IBM QRadar Implementation Team

DAX Paulino
Cybersecurity Practice Lead at a tech services company with 201-500 employees
We are directly in touch with IBM and we have an IBM security specialist. He usually gives us pointers and he's the one who also gave us a little bit of training and knowledge transfer. View full review »
BALA
Program Manager at a tech services company
We do the implementation in-house. I am the program manager and I lead the model from inception to completion. That said, we have to connect with the IBM team to assist with integrating the solution. We're getting pretty good support from them. View full review »
Cyberspecial9875
Cyber Security Specialist at a manufacturing company with 1,001-5,000 employees
We implemented through a vendor. I am one of the integrators. Our requirements are dependent on the size of the deployment and maintenance case, depending on how large of an enterprise solution we are speaking about. The size of the architecture, or for example if the architecture is all in one including the processor, including the QNI and the connector all with one box. A deployment of this type would only require one guy for it if the architecting dissipating these items comes from the all in one box. View full review »
Find out what your peers are saying about Splunk, LogRhythm, IBM and others in Security Information and Event Management (SIEM). Updated: June 2019.
347,745 professionals have used our research since 2012.
Dameer Siddiqui
Senior Associate Consultant at Skill Orbit (Pvt.) Ltd.
We deployed IBM QRadar ourselves. We have technicians. We bill the client and do the installation on our own, along with other IBM products View full review »
QRadar677
B.T. G├╝venlik Y├Âneticisi at a recruiting/HR firm with 10,001+ employees
We have a technology company, and we are working with them for deployment and maintenance. They spend one or two hours per week maintaining this solution. View full review »
D.M.Hashim-Ul- Alom
Senior Server Security Engineer
We deploy it for our clients. View full review »
QRadar6777
Chief Technology Officer at a tech services company with 51-200 employees
We used a consultant to assist with the installation of this solution. View full review »
Onyegbule Uche
Technical Consultant at Activedge Technologies
Implementation was done in-house. View full review »
Phillip Okemwa
Senior Information Security Analyst at a financial services firm with 501-1,000 employees
We used our own people and the certified IBM vendor for the implementation. We had a very good experience with them. View full review »
Reviewer5570
Information Security Manager at a comms service provider with 1,001-5,000 employees
When choosing a vendor, we always consider: * Scalability * Diversity of Connecting Systems * Storage View full review »
Trust Mapoka
Managing Director at CIA Botswana
I'm the consultant so we do the implementation ourselves. View full review »
Harshit Jaiswal
Security Consultant at Varutra Consulting
We have a security consultant for our deployments. We haven't deployed yet, but our client has deployed IBM QRadar. We have been monitoring it, creating rules, and fine tuning it. These are my responsibility with respect to QRadar. I did not get opportunity or experience to deploy the QRadar into the client's environment. View full review »
Marketdir9846
Marketing Director at a aerospace/defense firm with 1-10 employees
We used an integrator for the deployment. The experience was excellent, outstanding. View full review »
Senio9887
Senior Information Security Analyst at a tech services company with 501-1,000 employees
We did the integration ourselves. It was straightforward. View full review »
Mohamed AFEILAL
Director General at New System Engineering
We have two engineers that are proficient in QRadar, and we handle the implementation for our customers. View full review »
Youssef Boukari
IT Security Manager at a tech services company
We used a partner and vendor team and we have expertise in-house. View full review »
Rossella Falcone
Sr. Security Engineer at OmnitechIT
We used a consultant to assist us with the implementation of this solution. View full review »
Find out what your peers are saying about Splunk, LogRhythm, IBM and others in Security Information and Event Management (SIEM). Updated: June 2019.
347,745 professionals have used our research since 2012.

Sign Up with Email