Compare IBM QRadar vs. Splunk

IBM QRadar is ranked 3rd in Security Information and Event Management (SIEM) with 46 reviews while Splunk which is ranked 1st in Security Information and Event Management (SIEM) with 60 reviews. IBM QRadar is rated 8.4, while Splunk is rated 8.4. The top reviewer of IBM QRadar writes "Enables us to handle the most critical attacks and integrates well with other solutions". On the other hand, the top reviewer of Splunk writes "Its AMIs make it easy to spin up a Splunk cluster or add a new node to it". IBM QRadar is most compared with Splunk, LogRhythm NextGen SIEM and ELK Logstash, whereas Splunk is most compared with IBM QRadar, Dynatrace and Graylog. See our IBM QRadar vs. Splunk report.
Cancel
You must select at least 2 products to compare!
EventTracker Logo
2,072 views|758 comparisons
IBM QRadar Logo
61,785 views|28,070 comparisons
Splunk Logo
144,906 views|74,340 comparisons
Most Helpful Review
Find out what your peers are saying about IBM QRadar vs. Splunk and other solutions. Updated: July 2019.
354,017 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
The product satisfies our compliance, and thus, all of our auditors. All of the data that we use and store for all security events is required by our auditors to be kept in a central storage location.If we need to do a search for user lockouts, we can go, search, and find locations where they have been locked out, then keep track of those events, historically.The network alert is the most valuable feature. That way, we in the IT department are aware of user lockout and invalid password attempts way before a user ever even calls in.The most important feature is keeping track of when accounts are created and deleted, when permission groups are changed, and memberships are changed in groups; and overall, how many errors are occurring on the various systems that we're monitoring.The SIEMs and managed service are its most valuable features. We get a weekly report from them which provides a culmination of them combing through millions of events which are triggered across our network every day and minute. Their information security experts basically boil that down to a report which I get emailed once a week. It identifies potential threats and the remediation that I should take to be able to quell those threats.

Read more »

We get events and make the correlation, or rules. In IBM, we can implement our customer's rules. We can have very clear status threats and severity of antigens.Provided that the report is prebuilt and I can find what I am looking for, the reporting is the most valuable feature in this solution.This solution provides me with various alarms, and I have found security issues with some of my other products.It is a very optimized engine.Providing real-time visibility for threat detection and prioritization - QRadar SIEM provides contextual and actionable surveillance across the entire IT infrastructure.Vulnerability detection is the most valuable feature. It's the tool that finds the threats.IBM QRadar has improved my organization by introducing many functions. It collects logs from all of our systems in the organization and has functioned very well. It alerts and correlates the aggregate events or offenses we receive through all the applications we use.The most valuable features would have to be the products' ability to customize vulnerability management settings.

Read more »

It helps us uncover bottlenecks in the network.it can explain to management about what kind of traffic is visiting the network. It can also explain other traffic coming in and out, along with protecting against malware.The initial setup is really straightforward. It's one of the easiest installations.The most valuable feature of Splunk is the log monitoring.It can log more logs than other solutions. It's a good way to troubleshoot problems.With good domain knowledge, one can build almost anything. If you throw in Alert Manager or an integration with ServiceNow. Then, you have your own SIEMOur clients are easily able to modify and evolve their implementations.We can present to our management in real time the security of the batch management for the PCs, security regarding the network equipment. We're currently working in the Azure Cloud project, so we can send any logs from the cloud to Splunk. We can monitor them and we can present to the managers and customers. It's a very good solution for reporting. We use Splunk for reporting and monitoring of any solution in the company.

Read more »

Cons
The biggest problem is that we have too many domain controllers. So, we have to keep all the clients and main system updated with the latest versions along with making sure all the firewalls are open.There are some issues with searches taking a long period of time, but they assured me that they have implemented a new search function that's available in version 9, but which requires a solid-state hard drive... Depending on how many logs you have it could take a long time to return the results if you're looking back prior to the last 30 days.I'd like to see improvement in the ease of generating reports. It seems fairly cumbersome whenever you decide to start tracking new categories of events. It seems a little kludgy when trying to generate those reports.The deployment of the agents could be a bit easier. We always seem to have a bit of a challenge with that. A lot of times the agents either don't deploy or they quit responding, then we have to go and redeploy them.

