise Security, Microsoft Sentinel, Wazuh, LogRhythm SIEM and ArcSight Logger.
We monitor all Identity Threat Detection and Response (ITDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.