IBM Security QRadar Implementation Team

Frank Eargle - PeerSpot reviewer
Information Security Engineer at Glasshouse Systems

Based on the size and the number of use cases, the solution's deployment can take three or four days to a few months.

View full review »
Anto Sebastin - PeerSpot reviewer
Technical Presales Engineer at Redington India Limited

The deployment takes almost half a day. If the environment is good, we can deploy the solution in 25 to 30 minutes. It will be helpful to have people who have knowledge of malware analysis and know specific languages that are relevant to the domain to deploy the tool.

View full review »
KM
Head of Cyber security analysis at DNV Poland Sp. z o.o.
Buyer's Guide
IBM Security QRadar
March 2024
Learn what your peers think about IBM Security QRadar. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
770,292 professionals have used our research since 2012.
YE
Technical Analyst at a manufacturing company with 10,001+ employees

An in-house team that handles integrations was responsible for implementing the solution. Myself and other cybersecurity analysts participated with the team.

A team of three engineers handle ongoing maintenance for our large environment. 

View full review »
Artur Marzano - PeerSpot reviewer
Security Analyst at Localiza

We used a partner company here called IT.eam, which helped us with the deployment. They are very capable and professional and it's been overall a great experience.

View full review »
Mohamed Elprince - PeerSpot reviewer
SOC Manager at ALEXBANK

The deployment took around two to three days and we did it ourselves in-house. We simply downloaded the application and went from there following the deployment process.

View full review »
Elshaday Gelaye - PeerSpot reviewer
Lead Technical Architec at Commercial Bank of Ethiopia

The initial setup was configured in Linux on the server. We had a technical guy from IBM who came from Kenya. We only prepared the environment, like setting up the rack, but an IBM technician took care of the implementation. We also rely on the vendor for support and activities that require professional expertise.

View full review »
it_user1369023 - PeerSpot reviewer
Senior Manager Information Security at Conduent (formerly Xerox Services)

It was implemented by team that included me. We have an external team for its maintenance.

View full review »
Du Hoac Kim - PeerSpot reviewer
Deputy Manager at sacombank

We used a vendor team to assist us in the process of deployment.

View full review »
Yaw Agyare - PeerSpot reviewer
Managing Director at Volta River Authority

We implemented it through a vendor team.

View full review »
DipeshBhawsar - PeerSpot reviewer
Archtect at a financial services firm with 1,001-5,000 employees

We did a direct integration.

View full review »
AK
Works

As integrators, we can help advise clients and assist in the deployment process.

View full review »
RU
Senior Solutions Architect at a manufacturing company with 51-200 employees

We have been managing some of the security tools for the past 11 years. We have expert engineers who can help our customers with installation, configuration, planning, designing, and other things.

If you have an environment of 5,000 or 10,000 devices, three to five people should be enough to manage it.

View full review »
Khalid Majeed - PeerSpot reviewer
Cyber Security Consultant at Software Productivity Strategists, Inc. (SPS)

As implementors, we can implement the solution for our clients. 

View full review »
AK
Cyber Security Consultant at raf

We completed the implementation and deployment ourselves.

View full review »
Ertugrul Akbas - PeerSpot reviewer
Manager at ANET

We used a consultant that help us deploy and do maintenance for IBM QRadar User Behavior Analytics.

View full review »
DS
SOC Team Lead at a financial services firm with 1,001-5,000 employees

We did use a consultant to do the deployment and we only needed one technician.

View full review »
CM
Security Operations Manager at a comms service provider with 501-1,000 employees

We did not use an integrator or consultant for the deployment. We handled it ourselves, with our own staff. Everything was done in-house.

View full review »
AM
Senior Cyber Security Expert at a security firm with 11-50 employees

Setting it up requires an assistant like us. QRadar plays a role there, but that's not enough. There is also the language barrier. Not every Hungarian company is good in English, and IBM naturally doesn't have full Hungarian support.

