IBM QRadar Primary Use Case

DAX Paulino
Cybersecurity Practice Lead at a tech services company with 201-500 employees
We are using it for SIEM, for Security Information and Event Management. We're gathering the logs and doing analytics on how we are going to react to security incidents. View full review »
BALA
Program Manager at a tech services company
Our primary use case for this solution is compliance. View full review »
Vulnera08667
Vulnerability Manager at a tech services company with 51-200 employees
Our primary use case is to get logs mainly from firewalls, although you can also get logs from anything that can forward syslogs. We use it to sort events. View full review »
Find out what your peers are saying about IBM, Splunk, LogRhythm and others in Security Information and Event Management (SIEM). Updated: October 2019.
372,374 professionals have used our research since 2012.
Cyberspec67
Cyber Security Specialist at AEC
We are a reseller of this solution. We have numerous uses cases all dependant on the needs of our customers. View full review »
Omar Sánchez (Mr.Tech)
Information Security Advisor, CISO & CIO, Docutek Services at Docutek Services
My primary use case for this solution is to monitor security events in our cloud environment. View full review »
Larbi Belmiloud
Security Engineer at a tech services company with 11-50 employees
The primary use of the solution in our deployment was for threat detection. View full review »
Dameer Siddiqui
Senior Associate Consultant at Skill Orbit (Pvt.) Ltd.
We are partners with IBM. We do simulations for our clients. Then we resolve the issue that they're facing using IBM QRadar. View full review »
SenSec321
Senior Security Architect at a tech services company with 10,001+ employees
My primary use case is for security monitoring. We activated freeze, proxy and firewalls and we collect data from them. We receive alerts and customize that according to our customer environments. View full review »
QRadar677
B.T. Güvenlik Yöneticisi at a recruiting/HR firm with 10,001+ employees
Our primary use for this solution is to collect and correlate our logs. We also create appropriate alarms based on the contents of the logs. View full review »
D.M.Hashim-Ul- Alom
Senior Server Security Engineer
Our primary use case of this solution is to identify threats. View full review »
Damian Scott
Sr SIEM Consultant at a tech services company with 51-200 employees
As a PS consultant on projects where the customer is transitioning from a competitor's SIEM to QRadar, they are very pleased when they see the number of quality offenses being caught soon after implementation and integration of log sources just from the out-of-the box rules enabled by default. View full review »
Nimesh Bhatia
IT Security and Business Development Manager at a tech services company with 51-200 employees
Our primary use case is for the security. We use it to make sure that the data that is being transferred from one company to the other is being done securely. View full review »
SrSecAnalyst918
Sr. Security Analyst with 1,001-5,000 employees
In recent years, our focus has been the third-party integrations. Like most companies, we have several security products. (I hope most other companies are not relying on a single product). The challenge with a SIEM is taking the data produced by a log source and presenting it in a readable manner for technical and non-technical staff. That can be done with custom-built reports or in dashboards. With the IBM Security App Exchange you add a new extension (i.e. download from the App Exchange site) and configure it. View full review »
Reviewer258
Managing Director at a tech services company with 1,001-5,000 employees
The primary use case for us is the plug and play implementation and it is pretty easy to set it up, and scale up the SIEM. It has a kind of a functionality to it. View full review »
FarhanAli
Security Analyst at a security firm with 11-50 employees
SIEM solutions must be business driven. Utilizing a SIEM solution depends on your enterprise goals, from meeting compliance requirements to implementing security controls and identifying the absence of controls. A SIEM solution can also be used to improve your business and increase your sales. With QRadar, you can do all these, even if you are not a security expert. It comes with a set of default rules which makes your life easier, from ransomware attacks to DDoS attacks. Everything can be detected if your logs are properly integrated into QRadar. It gets better with extensions and other rules you install from the IBM Security App Exchange, where you can detect malicious website access (with the intent of ransomware), P2P activity, or someone spamming everything. You can be notified, then you can run scripts to make QRadar take an action. I am a security analyst working with QRadar. View full review »
Srijan-Sivakumar
Director of Market Enabling Solutions at a tech services company with 51-200 employees
Its primary use case is for people who want to manage all of their logs with analytics and correlate that between different security devices whose logs are related. This solution is performing well. View full review »
QRadar6777
Chief Technology Officer at a tech services company with 51-200 employees
We are a cybersecurity service provider, and I manage the QRadar service for my customers. View full review »
Mathieu Dorckel
Cybersecurity Engineer Consultant at a tech services company with 501-1,000 employees
