IBM QRadar Primary Use Case

Andris Soroka
Co-owner and CEO at Data Security Solutions
I am a system integrator. We have installed it on-premises, on the cloud, in distributed environments, and all other environments for our clients. View full review »
reviewer1373244
Security Analyst at a hospitality company with 10,001+ employees
We use this solution for deploying and integrating log sources and use cases. We use it to generate offensives based on normal behavior and suspicious behavior from our security tools, firewalls, and other solutions. We have applied a set of old and new rules to QRAdar that aim to detect persistent abnormalities in our environments. Within our organization, our security operations center and users from our local security team — roughly 10 to 12 users — use QRadar. We plan to expand to other areas of the company so that other people can use QRadar for different use cases. But right now only the security teams use it. View full review »
Amit Bhatnagar
Senior Manager Information Security at Conduent (formerly Xerox Services)
We are using it from the compliance perspective. We need this solution to comply with HIPAA and PCI because our clients require HIPAA and PCI DSS compliance. We also use it for log management, primarily security logs, and to some extent, for operational activities, even though this tool is actually not meant for operational tasks. We do keep track of errors in our appliances like hardware, storage, and network switches through QRadar. The main or core solution is on-premises. There is an extended arm, which is in the cloud as well for cloud integration. View full review »
Learn what your peers think about IBM QRadar. Get advice and tips from experienced pros sharing their opinions. Updated: January 2021.
455,962 professionals have used our research since 2012.
DAX Paulino
Cybersecurity Practice Lead at a tech services company with 201-500 employees
We are using it for SIEM, for Security Information and Event Management. We're gathering the logs and doing analytics on how we are going to react to security incidents. View full review »
BALA
Program Manager at a tech services company
Our primary use case for this solution is compliance. View full review »
Vulnera08667
Vulnerability Manager at a tech services company with 51-200 employees
Our primary use case is to get logs mainly from firewalls, although you can also get logs from anything that can forward syslogs. We use it to sort events. View full review »
reviewer1318914
Information Security Specialist at a comms service provider with 501-1,000 employees
We use the solution for a variety of tasks. We use it, for example, for authentication, network-related authentication, user-related tasks, and Windows UNIX servers. It's a lot. There's a ton of use cases. I really can't sync right now about every single use case, however, the main things are authentication and network-related systems and all flavors of UNIX Windows. View full review »
Cyberspec67
Cyber Security Specialist at AEC
We are a reseller of this solution. We have numerous uses cases all dependant on the needs of our customers. View full review »
Larbi Belmiloud
Security Engineer at a tech services company with 11-50 employees
The primary use of the solution in our deployment was for threat detection. View full review »
reviewer1349439
IT Security Analyst at a manufacturing company with 10,001+ employees
We have a lot of use cases with IBM QRadar, but our primary use is for monitoring traffic and detecting tricks. View full review »
Dameer Siddiqui
Senior Associate Consultant at Skill Orbit (Pvt.) Ltd.
We are partners with IBM. We do simulations for our clients. Then we resolve the issue that they're facing using IBM QRadar. View full review »
QRadar677
B.T. Güvenlik Yöneticisi at a recruiting/HR firm with 10,001+ employees
Our primary use for this solution is to collect and correlate our logs. We also create appropriate alarms based on the contents of the logs. View full review »
D.M.Hashim-Ul- Alom
Senior Server Security Engineer
Our primary use case of this solution is to identify threats. View full review »
reviewer1397637
Vice President Derivatives Ops IT at a financial services firm with 10,001+ employees
It is used to dive deep into threat analysis. It is a SIEM solution that can be hooked up with some of the endpoint security or threat discovery solutions such as Forescout, Qualys, Sophos, and MDM. After the endpoint security or threat discovery solution discovers the threat, QRadar takes it further from that point onwards and allows you to go deep into the threat analysis. It has a lot of integrations, such as with CMDB, and it can do the asset classification. It can also tell the CVSS score. These are the capabilities or use cases. View full review »
Nimesh Bhatia
IT Security and Business Development Manager at a tech services company with 51-200 employees
Our primary use case is for the security. We use it to make sure that the data that is being transferred from one company to the other is being done securely. View full review »
Daniel Sichel
User at a healthcare company with 5,001-10,000 employees
Our primary use case is intrusion prevention and detection. We also use this solution for compliance and assisting in network troubleshooting for IT. View full review »