Read more »

The interface is very old. IBM should remake it into a more modern interface.There are reports that I would like to generate that are either not included, or I cannot find.There is a lot of manual configuration required in order for the product to run smoothly, and I think that it could be made more automatic.It is very difficult to activate all of the network equipment, and it would help if it were made easier.AI is superb but need improvements.The tool is very complicated. One place for improvement would be to have a more user-friendly interface. Having better support in Spanish would be cool.There is one problem with QRadar in regards to the add-on apps. The apps can be frustrating. For example, when I add a big app like one of the add-ons for resiliency, add-on applications for QRadar, these applications require different hardware to implement and to deploy. The resiliency connector because there's a considerable amount of data scanning, operates for these apps correctly.There could be improvements made to the UI, the user interface. Though the newer version, 7.3.2, might already have this improvement in place.

Read more »

The product was difficult to back up the first time.Splunk needs local technical support.They should make data onboarding easier.If possible, we would like to have not only a log monitoring system but a network monitoring feature in this solution as well.Cybersecurity and infrastructure monitoring have room for improvement.It needs a better way to export dynamic views without requiring a ton of code and user/pw.It needs integration with a configuration management solution.It needs integration with a configuration management solution.

Read more »

Pricing and Cost Advice
The upfront costs have increased, and we have been locked into this contract. The cost of changing over from it is way too high.The solution is fairly expensive, but in my experience, all of the SIEM applications that I've evaluated or looked at cost about the same.Licensing is very easy. Our CIO takes care of the billing, but in terms of price point, he hasn't complained, so it must be good.The pricing and licensing seem very reasonable. The managed service part of it feels like it gives me the equivalent of a full-time engineer for a lot less money. So, I feel it's a good value.

Read more »

The pricing needs to be such that they are more competitive with other vendors.There are additional costs, such as the cost associated with the different hardware required for implementation and deployment. Along with the add-on apps, these are all additional costs, and they require licensing as well.In terms of additional costs, it depends on the subscription that you choose. There are plenty of options to choose from.Our licensing costs for this solution is on a yearly basis.It's too expensive. The licensing is also a little bit difficult to understand because you have to license it per event and per number of flows.QRadar is quite expensive. It wouldn't be worth it for a small business...I would like for them to lower the price.The pricing is good.

Read more »

Splunk should be able to integrate with other product using the free version.The pricing and licensing of the product are quite high.Splunk is really expensive.Splunk's cost is very high. They need to review the pricing. They have to go back and totally readdress the market.It's a little bit expensive for a small to medium enterprise.I think the price could be improved.I am not personally involved with the pricing of the solution.Some of the insights that we have obtained as a part of using Splunk have greatly helped us in increasing our revenue in terms of selling our products.

Read more »

report
Use our free recommendation engine to learn which Security Information and Event Management (SIEM) solutions are best for your needs.
354,017 professionals have used our research since 2012.
Answers from the Community
Rhea Rapps
Darius RadfordUser

As all consultants say...it depends.
The elements I would factor in are:
1) How they are staffed?
2) What groups outside of security will use this tool?
3) Is this for SIEM or log management?
4) Size of environment

For" how are they staffed" question I think if you have developers and scripting expertise in house then this makes for a strong case for Splunk. If not then Q-Radar may be a better fit.

The next question..."what groups outside the security group with use this tool?". Splunk does a lot of items that are really nice to haves, but don't necessarily fall into the security space. So if folks outside of security team will use the tool and subsequently help fund the endeavor this makes a strong case for Splunk. If this is a pure play security need, then out of the box, I feel this is a strong case for Q-Radar

Is this for SIEM or log management? By default Splunk is not a SIEM, once you buy the SIEM/Security license then it becomes a SIEM. That being said, it does log management and analytics very well. Out of the box Q-Radar is a very effective SIEM with tons of pre-set rules. So obviously if this is a pure play log management move, then Splunk becomes a strong choice here.

Size of environment. Because the Splunk licensing model is based on the number of events being produced in your environment, then this is a factor that must be considered. Q-Radar on the other hand is one of most straight-forward SIEM installations, and shortest time to value out there. As such, they have often been associated with small to mid sized organizations.