My use case is the deployment of an X-Force successful connection with a botnet and malware website. An X-Force feed is free with QRadar. I have been using the product for three years now. I used it for six month at an internship to PoC some different SIEM and for two and a half years as an administrator. Now, I am using it as an architect. View full review »
Onyegbule Uche
Technical Consultant at Activedge Technologies
I'm the technical consultant here at ActivEdge Technologies. Our primary use case for this solution is for Security Intelligence and Event Monitoring (SIEM) p. We provide protection services models for an organization's networks through a sophisticated technology which permits a proactive security posture. We have a business relationship with IBM QRadar as well as being a partner. We are a partner and we also use this feature. It's an integrated solution. We design it to be compatible with our client's network devices to maintain real-time monitoring through a centralized console. Our clients rely on us to create value. View full review »
MazenHindawi
Network and Security Technical Team Leader at a wholesaler/distributor with 201-500 employees
We work with it in the banking sector. We had torrent limitations and big banks could join them. It has performed well. However, the limitation is not easy, so the product is not easy. You cannot get the real value of the product unless you combine it with the other products from IBM, like BigFix, the full integration of Vulnerability Management, and so on. View full review »
Reviewer5570
Information Security Manager at a comms service provider with 1,001-5,000 employees
We are a telecom company, and we use it for IT systems, for telecom systems and on various different levels of applications. We use it for web servers, routers, firewalls, and other security components. Our SIEM solution serves technical and non technical business units including customer care, engineering, revenue assurance, and anti fraud. View full review »
Trust Mapoka
Managing Director at CIA Botswana
Our primary use case if for security analytics. We do investigation and security analytics, so we collect events and after collecting events we give positive security analytics to clients. View full review »
Luis Yndigoyen
Partner at a tech services company with 11-50 employees
* Origination process in banks. * Insurance claims on insurance companies. View full review »
Harshit Jaiswal
Security Consultant at Varutra Consulting
We use it to detect security incidents. View full review »
Marketdir9846
Marketing Director at a aerospace/defense firm with 1-10 employees
We don't have a business relationship with IBM QRadar, our relationship is a customer relationship. We use IBM QRadar as our primary security solution. View full review »
Shaikh Jamal Uddin
Senior Information Security Consultant at Secure Coat
Find the malicious activity via filter, don't rely on the rules which trigger the offenses and fix the suspicious activities. View full review »
Senio9887
Senior Information Security Analyst at a tech services company with 501-1,000 employees
Our primary use case of this solution is for our customer's operations. View full review »
Mohamed AFEILAL
Director General at New System Engineering
We are a partner and provide this solution to our customers. View full review »
Mika Suomu
Cloud Security Architect at a tech company with 201-500 employees
It is under a non-disclosure agreement (NDA). View full review »
Rajeev MM
Senior Analyst at a tech services company with 201-500 employees
The primary use case is for insurance and product manufacturing. We use it to create rules and Windows firewalls. View full review »
senior0997
Senior Field Manager at a tech services company
It is a requirement for all of the banks to have a security solution in Pakistan. That is the reason most of the banks are using it. In the last one and a half years, Pakistani companies are taking security very seriously, so for that reason, they evaluate these solutions. All in all, it's a good solution. View full review »
Rossella Falcone
Sr. Security Engineer at OmnitechIT
Our primary use case for this solution for the management of our security services, and our NOC (Network Operations Center) services. View full review »
reviewer843297
Manager, Cybersecurity at a tech company with 11-50 employees
We used QRadar SIEM over Juniper Secure Analytics platform. The company profile is telecom. The infrastructure has a large geographical spread. View full review »
Daniel Christian
Operations Analyst at a logistics company with 51-200 employees
I used the IBM QRadar product from 2015 until 2017. View full review »
GHASSAN MORKOS
Solution Architect with 201-500 employees
* Users' behavior analytics * Monitor leakage for data * Payment card industry compliance * Integration with end points management system * Integration with Incident Response and Ticketing System View full review »
Yong Chen
Security Consultant at a tech services company with 11-50 employees
I use it to analyze incidents. View full review »
Nizar Hedhili
General Manager with 11-50 employees
* CRM and billing system * 100 multiple technology servers: Windows AD, Linux, HP-UX, etc. * 40 firewall multiple routers * Cisco Nexus switches View full review »
Vik Solem
President, Consultant, Trainer at MEI Security
We use this solution for log correlation and alerting. View full review »
Find out what your peers are saying about IBM, Splunk, LogRhythm and others in Security Information and Event Management (SIEM). Updated: October 2019.
372,374 professionals have used our research since 2012.
Sign Up with Email