IBM QRadar Valuable Features
We have worked with other solutions, such as LogRhythm and Splunk. Compared to others, IBM QRadar has the best price-performance ratio so that you are able to reserve minimum costs. It starts settling in fast and gets the first results very quickly. It is also very scalable.View full review »
Security Analyst at a hospitality company with 10,001+ employees
I think the log search is pretty good. It's very easy to create complex searches and aggregate results and create graphics, etc.
The rule engine is very easy to use — very flexible. We can create rules based on whatever behavior we want. It's very easy to use compared to Splunk.
When we analyzed Splunk, that was the criteria that we looked at. Splunk was a lot more difficult to use and to create rules.
The standard rules they have are very comprehensive. There are many content packs in the apps that enrich those rules. We are still using the native rules from QRadar because there are many useful rules there. I think we're going to have a very good experience with them.View full review »
Senior IT Technical Support at a training & coaching company with 1,001-5,000 employees
Inside IBM QRadar there are a lot of engines that actually work to help us to do the correlation and normalization as well for the logs that we're receiving from multiple devices. IBM is very powerful in that regard.
QRadar, as a solution, can integrate with a lot of other applications. You can write your own custom rules if you want to. We can ask it to detect whatever we want it to, even with the devices that are not supported to send logs. IBM QRadar can understand these types of commands and we can still integrate and write our own rules to help us to detect those logs that are coming from, for example, IoT devices or from other devices that usually we don't understand.
It can handle really a huge number of logs with fewer false positives. We can use the artificial intelligence and the rules that IBM is providing to make it really smart. The solution can help you predict even the false positives when we are alerting the admin or the security admin about some offenses that we have seen from the logs.
Their product is very user-friendly.
Customer service is very good and very helpful.
The initial setup is quite straightforward.
The solution can scale.
The solution is very stable.View full review »
It is a pretty solid product for the type that it is representing i.e. SIEM. It can do automatic correlation based on the traffic that you are receiving to some extent. It has plethora of options available for third party application integration. For e.g CISCO Firepower, Palo Alto Dashboard for CISCO and Palo Alto Firewall respectively. Integration with Cloud based Log Sources is also supported via. parsers that support API Connect. This is helpful when pulling in Logs from AWS, Azure, GCP or other Cloud Based Solution like Carbon Black, Imperva etc.
The solution has very good Watson Analyzer integration. It's one of the key differentiators if you compare it to other solutions.
The solution offers very good BSM support. There's 400 BSM support out of the box. That's a huge advantage. with it, you are actually adding almost all the devices that are available in an IT environment.
This is a distributed application, meaning that a customer can stack small and then scale it so that they can expand pretty effectively. You can use, basically, the same product in an SMB or a large enterprise.
You can deploy the solution and leave it. It's very unfussy.
When it comes to deployment, it's very flexible.View full review »
In general, the product is awesome. It's almost perfect.
The most valuable aspect of the solution is the integration capabilities on offer. It's very helpful to have so many options.
The initial setup is pretty straightforward.
The stability is good.
We've found the scalability to be excellent.
It offers all of the specifications of the hardware that we need.
Senior Solutions Architect at a manufacturing company with 51-200 employees
QRadar, Splunk, and ArcSight are SIEM solutions with built-in AI/ML features. They can do the complete investigation and alert the admin about what is happening. They can also do the root cause analysis.
There are many other features that come with QRadar. It has a more granular log, so you can integrate with various non-IT as well as IT-based components. You can get unstructured data to the SIEM data, and you can identify more what is happening in the network or what is happening in the central head office. You can also identify what is happening between your remote offices. You can also use it to identify what the users in the field are doing on their devices and how things are moving.
From the integration point of view, it is very centric. It gives complete control centrally. If a user is not connected to the system, whenever he comes online, we can see the policy updates over the Internet, and we can ensure that the data that is supposed to be protected is protected.View full review »
Analyst at a tech services company with 501-1,000 employees
One very useful feature is the plug-in offering that allows you to integrate it with other solutions, such as integrating it with plug-ins like Scout, Carbon Black, and the rest. Additionally, the ability of the agents to filter using expert query to filter out the specific events you want to pick from, especially Windows log sources, is also very useful. That goes a long way in managing the EPS camp of the solution.View full review »
There are a lot of features in QRadar. App Exchange is the most valuable feature. User behavior analytics (UBA) is also a very good feature. Watson is also there, but we are not currently using Watson.
