IBM QRadar vs. Splunk

As of March 2019, IBM QRadar is ranked 3rd in Security Information and Event Management (SIEM) with 61 reviews vs Splunk which is ranked 1st in Security Information and Event Management (SIEM) with 71 reviews. The top reviewer of IBM QRadar writes "Correlates data across our global enterprise and integrates third-party solutions". The top reviewer of Splunk writes "Its AMIs make it easy to spin up a Splunk cluster or add a new node to it". IBM QRadar is most compared with Splunk, LogRhythm NextGen SIEM and ArcSight. Splunk is most compared with IBM QRadar, Graylog and LogRhythm NextGen SIEM. See our IBM QRadar vs. Splunk report.
Cancel
You must select at least 2 products to compare!
EventTracker Logo
1,080 views|658 comparisons
IBM QRadar Logo
53,780 views|26,736 comparisons
Splunk Logo
124,511 views|69,773 comparisons
Most Helpful Review
Find out what your peers are saying about IBM QRadar vs. Splunk and other solutions. Updated: March 2019.
325,421 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
The network alert is the most valuable feature. That way, we in the IT department are aware of user lockout and invalid password attempts way before a user ever even calls in.The most important feature is keeping track of when accounts are created and deleted, when permission groups are changed, and memberships are changed in groups; and overall, how many errors are occurring on the various systems that we're monitoring.The SIEMs and managed service are its most valuable features. We get a weekly report from them which provides a culmination of them combing through millions of events which are triggered across our network every day and minute. Their information security experts basically boil that down to a report which I get emailed once a week. It identifies potential threats and the remediation that I should take to be able to quell those threats.

Read more »

IBM has everything you need in a cybersecurity solution. If you want to build a cybersecurity operation center version then I think QRadar is a perfect solution.It's quite scalable. We have upgraded some solutions from 1000 APS up to 3500 APS to 5000 APS. It's a good solution, they have no scalability issues.The ability to add extensions is the most valuable feature. For example, extensions that provide valuable test ports.Providing real-time visibility for threat detection and prioritization - QRadar SIEM provides contextual and actionable surveillance across the entire IT infrastructure.It is very stable. We have not faced interruptions in the past four and a half years.It has improved comprehensive visibility for what is going on in the perimeters, and on the inside, as well.It is really helpful to us from the compliance point of view.The initial setup is not complex or difficult.

Read more »

It can log more logs than other solutions. It's a good way to troubleshoot problems.With good domain knowledge, one can build almost anything. If you throw in Alert Manager or an integration with ServiceNow. Then, you have your own SIEMOur clients are easily able to modify and evolve their implementations.We can present to our management in real time the security of the batch management for the PCs, security regarding the network equipment. We're currently working in the Azure Cloud project, so we can send any logs from the cloud to Splunk. We can monitor them and we can present to the managers and customers. It's a very good solution for reporting. We use Splunk for reporting and monitoring of any solution in the company.The initial setup is simple, not very complex. Initial deployment takes around 10 to 15 minutes to set up the entire base for Splunk including all three tiers.The search function for spam is like a google search. You just enter and it will quickly show you the results.It's very flexible. If you look from the cloud implementation it is there. Reports are made quickly. Unlike other tools, it caters to all kinds of technical information on the front very easily. There's no need to put in any technical information. You can pull on the reports very easily, take action, and notify stakeholders.It's extremely scalable. It's a very robust solution and certainly has the capability of handling far bigger data requirements than a lot of the other tools. Generally what ends up happening with me is that my clients tend, for the most part, to be mid-tier organizations where the cost of that solutions would be accompanying requirements for people just becomes way too prohibitive. Especially considering the model that they use for costing, which is based on the volume of data. Of course, they're going to put everything including the Coke machine as the ability to collect data off of it, because of course the more they can put through the tool the more money they make.

Read more »

Cons
There are some issues with searches taking a long period of time, but they assured me that they have implemented a new search function that's available in version 9, but which requires a solid-state hard drive... Depending on how many logs you have it could take a long time to return the results if you're looking back prior to the last 30 days.I'd like to see improvement in the ease of generating reports. It seems fairly cumbersome whenever you decide to start tracking new categories of events. It seems a little kludgy when trying to generate those reports.The deployment of the agents could be a bit easier. We always seem to have a bit of a challenge with that. A lot of times the agents either don't deploy or they quit responding, then we have to go and redeploy them.

Read more »

I think QRadar is very complex. It's a distributed system and IBM QRadar has an all-in-one solution which is not like that distributed solution but it's a good product. IBM needs to consider the user interface because if we compare it with AlienVault, the AlienVault user interface is fantastic but the IBM QRadar user interface is very complex. They should focus on how to make it easier for the client.They should provide more manual examples online so that I can learn it myself.I would like for them to develop a detection management solution. It does not have a detecting management solution in it, you have to buy it as it is, on top of the extended solution.Their technical support is not good. We opened a lot of cases and from my experience, they are not complicated issues but it takes forever to get an answer.AI is superb but need improvements.Technical support is good, but not great.The tech support is not that good.The Indian tech support is not helpful.

