IBM Security QRadar Implementation Team
Based on the size and the number of use cases, the solution's deployment can take three or four days to a few months.
View full review »The deployment takes almost half a day. If the environment is good, we can deploy the solution in 25 to 30 minutes. It will be helpful to have people who have knowledge of malware analysis and know specific languages that are relevant to the domain to deploy the tool.
View full review »KM
Kjell Morkeng
Head of Cyber security analysis at DNV Poland Sp. z o.o.
Buyer's Guide
IBM Security QRadar
March 2024
Learn what your peers think about IBM Security QRadar. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
770,292 professionals have used our research since 2012.
YE
reviewer1974018
Technical Analyst at a manufacturing company with 10,001+ employees
An in-house team that handles integrations was responsible for implementing the solution. Myself and other cybersecurity analysts participated with the team.
A team of three engineers handle ongoing maintenance for our large environment.
View full review »We used a partner company here called IT.eam, which helped us with the deployment. They are very capable and professional and it's been overall a great experience.
View full review »The deployment took around two to three days and we did it ourselves in-house. We simply downloaded the application and went from there following the deployment process.
View full review »The initial setup was configured in Linux on the server. We had a technical guy from IBM who came from Kenya. We only prepared the environment, like setting up the rack, but an IBM technician took care of the implementation. We also rely on the vendor for support and activities that require professional expertise.
View full review »It was implemented by team that included me. We have an external team for its maintenance.
View full review »We used a vendor team to assist us in the process of deployment.
View full review »We implemented it through a vendor team.
View full review »We did a direct integration.
View full review »AK
reviewer1106787
Works
As integrators, we can help advise clients and assist in the deployment process.
View full review »RU
reviewer1524594
Senior Solutions Architect at a manufacturing company with 51-200 employees
We have been managing some of the security tools for the past 11 years. We have expert engineers who can help our customers with installation, configuration, planning, designing, and other things.
If you have an environment of 5,000 or 10,000 devices, three to five people should be enough to manage it.
View full review »As implementors, we can implement the solution for our clients.
View full review »AK
Ashok KumarLokhande
Cyber Security Consultant at raf
We completed the implementation and deployment ourselves.
View full review »We used a consultant that help us deploy and do maintenance for IBM QRadar User Behavior Analytics.
DS
reviewer1518060
SOC Team Lead at a financial services firm with 1,001-5,000 employees
We did use a consultant to do the deployment and we only needed one technician.
View full review »CM
ChrisMcAndrew
Security Operations Manager at a comms service provider with 501-1,000 employees
We did not use an integrator or consultant for the deployment. We handled it ourselves, with our own staff. Everything was done in-house.
View full review »AM
Attila Mate Kovacs
Senior Cyber Security Expert at a security firm with 11-50 employees
Setting it up requires an assistant like us. QRadar plays a role there, but that's not enough. There is also the language barrier. Not every Hungarian company is good in English, and IBM naturally doesn't have full Hungarian support.
It requires cooperation between clients and us. Typically, we send a team of five people that includes tech guys, a project manager, and maybe one process guy, if needed. Generally, you don't have 360-degree professionals, so you have someone good in networking, someone good in log management or log analysis, and so on. Because of that, we need this kind of team.
The client also has a few people. Typically, we send in more people than the client. These are not full-time people on our side and client-side.
View full review »ÖO
QRadar677
B.T. Güvenlik Yöneticisi at a energy/utilities company with 10,001+ employees
We have a technology company, and we are working with them for deployment and maintenance. They spend one or two hours per week maintaining this solution.
View full review »JR
reviewer1216545
Cybersecurity Business Development Manager at a comms service provider with 10,001+ employees
We do the deployment for the solution.
View full review »DD
reviewer1501230
Head of IT Security, Governance and Compliance at a consumer goods company with 10,001+ employees
The company that we subscribe to for this service takes care of the installation, maintenance, and management of it. They give us updates that concern the features we use, so the maintenance doesn't affect us much.
View full review »We implement this product for our clients.
View full review »VK
VijayKumar4
AVP - Cyber Secuirty at Cloud4C Services
We made use of an integrator.
View full review »AI
chieftec1015569
Chief Technology Officer at a tech services company with 51-200 employees
We used a consultant to assist with the installation of this solution.
View full review »SD
reviewer1846212
IM Operations Manager at a tech services company with 1,001-5,000 employees
You need application and hardware leads, firewall administrators, network engineers, and server administrators to complete the implementation.
View full review »MI
reviewer1026825
Certified AIX I.T Manager at a financial services firm with 10,001+ employees
I implemented this solution myself.
View full review »MA
reviewer916710
Information Security Manager at a comms service provider with 1,001-5,000 employees
When choosing a vendor, we always consider:
- Scalability
- Diversity of Connecting Systems
- Storage
JT
JohnTamakloe
Solution Architect at Ostec
We handled the solution in-house. We did not need outside assistance.
View full review »The implementation needs a technical team and we have two engineers for the implementation and maintenance.
View full review »PP
reviewer1598412
Management Executive at a security firm with 11-50 employees
We handle deployments for our clients. Occasionally we need outside assistance.