It requires cooperation between clients and us. Typically, we send a team of five people that includes tech guys, a project manager, and maybe one process guy, if needed. Generally, you don't have 360-degree professionals, so you have someone good in networking, someone good in log management or log analysis, and so on. Because of that, we need this kind of team. 

The client also has a few people. Typically, we send in more people than the client. These are not full-time people on our side and client-side. 

View full review »
ÖO
B.T. Güvenlik Yöneticisi at a energy/utilities company with 10,001+ employees

We have a technology company, and we are working with them for deployment and maintenance. They spend one or two hours per week maintaining this solution.

View full review »
JR
Cybersecurity Business Development Manager at a comms service provider with 10,001+ employees

We do the deployment for the solution.

View full review »
DD
Head of IT Security, Governance and Compliance at a consumer goods company with 10,001+ employees

The company that we subscribe to for this service takes care of the installation, maintenance, and management of it. They give us updates that concern the features we use, so the maintenance doesn't affect us much.

View full review »
UzairKhan - PeerSpot reviewer
Business General Manager at Mutex Systems

We implement this product for our clients.

View full review »
VK
AVP - Cyber Secuirty at Cloud4C Services

We made use of an integrator. 

View full review »
AI
Chief Technology Officer at a tech services company with 51-200 employees

We used a consultant to assist with the installation of this solution.

View full review »
SD
IM Operations Manager at a tech services company with 1,001-5,000 employees

You need application and hardware leads, firewall administrators, network engineers, and server administrators to complete the implementation.

View full review »
MI
Certified AIX I.T Manager at a financial services firm with 10,001+ employees

I implemented this solution myself. 

View full review »
MA
Information Security Manager at a comms service provider with 1,001-5,000 employees

When choosing a vendor, we always consider:

  • Scalability
  • Diversity of Connecting Systems
  • Storage
View full review »
JT
Solution Architect at Ostec

We handled the solution in-house. We did not need outside assistance. 

View full review »
Kamal Abdelrahman - PeerSpot reviewer
Country Manager at Magarah

The implementation needs a technical team and we have two engineers for the implementation and maintenance.

View full review »
PP
Management Executive at a security firm with 11-50 employees

We handle deployments for our clients. Occasionally we need outside assistance. 

View full review »
Md Saiful Hyder - PeerSpot reviewer
AGM, Enterprise Solutions at Omgea Exim Ltd

From a product perspective, we have three persons in the product team. However, in the deployment and support team, we have five people. We tend to sell and help implement this product to our customers.

View full review »
AS
Co-owner and CEO at Data Security Solutions

A lot of such innovations or implementations initially can be done by one person, two persons, or maybe a team of five dedicated administrators who later on will be using this technology or solution. You need to understand that there are different roles of people who are working with cybersecurity and threat management, such as an analyst, a simple technical maintenance performer, an administrator, a user behavior analyst, etc.

View full review »
BK
Program Manager at a tech services company

We do the implementation in-house. I am the program manager and I lead the model from inception to completion. That said, we have to connect with the IBM team to assist with integrating the solution. We're getting pretty good support from them.

View full review »
it_user797751 - PeerSpot reviewer
Security Consultant at Varutra Consulting

We have a security consultant for our deployments. 

We haven't deployed yet, but our client has deployed IBM QRadar. We have been monitoring it, creating rules, and fine tuning it. These are my responsibility with respect to QRadar. 

I did not get opportunity or experience to deploy the QRadar into the client's environment.

View full review »
PD
Assistant Engineer at Harel Mallac Technologies Ltd

I do the implementation and maintenance of the solution.

View full review »
SU
Team Lead - Information Security at a computer software company with 10,001+ employees

We handled the deployment with the assistance of a vendor partner. 

View full review »
GO
Marketing Director at a aerospace/defense firm with 1-10 employees

We used an integrator for the deployment. The experience was excellent, outstanding.