It is versatile and quite easy. It also has an all-in-one-box feature and good integration with AWS.View full review »
Head of Project office
The SOAR features are very good.
The product is able to handle special requests.
It can effectively search local files.
We are able to deploy in two or more different locations.
The solution is functional right out of the box and it's a pretty simple system with different kinds of solutions that address different types of problems.
The initial setup is pretty straightforward.
The solution is stable.
The product can scale.
Technical support is good overall.
Qradar has a lot of integration capabilities with different security products.
If we talk about functionality in general for SIEM systems, it's good.View full review »
Rama Krishna Bhaskarayani
Founder at Halainfosec
There have been many advancements made in the most recent year. There are many add-ons included in the licenses that I have yet to explore.
There have been many improvements. When I worked with this solution at the core technical level, it was a SIEM solution. Many attributes have been added, such as threat intelligence, SO solutions, automation, and OT security. Many other platforms have been included as part of IBM QRadar.
The flexibility is good in terms of pulling log files.View full review »
Information Security Specialist at a comms service provider with 501-1,000 employees
The user behavior analytics as part of our deployment was okay, even though it was clunky.
The solution can scale.View full review »
IT Security Analyst at a manufacturing company with 10,001+ employees
I have found its network traffic log, network bit log, and QBI most valuable.
We have a lot of domain controllers in QRadar tracking all the security. It is also useful for identity management.View full review »
Security Analyst at a tech services company with 51-200 employees
Most valuable features include the granularity of information. Queries provide leads for finding information. We also deal with the Symantec team, which is a different one.View full review »
We pay a little bit extra for Watson, and the Watson feature enables the analyst to go through and triage things much faster. It's quite useful for us and worth the smaller extra bit of money.
The solution is quite flexible.
We enjoy the fact that it is cloud-based.
The initial setup was very straightforward.
The solution is very scalable.
We've found the stability to be mostly very good.View full review »
Integrations are quite a useful and key feature of this solution. It has integration with the CVSS score, which is a central point for all the data and scores about the threats. There is an IBM Bluemix dashboard that is integrated with the CVSS score.View full review »
Managed Security Product at a comms service provider with 1,001-5,000 employees
The feature that I have found most valuable is its artificial intelligence component, Watson. Its contribution is pretty good from a machine-learning artificial intelligence perspective. This compliments the orchestration automation component, as well.View full review »
The solution supports MSSP models, which most service providers have. This means that a single system can be onboarded for all 200 existing customers for monitoring purposes.View full review »
Solution Architect Cybersecurity at a tech services company with 501-1,000 employees
The threat hunting capabilities in general are great.View full review »
This solution provides amazing visibility into the network and endpoints. The ability to correlate point in time and things happening over time is priceless in today's threat environment.
The rules can look for things both from log sources and from data traversing your network which is unique in the SIEM world and makes QRadar a consistent magic quadrant leader.
The QNI file hash in-flight search is helpful.
The ability to transition from microscopic to macroscopic view, instantly, is very good.View full review »
The features that I have found most valuable in QRadar are its data enrichment, use case creations, and adding references - those kinds of features are very good. Also, QRadar's event filtration and device integration are perfect.
Actually, we are looking for another product because a customer is demanding different products and they're not going with QRadar, hence we are trying to compare QRadar with other solutions like Securonix, Splunk, Exabeam, LogRhythm. Otherwise, all our customers are happy with QRadar.
