Most Helpful Review
Find out what your peers are saying about IBM QRadar vs. RSA NetWitness Logs and Packets (RSA SIEM) and other solutions. Updated: May 2019.
340,467 professionals have used our research since 2012.
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
The product satisfies our compliance, and thus, all of our auditors. All of the data that we use and store for all security events is required by our auditors to be kept in a central storage location.
If we need to do a search for user lockouts, we can go, search, and find locations where they have been locked out, then keep track of those events, historically.
The network alert is the most valuable feature. That way, we in the IT department are aware of user lockout and invalid password attempts way before a user ever even calls in.
The most important feature is keeping track of when accounts are created and deleted, when permission groups are changed, and memberships are changed in groups; and overall, how many errors are occurring on the various systems that we're monitoring.
The SIEMs and managed service are its most valuable features. We get a weekly report from them which provides a culmination of them combing through millions of events which are triggered across our network every day and minute. Their information security experts basically boil that down to a report which I get emailed once a week. It identifies potential threats and the remediation that I should take to be able to quell those threats.
Providing real-time visibility for threat detection and prioritization - QRadar SIEM provides contextual and actionable surveillance across the entire IT infrastructure.
Vulnerability detection is the most valuable feature. It's the tool that finds the threats.
IBM QRadar has improved my organization by introducing many functions. It collects logs from all of our systems in the organization and has functioned very well. It alerts and correlates the aggregate events or offenses we receive through all the applications we use.
The most valuable features would have to be the products' ability to customize vulnerability management settings.
There is a single dashboard that gives us a complete overview of what is happening around the globe.
In addition to using this solution for our security operations center, we are using it for our other customers.
It is very stable. We have not faced interruptions in the past four and a half years.
It has improved comprehensive visibility for what is going on in the perimeters, and on the inside, as well.
The most valuable features are its ingestion of logs and raising of alerts based on those logs.
Their technical support responds quickly and are knowledgable.
The most valuable feature is the correlation. It can report in real-time and monitor the management.
It gives the ability to investigate into network traffic in the Net and the organization what we couldn't do before.
Alerting Module: It provides real-time event processing language on all the logs/packets stream for advanced alerting, i.e., using SQL LIKE statements.
The biggest problem is that we have too many domain controllers. So, we have to keep all the clients and main system updated with the latest versions along with making sure all the firewalls are open.
There are some issues with searches taking a long period of time, but they assured me that they have implemented a new search function that's available in version 9, but which requires a solid-state hard drive... Depending on how many logs you have it could take a long time to return the results if you're looking back prior to the last 30 days.
I'd like to see improvement in the ease of generating reports. It seems fairly cumbersome whenever you decide to start tracking new categories of events. It seems a little kludgy when trying to generate those reports.
The deployment of the agents could be a bit easier. We always seem to have a bit of a challenge with that. A lot of times the agents either don't deploy or they quit responding, then we have to go and redeploy them.
AI is superb but need improvements.
The tool is very complicated. One place for improvement would be to have a more user-friendly interface. Having better support in Spanish would be cool.
There is one problem with QRadar in regards to the add-on apps. The apps can be frustrating. For example, when I add a big app like one of the add-ons for resiliency, add-on applications for QRadar, these applications require different hardware to implement and to deploy. The resiliency connector because there's a considerable amount of data scanning, operates for these apps correctly.
There could be improvements made to the UI, the user interface. Though the newer version, 7.3.2, might already have this improvement in place.
Ideally we would like a mobile version so that any alert that comes in will notify us in a mobile app, or by using SMS integration.
It needs more resilience and functionality.
Technical support is good, but not great.
The quoting and the dashboard session could be improved. It should be more user-friendly.
I'd like to see improvement in its ease of use. It's basically unusable. It's overly complex.
The initial setup was complex because it takes a lot of time to complete the implementation.
The implementation needs assistance.
We have encountered issues with unresolved crashes.
Health monitoring of the event sources and devices.
Pricing and Cost Advice
The upfront costs have increased, and we have been locked into this contract. The cost of changing over from it is way too high.
The solution is fairly expensive, but in my experience, all of the SIEM applications that I've evaluated or looked at cost about the same.
Licensing is very easy. Our CIO takes care of the billing, but in terms of price point, he hasn't complained, so it must be good.
The pricing and licensing seem very reasonable. The managed service part of it feels like it gives me the equivalent of a full-time engineer for a lot less money. So, I feel it's a good value.
There are additional costs, such as the cost associated with the different hardware required for implementation and deployment. Along with the add-on apps, these are all additional costs, and they require licensing as well.
In terms of additional costs, it depends on the subscription that you choose. There are plenty of options to choose from.
Our licensing costs for this solution is on a yearly basis.
It's too expensive. The licensing is also a little bit difficult to understand because you have to license it per event and per number of flows.
QRadar is quite expensive. It wouldn't be worth it for a small business...
I would like for them to lower the price.
The pricing is good.
IBM has subscriptions plans that run for one year.
The licenses are good but the cost is very expensive.
It is cheap.
The new pricing and licensing mechanisms are fair. I would advise always to get the full solution (i.e., not only Logs).
Compared 39% of the time.
Compared 25% of the time.
Compared 10% of the time.
Compared 38% of the time.
Compared 10% of the time.
Compared 8% of the time.
Compared 23% of the time.
Compared 18% of the time.
Compared 11% of the time.
Also Known As
|QRadar SIEM, QRadar UBA, QRadar on Cloud, QRadar||RSA Security Analytics|
EventTracker by Netsurion delivers actionable security intelligence that empowers organizations of any size to effectively detect and respond to advanced threats.
EventTracker Security Center
The IBM QRadar security and analytics platform is a lead offering in IBM Security's portfolio. This family of products provides consolidated flexible architecture for security teams to quickly adopt log management, SIEM, user behavior analytics, incident forensics, and threat intelligence and more. As an integrated analytics platform, QRadar streamlines critical capabilities into a common workflow, with tools such as the IBM Security App Exchange ecosystem and Watson for Cyber Security cognitive capability.
With QRadar, you can decrease your overall cost of ownership with an improved detection of threats and enjoy the flexibility of on-premise or cloud deployment, and optional managed security monitoring services.
If you’re relying on log data to detect and prevent cyber threats, you’re in trouble. Attackers increasingly evade detection of log-centric security and network monitoring tools. But logs combined with full packet, endpoint NetFlow data are proven to provide the essential details for early threat detection. Here’s a closer look at our solution.
Learn more about EventTracker
Learn more about IBM QRadar
Learn more about RSA NetWitness Logs and Packets (RSA SIEM)
|The Salvation Army, The FRESH Market, Pacific Western Bank, AAOS, Vanderbilt University, Talbots||Clients across multiple industries, such as energy, financial, retail, healthcare, government, communications, and education use QRadar.||Los Angeles World Airports, Reply|