QRadar6777
Chief Technology Officer at a tech services company with 51-200 employees
We are a cybersecurity service provider, and I manage the QRadar service for my customers. View full review »
Onyegbule Uche
Technical Consultant at Activedge Technologies
I'm the technical consultant here at ActivEdge Technologies. Our primary use case for this solution is for Security Intelligence and Event Monitoring (SIEM) p. We provide protection services models for an organization's networks through a sophisticated technology which permits a proactive security posture. We have a business relationship with IBM QRadar as well as being a partner. We are a partner and we also use this feature. It's an integrated solution. We design it to be compatible with our client's network devices to maintain real-time monitoring through a centralized console. Our clients rely on us to create value. View full review »
reviewer916710
Information Security Manager at a comms service provider with 1,001-5,000 employees
We are a telecom company, and we use it for IT systems, for telecom systems and on various different levels of applications. We use it for web servers, routers, firewalls, and other security components. Our SIEM solution serves technical and non technical business units including customer care, engineering, revenue assurance, and anti fraud. View full review »
Dr Trust Tshepo Mapoka
Senior Cybersecurity Consultant at CIA Botswana
Our primary use case if for security analytics. We do investigation and security analytics, so we collect events and after collecting events we give positive security analytics to clients. View full review »
Francis Chapet
Ingénieur d'étude R&D at DOGA
We primarily use the solution to develop software, for some device controllers. View full review »
Harshit Jaiswal
Security Consultant at Varutra Consulting
We use it to detect security incidents. View full review »
reviewer1385793
Queretaro at a tech services company with 1-10 employees
We do not implement this tool ourselves but have experience implementing it for our clients. There are several use cases. The two most important ones are network analysis and UBA. View full review »
reviewer1477878
Director of Information Security at a financial services firm with 501-1,000 employees
The primary use case of this solution is for monitoring an enterprise data center, globally for 12,000 devices. View full review »
Marketdir9846
Marketing Director at a aerospace/defense firm with 1-10 employees
We don't have a business relationship with IBM QRadar, our relationship is a customer relationship. We use IBM QRadar as our primary security solution. View full review »
reviewer1168407
Sr. Information Security Analyst at a insurance company with 51-200 employees
The primary use case of this solution is for monitoring the network. View full review »
Kashif-Jamil
CEO at Xcelliti
We use QRadar to detect and gather information about any product vulnerabilities and any sort of attack on the network. It's able to help detect suspicious activity that is coming into the system. We are also selling this product. View full review »
Shaikh Jamal Uddin
Cybersecurity Architecture and Technology Lead at Appxone
Find the malicious activity via filter, don't rely on the rules which trigger the offenses and fix the suspicious activities. View full review »
Senio9887
Senior Information Security Analyst at a tech services company with 501-1,000 employees
Our primary use case of this solution is for our customer's operations. View full review »
MohamedAfeilal
General Manager at New System Engineering
We are a partner and provide this solution to our customers. View full review »
Rajeev MM
Senior Analyst at a tech services company with 201-500 employees
The primary use case is for insurance and product manufacturing. We use it to create rules and Windows firewalls. View full review »
senior0997
Senior Field Manager at a tech services company
It is a requirement for all of the banks to have a security solution in Pakistan. That is the reason most of the banks are using it. In the last one and a half years, Pakistani companies are taking security very seriously, so for that reason, they evaluate these solutions. All in all, it's a good solution. View full review »
Rossella Falcone
Sr. Security Engineer at OmnitechIT
Our primary use case for this solution for the management of our security services, and our NOC (Network Operations Center) services. View full review »
reviewer1382016
Pre-Sale Consultant (Technical) at a tech services company with 51-200 employees
We are a system integrator and IBM QRadar is one of the security and monitoring products that we implement for our clients. It is used for monitoring applications such as Windows virtual desktop access (VDA) and computer-managed instruction (CMI). View full review »
Yong Chen
Security Consultant at a tech services company with 11-50 employees
I use it to analyze incidents. View full review »
Vik Solem
President, Consultant, Trainer at MEI Security
We use this solution for log correlation and alerting. View full review »
Learn what your peers think about IBM QRadar. Get advice and tips from experienced pros sharing their opinions. Updated: January 2021.
455,962 professionals have used our research since 2012.