There are other factors out there to consider...this is in no means an all encompassing list, however, I feel if you ask yourself these questions, at a minimum , then your answers becomes a lot clearer.

13 February 18
Loren BuhleUser

It depends on the intended purpose of the tool and the type of people implementing it. Q-Radar tends to focus its out-of-the-box reports on compliance reporting, as well as tracking behavior-based tracking that is arduous for the DIY script writer. Having used both, they are both great platforms that take quite a bit of training to fully understand and wring the most value. Once you are at a steady state of log analysis, Q-Radar tends to be more useful on exploring "what we don't know" while Splunk tends to focus on confirming what I suspected, but didn't have the evidence.

If you love scripting and going after known deviations, there are alot of Splunk consultants and expertise for hire. This makes Splunk slightly better for small organizations. If known deviations are "table stakes" and you focus is on exploring risks currently unknown to you...then Q-Radar is the better option, in my opinion. Q-Radar's learning curve used to be slightly steeper than Splunk...but I've heard there is more automation and better training on the Q-Radar in the past few years.

13 February 18
Eduardo PerezReal User

I had been looking at the Security Analytics Platforms from the top right quadrant in the Gartner and Forrester reports and found that [architectural] use-case really matters.

For my business I was looking to build a shared environment that would service multiple customers so multi-tenancy, data security, roles based access controls and self-service-ability were key requirements. For the purposes of providing the SOC a single-pane of glass I needed a single configurable dash, and in a single-tenant environment both (Splunk and QRadar) could do it but in a multi-tenanted scenario on one could do it, at least without having to adding unnecessary systems.

Also, I didn't want to spend too much time on integration, setup and configuration so having [SIEM] use cases and compliance reporting available out-of-the-box and integration with common devices and OS had to be part of the base offering allowing the team to install and start using it immediately.

For me QRadar ticked all the boxes. Additionally the vast range of free apps which include user behavioral analytics are available which let you leverage its analytics engine.

That said, Splunk is an effective analytics platform that has use cases outside of SecOps. You will need to have the depth of certified knowledge, expertise and deep pockets to make effective use.

14 February 18
UserUser

First of all, I'm a Splunker (by religion, not by employment :)), which makes my opinion a bit subjective.

It really depends on what are you expecting from the solution and how skilled and how ready for new approaches you are.

QRadar is great as a pure SIEM solution. Easy to use, super integrated with common devices, fantastic correlations and reports, everything expected from a top SIEM solution.

Splunk, on the other hand, offers much more. Splunk is more a general purpose big-data collecting platform, used to search and find anything very quickly and correlate any data, without prior knowledge of the data structure. SIEM is just one purpose to use Splunk, often better suited and equipped than competitive SIEM solutions, because it always uses ALL data, not just the normalized ones. However, a newbie to Splunk might find the search-oriented GUI and more advanced approach than competitors rather confusing. Believe me, once you get used to the philosophy of Splunk and get familiar with its usage, there is no way back to any other tool.

19 March 18
Leonardo CarmonaReal User

The biggest difference is that QRadar brings a lot of interesting embedded functionalities (UBA, Watson, DataFlow) that makes the difference from a cybersecurity perspective, whereas Splunk is more open than QRadar.

Both Splunk and IBM QRadar are amazing technologies for SIEM. I would recommend QRadar for pure information security purposes. If you really need to do more than SIEM and information security tasks, you should look at Splunk. I used Splunk for fraud control and monitoring and it is amazing. You can consume any kind of data and do so many things. Your imagination is the limit. I'm a big Splunk fan!

14 February 18
SrSecAnalyst918Real User

We have always used IBM QRadar so I guess I am partial to that solution. I have researched Splunk, LogRhythm, Alien Vault, etc but we just have never made that transition. I am uncertain about Splunk reporting but I agree with Tim in that QRadar does offer extensive compliance-related reporting. I would also add that IBM has done a lot in the past few years to open up their API to partners to allow for a greater interoperability between multiple tools. So the integration between multiple tools is getting better. Unfortunately for us most of those tools are not used in our environment.

