2020-05-11T06:07:00Z

What do you like most about IBM Security QRadar?

Julia Miller - PeerSpot reviewer
  • 0
  • 10
PeerSpot user
18

18 Answers

CV
Real User
Top 5
2023-02-13T20:28:45Z
Feb 13, 2023

What's most valuable in IBM QRadar User Behavior Analytics is its higher availability than other tools.

Search for a product comparison
Mohamed Elprince - PeerSpot reviewer
Real User
Top 10
2022-12-13T09:33:47Z
Dec 13, 2022

The most valuable feature is the machine learning module.

Du Hoac Kim - PeerSpot reviewer
Real User
Top 10
2022-11-10T16:23:17Z
Nov 10, 2022

The most valuable feature currently is security behaviors and the pdf files.

YE
Real User
Top 20
2022-09-30T13:51:58Z
Sep 30, 2022

Blocks of predefined conditions can be used to configure detection rules without having to write complicated script.

EM
Real User
Top 20
2022-07-27T20:23:37Z
Jul 27, 2022

It'll get you from point A to B.

DS
Reseller
2022-07-21T08:07:11Z
Jul 21, 2022

QRadar UBA's most valuable feature is the risk rating of users depending on their behavior.

Learn what your peers think about IBM Security QRadar. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,386 professionals have used our research since 2012.
willie.Na. - PeerSpot reviewer
Real User
Top 5
2022-06-21T05:59:23Z
Jun 21, 2022

The timeline and machine learning features are great.

KM
Real User
Top 5
2022-06-07T16:25:00Z
Jun 7, 2022

It's hard for me to pinpoint any one feature that's most valuable because it is all about consuming logs and analyzing them. We started using QRadar UBA because we needed something that could analyze Linux authentication information. Other products take care of the Windows platform.

Lokesh Puthalapattu - PeerSpot reviewer
Real User
Top 5
2022-05-01T05:38:22Z
May 1, 2022

I have used IBM QRadar User Behavior Analytics in a Cloud Pak on Amazon, and there it runs on top of it and is easy to assess. Additionally, I have installed processes and characters.

Kamal Abdelrahman - PeerSpot reviewer
Real User
2022-02-15T12:37:14Z
Feb 15, 2022

IBM QRadar User Behavior Analytics has easy architecture, has a good portfolio and integration.

MM
Real User
2020-10-08T07:25:22Z
Oct 8, 2020

Integration is very easy and the reporting is good.

EK
Real User
2020-09-27T04:10:00Z
Sep 27, 2020

It provides many options for searching. I can see devices from different vendors, like Cisco, in one interface, which is good for me.

DP
Reseller
Top 5Leaderboard
2020-09-09T06:28:59Z
Sep 9, 2020

The feature that I find the most useful is that IBM QRadar User Behavior Analytics is free of charge. It's a fully free product that can be installed on top of IBM QRadar SIEM.

it_user1379427 - PeerSpot reviewer
Real User
2020-07-13T06:55:00Z
Jul 13, 2020

I really like the feature we have with the logs, that if there are any credit card numbers being used, like a PII, you can just use rejects and you can mask it. This is a really good feature in QRadar.

BB
Real User
2020-06-28T08:51:00Z
Jun 28, 2020

It has a powerful GUI where you can put together your use cases, and don't have to write your own scripts.

SO
Real User
2020-06-15T07:33:00Z
Jun 15, 2020

QRadar shows very effective correlations. If you combine all the logins plus user behavior and the current intelligence, it gives a very good correlation for business. I think it reduces the false positives in user activity monitoring because there is a lot of social information to correlate with other data.

VB
Real User
2020-05-12T05:43:00Z
May 12, 2020

In terms of the most valuable features, the log collections and log processing mechanisms are good. They have good dashboards.

NM
Reseller
2020-05-11T06:07:00Z
May 11, 2020

Most of the features are good. It is an excellent solution.

IBM Security QRadar is a security and analytics platform designed to defend against threats and scale security operations. This is done through integrated visibility, investigation, detection, and response. QRadar empowers security groups with actionable insights into high-priority threats by providing visibility into enterprise security data. Through centralized visibility, security teams and analysts can determine their security stance, which areas pose a potential threat, and which areas...
Download IBM Security QRadar ReportRead more

Related Q&As