Read more »

Cybersecurity and infrastructure monitoring have room for improvement.It needs a better way to export dynamic views without requiring a ton of code and user/pw.It needs integration with a configuration management solution.It needs integration with a configuration management solution.The security can be improved.Splunk does not build apps. They only go back and validate the apps that somebody has already built. They should have remote consulting support. They have a wonderful solution. They have 24/7 security. Nobody needs to depend on any third party and will therefore just buy Splunk on the cloud.Spam has different plugins but by default, the logs are not organized, it shows that there are roll-ups that are out of the box. I saw many plugins that can help improve or extend Splunk's functionality but I haven't tried any of them.It does not give us permission to implement on-premise so we implement them on the cloud.

Read more »

Pricing and Cost Advice
The solution is fairly expensive, but in my experience, all of the SIEM applications that I've evaluated or looked at cost about the same.Licensing is very easy. Our CIO takes care of the billing, but in terms of price point, he hasn't complained, so it must be good.The pricing and licensing seem very reasonable. The managed service part of it feels like it gives me the equivalent of a full-time engineer for a lot less money. So, I feel it's a good value.

Read more »

Licensing is very expensive, IBM QRadar is a very expensive solution. If you want to minimize costs then IBM QRadar is not for you.It's too expensive.It is cheaper than ArcSight.The cost of this product is expensive.It is very expensive.A good approach would be to begin with an On Cloud subscription, then later on do a more exact sizing.Pricing and licensing are competitive. Their new licensing options allow logs to bypass the correlation engine for a flat rate, which is also appealing for log data that is compliance-driven for a small amount of money.Pricing (based on EPS) will be more accurate.

Read more »

Splunk's cost is very high. They need to review the pricing. They have to go back and totally readdress the market.It's a little bit expensive for a small to medium enterprise.I think the price could be improved.I am not personally involved with the pricing of the solution.Some of the insights that we have obtained as a part of using Splunk have greatly helped us in increasing our revenue in terms of selling our products.The pricing seems good relative to the other vendors that we have had here. However, they need to find ways to be more flexible with the licensing and be able to deal with situations where we start generating more logs. Maybe having some controls in the Splunk interface to turn it off, so we don't have to change anything in our application.We have had a reduction in the time it takes to resolve issues and correlate what has failed.It would be nice if the pricing were cheaper. However, we did purchase it.

Read more »

report
Use our free recommendation engine to learn which Security Information and Event Management (SIEM) solutions are best for your needs.
325,421 professionals have used our research since 2012.
Answers from the Community
Rhea Rapps
Darius RadfordUser

As all consultants say...it depends.
The elements I would factor in are:
1) How they are staffed?
2) What groups outside of security will use this tool?
3) Is this for SIEM or log management?
4) Size of environment

For" how are they staffed" question I think if you have developers and scripting expertise in house then this makes for a strong case for Splunk. If not then Q-Radar may be a better fit.

The next question..."what groups outside the security group with use this tool?". Splunk does a lot of items that are really nice to haves, but don't necessarily fall into the security space. So if folks outside of security team will use the tool and subsequently help fund the endeavor this makes a strong case for Splunk. If this is a pure play security need, then out of the box, I feel this is a strong case for Q-Radar

Is this for SIEM or log management? By default Splunk is not a SIEM, once you buy the SIEM/Security license then it becomes a SIEM. That being said, it does log management and analytics very well. Out of the box Q-Radar is a very effective SIEM with tons of pre-set rules. So obviously if this is a pure play log management move, then Splunk becomes a strong choice here.

Size of environment. Because the Splunk licensing model is based on the number of events being produced in your environment, then this is a factor that must be considered. Q-Radar on the other hand is one of most straight-forward SIEM installations, and shortest time to value out there. As such, they have often been associated with small to mid sized organizations.

There are other factors out there to consider...this is in no means an all encompassing list, however, I feel if you ask yourself these questions, at a minimum , then your answers becomes a lot clearer.

13 February 18
Loren BuhleUser

It depends on the intended purpose of the tool and the type of people implementing it. Q-Radar tends to focus its out-of-the-box reports on compliance reporting, as well as tracking behavior-based tracking that is arduous for the DIY script writer. Having used both, they are both great platforms that take quite a bit of training to fully understand and wring the most value. Once you are at a steady state of log analysis, Q-Radar tends to be more useful on exploring "what we don't know" while Splunk tends to focus on confirming what I suspected, but didn't have the evidence.

If you love scripting and going after known deviations, there are alot of Splunk consultants and expertise for hire. This makes Splunk slightly better for small organizations. If known deviations are "table stakes" and you focus is on exploring risks currently unknown to you...then Q-Radar is the better option, in my opinion. Q-Radar's learning curve used to be slightly steeper than Splunk...but I've heard there is more automation and better training on the Q-Radar in the past few years.

13 February 18
Eduardo PerezReal User

I had been looking at the Security Analytics Platforms from the top right quadrant in the Gartner and Forrester reports and found that [architectural] use-case really matters.