13 February 18
Tim WittenburgReal User

The answer of course is, it depends. They are both great tools. In my experience, Splunk would be viewed favorably by teams that prefer scripting and building their own capabilities. Splunk does also has an add-on ES module that is pre-configured to address many common security/compliance reporting needs. I have less experience with Q-Radar relative to Splunk however I did recommend Q-Radar to a company who wanted something they could deploy rapidly to satisfy a HIPAA reporting requirement. My observation is that Q-Radar may have more compliance-related reporting out of the box relative to Splunk.

13 February 18
MS AlamReal User

As per my personal opinion Splunk Enterprise Security is best. but as per expert i dont know about this who is best.

13 March 18
Top Comparisons
Compared 38% of the time.
Compared 18% of the time.
Compared 38% of the time.
Compared 8% of the time.
Compared 13% of the time.
Compared 8% of the time.
Compared 8% of the time.
Also Known As
QRadar SIEM, QRadar UBA, QRadar on Cloud, QRadar
Learn
Netsurion
IBM
Splunk
Overview

EventTracker by Netsurion delivers actionable security intelligence that empowers organizations of any size to effectively detect and respond to advanced threats.

EventTracker Security Center
EventTracker Security Center is one platform for all critical SIEM capabilities necessary for real-time security monitoring, advanced threat detection and response, and audit-ready compliance. With Security Center, you are able to quickly identify security threats, malware, unusual behavior and suspicious network traffic, and respond more effectively.

EventTracker SIEMphonic
EventTracker SIEMphonic is our Co-Managed SIEM service that functions as an extension of your team to strengthen defenses, respond in real-time, control costs, and optimize your team's abilities. EventTracker SIEMphonic is includes our own award-winning platform that has been included in the Gartner Magic Quadrant for SIEM for 11 consecutive years. Whether on-premise or in the cloud, our 24/7 ISO/IEC 27001-certified Security Operations Center (SOC) provides expertise so you can focus on the unique requirements of your organization.

The IBM QRadar security and analytics platform is a lead offering in IBM Security's portfolio. This family of products provides consolidated flexible architecture for security teams to quickly adopt log management, SIEM, user behavior analytics, incident forensics, and threat intelligence and more. As an integrated analytics platform, QRadar streamlines critical capabilities into a common workflow, with tools such as the IBM Security App Exchange ecosystem and Watson for Cyber Security cognitive capability.

With QRadar, you can decrease your overall cost of ownership with an improved detection of threats and enjoy the flexibility of on-premise or cloud deployment, and optional managed security monitoring services.

Splunk software has been around since 2006 and the company has since grown to become an industry leader. Splunk's vision is to make machine data accessible, usable and valuable to everybody. The company offers a wide range of products to turn machine data into valuable information by monitoring and analyzing all activities. This is known as Operational Intelligence and is the unique value proposition of Splunk.

Splunk is well-known for its Log Management capabilities and also for its Security Information and Event Management (SIEM) solutions.

Offer
Learn more about EventTracker
Learn more about IBM QRadar
Learn more about Splunk
Sample Customers
The Salvation Army, The FRESH Market, Pacific Western Bank, AAOS, Vanderbilt University, TalbotsClients across multiple industries, such as energy, financial, retail, healthcare, government, communications, and education use QRadar.Splunk has more than 7,000 customers spread across over 90 countries. These customers include Telenor, UniCredit, ideeli, McKenney's, Tesco, and SurveyMonkey.
Top Industries
VISITORS READING REVIEWS
Manufacturing Company28%
Financial Services Firm26%
Comms Service Provider21%
University5%
REVIEWERS
Financial Services Firm26%
Transportation Company15%
Security Firm6%
Comms Service Provider6%
VISITORS READING REVIEWS
Financial Services Firm22%
Comms Service Provider11%
Manufacturing Company9%
Integrator9%
REVIEWERS
Financial Services Firm19%
Energy/Utilities Company15%
Retailer13%
Insurance Company8%
VISITORS READING REVIEWS
Financial Services Firm17%
Healthcare Company12%
Comms Service Provider11%
Manufacturing Company10%
Find out what your peers are saying about IBM QRadar vs. Splunk and other solutions. Updated: July 2019.
354,017 professionals have used our research since 2012.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Sign Up with Email