I'm doing integrations and deployments for QRadar. So, in regards to integration and deployment, QRadar is very easy as compared to other products.View full review »
Information Security Manager at a comms service provider with 1,001-5,000 employees
The most valuable features are the diversity of logs type that enable us to monitors what is going on from different perspectives and reduces the likelihood that we will miss important attempts. There are different events and flows, and there is diversity from getting the information from different sources. We can also see that there are no false positives. It is well-tuned and the rules are covering everything that we need.View full review »
Head of IT Security, Governance and Compliance at a consumer goods company with 10,001+ employees
The most valuable feature is the ease of use.View full review »
General manager at a tech services company with 201-500 employees
The detection rate is good and the false positive rate is low. Having a low false-positive rate is good because it means that if an alert happens then it is very likely a real attack.
QRadar is quite flexible. Out of ten, I would rate flexibility a nine.View full review »
Ingénieur d'étude R&D at DOGA
The solution is relatively easy to use.
The product helps increase development speed.
The customization is very good, as are the dashboards and the security.View full review »
Queretaro at a tech services company with 1-10 employees
The most valuable features are the versatility of this solution and the variety of things you can do with it.View full review »
SOC Team Lead at a financial services firm with 1,001-5,000 employees
I have found the most important features to be the flexibility, tech framework, and disk manager. Additionally, the solution is easy to learn how to use it.View full review »
Deputy General Manager at a comms service provider with 5,001-10,000 employees
We are looking for the entire QRadar spectrum but it has many products. QRadar is a kind of program, we are looking for system modelling, point modelling, network side modelling similar to QRadar network inside, and the capability to correlate between the network and endpoint. Most of the SIEM's have to rely on when it comes to network side third party or separate network traffic analysis. When it comes to QRadar, they can do the correlation and not only in networks but also endpoints. This is one of the good features that we have noticed.View full review »
The price is very good. It's quite reasonable.
The solution's performance is excellent. The stability is excellent.
We've found the technical support to be very good.
The pricing is very good.View full review »
Director of Information Security at a financial services firm with 501-1,000 employees
The most valuable feature is the searching capability and real-time operational use.View full review »
Sr.Network Engineer at a computer software company with 10,001+ employees
The solution will not provide alerts in the event of any particular traffic. It will only alert in the case of a security threat.View full review »
Sr. Information Security Analyst at a insurance company with 51-200 employees
Part of the SaaS offering is the SOC service. The best part of this solution is having a third-party SOC.
It's a robust solution.View full review »
Vice President at a financial services firm with 10,001+ employees
The product provides a very defined solution. It provides a complete platform for ingesting the log, doing the correlations and handling the runtime.View full review »
This product is easy to install, integrate, and use.
It has very rich functionality.View full review »
Professional Services at a tech services company with 51-200 employees
The most valuable feature is user behavior analytics (UBA).
The EPS and FPS graphs are helpful.
The collecting of logs and processes is very good.
Shaikh Jamal Uddin
Cybersecurity Architecture and Technology Lead at Appxone
Providing real-time visibility for threat detection and prioritization - QRadar SIEM provides contextual and actionable surveillance across the entire IT infrastructure, helping organizations detect and remediate threats often missed by other security solutions. These threats can include inappropriate use of applications; insider fraud; and advanced, “low and slow” threats easily lost in the “noise” of millions of events..View full review »
Regional Director, Customer Success (GTM Solutions & Services) at a tech services company with 51-200 employees
The solution is flexible and easy to use.View full review »
Practice Head at a tech services company with 51-200 employees
The most valuable feature is the correlation function, which is flexible.
It is a bit easier to use than other products, such as Splunk or ELK Elasticsearch.
The most valuable features are log monitoring, easy-to-fix issues, and problem-solving.View full review »
I think the QDI is very good.View full review »
AVP - Security at a tech services company with 501-1,000 employees
I have found visibility very helpful for analytics.View full review »
Senior Security Engineer at a wholesaler/distributor with 10,001+ employees
One of the most valuable features of this solution is it has very good data correlation.View full review »
Cybersecurity Business Development Manager at a comms service provider with 10,001+ employees
Overall a great solution.View full review »
Pre-Sale Consultant (Technical) at a tech services company with 51-200 employees
We are using the platform version, which I like.View full review »
President, Consultant, Trainer at MEI Security
The searching capability is good.View full review »