For my business I was looking to build a shared environment that would service multiple customers so multi-tenancy, data security, roles based access controls and self-service-ability were key requirements. For the purposes of providing the SOC a single-pane of glass I needed a single configurable dash, and in a single-tenant environment both (Splunk and QRadar) could do it but in a multi-tenanted scenario on one could do it, at least without having to adding unnecessary systems.

Also, I didn't want to spend too much time on integration, setup and configuration so having [SIEM] use cases and compliance reporting available out-of-the-box and integration with common devices and OS had to be part of the base offering allowing the team to install and start using it immediately.

For me QRadar ticked all the boxes. Additionally the vast range of free apps which include user behavioral analytics are available which let you leverage its analytics engine.

That said, Splunk is an effective analytics platform that has use cases outside of SecOps. You will need to have the depth of certified knowledge, expertise and deep pockets to make effective use.

14 February 18
UserUser

First of all, I'm a Splunker (by religion, not by employment :)), which makes my opinion a bit subjective.

It really depends on what are you expecting from the solution and how skilled and how ready for new approaches you are.

QRadar is great as a pure SIEM solution. Easy to use, super integrated with common devices, fantastic correlations and reports, everything expected from a top SIEM solution.

Splunk, on the other hand, offers much more. Splunk is more a general purpose big-data collecting platform, used to search and find anything very quickly and correlate any data, without prior knowledge of the data structure. SIEM is just one purpose to use Splunk, often better suited and equipped than competitive SIEM solutions, because it always uses ALL data, not just the normalized ones. However, a newbie to Splunk might find the search-oriented GUI and more advanced approach than competitors rather confusing. Believe me, once you get used to the philosophy of Splunk and get familiar with its usage, there is no way back to any other tool.

19 March 18
Leonardo CarmonaReal User

The biggest difference is that QRadar brings a lot of interesting embedded functionalities (UBA, Watson, DataFlow) that makes the difference from a cybersecurity perspective, whereas Splunk is more open than QRadar.

Both Splunk and IBM QRadar are amazing technologies for SIEM. I would recommend QRadar for pure information security purposes. If you really need to do more than SIEM and information security tasks, you should look at Splunk. I used Splunk for fraud control and monitoring and it is amazing. You can consume any kind of data and do so many things. Your imagination is the limit. I'm a big Splunk fan!

14 February 18
Top Comparisons
Compared 41% of the time.
Compared 26% of the time.
Compared 39% of the time.
Compared 10% of the time.
Compared 8% of the time.
Compared 15% of the time.
Compared 8% of the time.
Compared 7% of the time.
Also Known As
QRadar SIEM, QRadar UBA, QRadar on Cloud, QRadar
Learn
Netsurion
Video Not Available
IBM
Splunk
Overview

EventTracker by Netsurion delivers actionable security intelligence that empowers organizations of any size to effectively detect and respond to advanced threats.

EventTracker Security Center
EventTracker Security Center is one platform for all critical SIEM capabilities necessary for real-time security monitoring, advanced threat detection and response, and audit-ready compliance. With Security Center, you are able to quickly identify security threats, malware, unusual behavior and suspicious network traffic, and respond more effectively.

EventTracker SIEMphonic
EventTracker SIEMphonic is our Co-Managed SIEM service that functions as an extension of your team to strengthen defenses, respond in real-time, control costs, and optimize your team's abilities. EventTracker SIEMphonic is includes our own award-winning platform that has been included in the Gartner Magic Quadrant for SIEM for 11 consecutive years. Whether on-premise or in the cloud, our 24/7 ISO/IEC 27001-certified Security Operations Center (SOC) provides expertise so you can focus on the unique requirements of your organization.

The IBM QRadar security and analytics platform is a lead offering in IBM Security's portfolio. This family of products provides consolidated flexible architecture for security teams to quickly adopt log management, SIEM, user behavior analytics, incident forensics, and threat intelligence and more. As an integrated analytics platform, QRadar streamlines critical capabilities into a common workflow, with tools such as the IBM Security App Exchange ecosystem and Watson for Cyber Security cognitive capability.

With QRadar, you can decrease your overall cost of ownership with an improved detection of threats and enjoy the flexibility of on-premise or cloud deployment, and optional managed security monitoring services.

Splunk software has been around since 2006 and the company has since grown to become an industry leader. Splunk's vision is to make machine data accessible, usable and valuable to everybody. The company offers a wide range of products to turn machine data into valuable information by monitoring and analyzing all activities. This is known as Operational Intelligence and is the unique value proposition of Splunk.

Splunk is well-known for its Log Management capabilities and also for its Security Information and Event Management (SIEM) solutions.

Offer
Learn more about EventTracker
Learn more about IBM QRadar
Learn more about Splunk
Sample Customers
The Salvation Army, The FRESH Market, Pacific Western Bank, AAOS, Vanderbilt University, TalbotsClients across multiple industries, such as energy, financial, retail, healthcare, government, communications, and education use QRadar.Splunk has more than 7,000 customers spread across over 90 countries. These customers include Telenor, UniCredit, ideeli, McKenney's, Tesco, and SurveyMonkey.
Find out what your peers are saying about IBM QRadar vs. Splunk and other solutions. Updated: March 2019.
325,421 professionals have used our research since 2012.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email