View full review »From a product perspective, we have three persons in the product team. However, in the deployment and support team, we have five people. We tend to sell and help implement this product to our customers.
View full review »AS
Andris Soroka
Co-owner and CEO at Data Security Solutions
A lot of such innovations or implementations initially can be done by one person, two persons, or maybe a team of five dedicated administrators who later on will be using this technology or solution. You need to understand that there are different roles of people who are working with cybersecurity and threat management, such as an analyst, a simple technical maintenance performer, an administrator, a user behavior analyst, etc.
View full review »BK
BALA
Program Manager at a tech services company
We do the implementation in-house. I am the program manager and I lead the model from inception to completion. That said, we have to connect with the IBM team to assist with integrating the solution. We're getting pretty good support from them.
View full review »We have a security consultant for our deployments.
We haven't deployed yet, but our client has deployed IBM QRadar. We have been monitoring it, creating rules, and fine tuning it. These are my responsibility with respect to QRadar.
I did not get opportunity or experience to deploy the QRadar into the client's environment.
View full review »PD
ParveshDhurmea
Assistant Engineer at Harel Mallac Technologies Ltd
I do the implementation and maintenance of the solution.
View full review »SU
reviewer1136397
Team Lead - Information Security at a computer software company with 10,001+ employees
We handled the deployment with the assistance of a vendor partner.
View full review »GO
Marketdir9846
Marketing Director at a aerospace/defense firm with 1-10 employees
We used an integrator for the deployment. The experience was excellent, outstanding.
View full review »We implemented it ourselves. Initial seat of pants approach. Worked. I got my Redhat builder to spin up the two VM servers off the supplied image, licensed them, gave them the appropriate IP addresses, created the deployment (the Java 7 bit) and the system started receiving logs from the 1200 CISCO routers.
View full review »AF
Cyberspec67
Cyber Security Specialist at AEC
We implemented through a vendor. I am one of the integrators.
Our requirements are dependent on the size of the deployment and maintenance case, depending on how large of an enterprise solution we are speaking about. The size of the architecture, or for example if the architecture is all in one including the processor, including the QNI and the connector all with one box. A deployment of this type would only require one guy for it if the architecting dissipating these items comes from the all in one box.
We have three people that are supporting IBM QRadar User Behavior Analytics.
View full review »TG
reviewer1168407
Sr. Information Security Analyst at a insurance company with 51-200 employees
We had a third party vendor to complete the installation, so it wasn't bad.
View full review »We are directly in touch with IBM and we have an IBM security specialist. He usually gives us pointers and he's the one who also gave us a little bit of training and knowledge transfer.
View full review »TM
Dr Trust Tshepo Mapoka
Senior Cybersecurity Consultant at CIA Botswana
I'm the consultant so we do the implementation ourselves.
View full review »MB
reviewer952638
Information Security Leader at a computer software company with 1,001-5,000 employees
You can implement it by yourself.
View full review »RR
reviewer1665357
IT Security Manager at a tech services company with 201-500 employees
We use the vendor for everything. That is the style of the corporation. For these jobs the responsibility and knowledge is on the vendor's side.
View full review »OU
Onyegbule Uche
Technical Consultant at activedge
Implementation was done in-house.
View full review »DA
D.M.Hashim-Ul- Alom
Senior Server Security Engineer
We deploy it for our clients.
View full review »BT
reviewer594315
Assistant IT Manager at a insurance company with 1,001-5,000 employees
We installed this solution with the help of a consultant.
View full review »OO
Olakanmi Oluwole
Cyber threat Intelligence Manager at CyberLab Africa
We used consultants for the implementation. We have five engineers that do the maintenance of this solution.
View full review »MH
reviewer1022949
Team Lead & Principal Software Engineer at a tech services company with 51-200 employees
Our in-house team assists our customers with deployment. Our customers are the main POC and we are able to deploy into their environment, make necessary integrations, and create the rules.
View full review »EK
ErayKaraoglu
Network & Cyber Security Engineer at a manufacturing company with 1,001-5,000 employees
We have almost ten engineers for IT sites.
View full review »We used a partner and vendor team and we have expertise in-house.
View full review »OO
Oscar Orellana
Founder at a university with 11-50 employees
We implemented it ourselves.
View full review »DS
Dameer Siddiqui
Works at a tech services company with 11-50 employees
We deployed IBM QRadar ourselves. We have technicians. We bill the client and do the installation on our own, along with other IBM products
View full review »GC
reviewer1385793
Queretaro at a tech services company with 1-10 employees
The deployment can be done in-house.
View full review »MA
MohamedAfeilal
General Manager at New System Engineering
We have two engineers that are proficient in QRadar, and we handle the implementation for our customers.
View full review »We used our own people and the certified IBM vendor for the implementation. We had a very good experience with them.
View full review »We used a consultant to assist us with the implementation of this solution.
View full review »AS
reviewer841053
Cyber Security Team Leader at a tech services company with 501-1,000 employees
We did the integration ourselves. It was straightforward.
View full review »Buyer's Guide
IBM Security QRadar
March 2024
Learn what your peers think about IBM Security QRadar. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
770,292 professionals have used our research since 2012.