Anomali ThreatStream vs IBM Security QRadar comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Anomali ThreatStream
Average Rating
7.0
Number of Reviews
1
Ranking in other categories
Threat Intelligence Platforms (6th)
IBM Security QRadar
Average Rating
8.0
Number of Reviews
198
Ranking in other categories
Log Management (6th), Security Information and Event Management (SIEM) (4th), User Entity Behavior Analytics (UEBA) (1st), Endpoint Detection and Response (EDR) (20th), Security Orchestration Automation and Response (SOAR) (4th), Managed Detection and Response (MDR) (10th), Extended Detection and Response (XDR) (11th)
 

Market share comparison

As of June 2024, in the Threat Intelligence Platforms category, the market share of Anomali ThreatStream is 6.0% and it decreased by 21.8% compared to the previous year. The market share of IBM Security QRadar is 0.3% and it decreased by 82.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Threat Intelligence Platforms
Unique Categories:
No other categories found
Log Management
8.2%
Security Information and Event Management (SIEM)
16.3%
 

Featured Reviews

PP
Mar 12, 2023
Easy and quick credential monitoring; tech support could be improved
Our primary use case for this solution is as a threat intelligence platform. We stream various threat feeds into this platform. We also make correlations between the feeds to duplicate the data, aggregate it and then present it to our security solutions for advanced security The way that this…
James Riffenburg - PeerSpot reviewer
Oct 18, 2022
The solution uses AI to analyze different logged events, and network activity and create a correlation
I give the solution an eight out of ten. The solution is fairly easy to maintain and the learning curve is reasonable compared to other products to customize the workflow dashboards and get meaningful insight as far as what is happening within our organization. The solution is also fairly straightforward to integrate with different data log sources. The solution requires three to five people to maintain including one analyst, an engineer, and an architect. I suggest before using the solution you know what your process is, know what your logging sources are, and plan well because It's really a leadership challenge. The solution is better deployed than other models.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The feature I have found most valuable is credential monitoring. This feature is easy and quick."
"Senses, tracks, and links significant incidents and threats."
"A nice benefit is when we go to the process of selecting our youth cases, they go by building blocks. QRadar links it to building blocks."
"The most valuable features are log monitoring, easy-to-fix issues, and problem-solving."
"It is a scalable solution."
"The feature that I have found most valuable is its artificial intelligence component, Watson. Its contribution is pretty good from a machine-learning artificial intelligence perspective. This compliments the orchestration automation component, as well."
"The most valuable features are the AI assistant, which is good at detecting known types of behavior."
"It has a good integration with the artificial intelligence engine of Watson."
"One of the most valuable features of this solution is it has very good data correlation."
 

Cons

"Less code in integration would be nice when building blocks."
"Do your research before implementing it, because it is tough to implement."
"The user interface is a bit clunky, a bit hard to find what you need."
"The dashboards are all legacy and old."
"Needs better visualization options beyond the time series charts and a few other options that they have."
"The initial setup was complex, and it took six months."
"QVM is another instance where they need to revise the vulnerability scoring and the proper remediation details."
"The solution is expensive compared to other products."
"The solution is difficult to understand in the beginning and has complex management configurations that can be improved."
 

Pricing and Cost Advice

Information not available
"Pricing is good."
"The solution is costly and the price differs depending on the vendor you use."
"There is an annual license required for this solution."
"It could be cheaper, but the value itself is far more important for us than the price. Typically, our clients have yearly subscriptions."
"It is costlier as compared to the other alternatives available in the market."
"I think that the price is fair, but we can always say that the price could be cheaper."
"It is expensive. It is not a product that I can provide for SMBs. It is a program that I can only provide for really large enterprises."
"The price of this solution is reasonable."
report
Use our free recommendation engine to learn which Threat Intelligence Platforms solutions are best for your needs.
787,226 professionals have used our research since 2012.
 

Comparison Review

VS
Jun 28, 2015
Qradar vs. ArcSight
Continuing with the SIEM posts we have done at Infosecnirvana, this post is a Head to head comparison of the two Industry leading SIEM products in the market – HP ArcSight and IBM QRadar Both the products have consistently been in the Gartner Leaders Quadrant. Both HP and IBM took over niche SIEM…
 

Top Industries

By visitors reading reviews
Financial Services Firm
16%
Computer Software Company
14%
Government
12%
Manufacturing Company
10%
Educational Organization
19%
Computer Software Company
15%
Financial Services Firm
10%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Anomali ThreatStream?
The feature I have found most valuable is credential monitoring. This feature is easy and quick.
What needs improvement with Anomali ThreatStream?
I think that this solution should improve its integrations. This part of the solution could be bigger and moved into the no-code direction. Less code in integration would be nice when building blocks.
What is your primary use case for Anomali ThreatStream?
Our primary use case for this solution is as a threat intelligence platform. We stream various threat feeds into this platform. We also make correlations between the feeds to duplicate the data, ag...
What are the biggest differences between Securonix UEBA, Exabeam, and IBM QRadar?
It mostly depends on your use-cases and environment. Exabeam and Securonix have a stronger UEBA feature set, friendlier GUI and are not licensed based on capacity (amount of logs and information in...
What SOC product do you recommend?
For tools I’d recommend: -SIEM- LogRhythm -SOAR- Palo Alto XSOAR Doing commercial w/o both (or at least an XDR) is asking to miss details that are critical, and ending up a statistic. Also, rememb...
What do you like most about IBM QRadar?
The event collector, flow collector, PCAP and SOAR are valuable.
 

Also Known As

ThreatStream OPTIC
IBM QRadar, QRadar SIEM, QRadar UBA, QRadar on Cloud, QRadar, IBM QRadar User Behavior Analytics, IBM QRadar Advisor with Watson
 

Learn More

 

Overview

 

Sample Customers

BBCN Bank
Clients across multiple industries, such as energy, financial, retail, healthcare, government, communications, and education use QRadar.
Find out what your peers are saying about Recorded Future, Microsoft, Check Point Software Technologies and others in Threat Intelligence Platforms. Updated: May 2024.
787,226 professionals have used our research since 2012.