View full review »
it_user163854 - PeerSpot reviewer
Security Solution Architect with 1,001-5,000 employees

We implemented it ourselves. Initial seat of pants approach. Worked. I got my Redhat builder to spin up the two VM servers off the supplied image, licensed them, gave them the appropriate IP addresses, created the deployment (the Java 7 bit) and the system started receiving logs from the 1200 CISCO routers.

View full review »
AF
Cyber Security Specialist at AEC

We implemented through a vendor. I am one of the integrators.

Our requirements are dependent on the size of the deployment and maintenance case, depending on how large of an enterprise solution we are speaking about. The size of the architecture, or for example if the architecture is all in one including the processor, including the QNI and the connector all with one box. A deployment of this type would only require one guy for it if the architecting dissipating these items comes from the all in one box.

View full review »
Kamal Abdelrahman - PeerSpot reviewer
Country Manager at Magarah

We have three people that are supporting IBM QRadar User Behavior Analytics.

View full review »
TG
Sr. Information Security Analyst at a insurance company with 51-200 employees

We had a third party vendor to complete the installation, so it wasn't bad.

View full review »
it_user970365 - PeerSpot reviewer
Cybersecurity Practice Lead at a tech services company with 201-500 employees

We are directly in touch with IBM and we have an IBM security specialist. He usually gives us pointers and he's the one who also gave us a little bit of training and knowledge transfer.

View full review »
TM
Senior Cybersecurity Consultant at CIA Botswana

I'm the consultant so we do the implementation ourselves. 

View full review »
MB
Information Security Leader at a computer software company with 1,001-5,000 employees

You can implement it by yourself.

View full review »
RR
IT Security Manager at a tech services company with 201-500 employees

We use the vendor for everything. That is the style of the corporation. For these jobs the responsibility and knowledge is on the vendor's side.

View full review »
OU
Technical Consultant at activedge

Implementation was done in-house.

View full review »
DA
Senior Server Security Engineer

We deploy it for our clients.

View full review »
BT
Assistant IT Manager at a insurance company with 1,001-5,000 employees

We installed this solution with the help of a consultant.

View full review »
OO
Cyber threat Intelligence Manager at CyberLab Africa

We used consultants for the implementation. We have five engineers that do the maintenance of this solution.

View full review »
MH
Team Lead & Principal Software Engineer at a tech services company with 51-200 employees

Our in-house team assists our customers with deployment. Our customers are the main POC and we are able to deploy into their environment, make necessary integrations, and create the rules.

View full review »
EK
Network & Cyber Security Engineer at a manufacturing company with 1,001-5,000 employees

We have almost ten engineers for IT sites.

View full review »
it_user197457 - PeerSpot reviewer
IT Security Manager at a tech services company

We used a partner and vendor team and we have expertise in-house.

View full review »
OO
Founder at a university with 11-50 employees

We implemented it ourselves.

View full review »
DS
Works at a tech services company with 11-50 employees

We deployed IBM QRadar ourselves. We have technicians. We bill the client and do the installation on our own, along with other IBM products

View full review »
GC
Queretaro at a tech services company with 1-10 employees

The deployment can be done in-house.

View full review »
MA
General Manager at New System Engineering

We have two engineers that are proficient in QRadar, and we handle the implementation for our customers.

View full review »
it_user934623 - PeerSpot reviewer
Senior Information Security Analyst at a financial services firm with 501-1,000 employees

We used our own people and the certified IBM vendor for the implementation. We had a very good experience with them. 

View full review »
it_user956985 - PeerSpot reviewer
Sr. Security Engineer at OmnitechIT

We used a consultant to assist us with the implementation of this solution.

View full review »
AS
Cyber Security Team Leader at a tech services company with 501-1,000 employees

We did the integration ourselves. It was straightforward. 

View full review »
Buyer's Guide
IBM Security QRadar
March 2024
Learn what your peers think about IBM Security QRadar. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
770,292 professionals have used our research since 2012.