IBM Security QRadar

IBM QRadar is designed to collect logs, events, network flows and user behavior across your entire enterprise, correlates that against threat intelligence and vulnerability data to detect known threats, and applies advanced analytics to identify anomalies that may signal unknown threats. The solution then uniquely connects the end-to-end chain of activity associated with a single potential incident, and provides prioritized alerts based on severity, helping quickly uncover critical threats while reducing false positives.

Languages supported: German, English, French, Italian, Japanese, Korean, Portuguese, Russian, Spanish, Chinese (Simplified)

8.6/10 (Expert Score) ★★★★★
Product is rated as #12 in category Cloud Security Monitoring and Analytics Software
Ease of use
8.2
Support
8.7
Ease of Setup
8.3

Images

Check Software Images

IBM Security QRadar helps security teams accurately detect, understand and prioritize threats that matter most to the business. The solution ingests asset, cloud, network, endpoint, and user data, correlates it against vulnerability information and threat intelligence, and applies advanced analytics to identify and track the most serious threats as they progress through the kill chain.

Once a credible threat is identified, AI-powered investigations provide rapid, intelligent insights into the root cause and scope of the threat, enabling organizations to up-level their first-line security analysts, accelerate security operations processes and reduce the impact of incidents.

IBM Security QRadar
IBM Security QRadar

Show more categories

Customer Reviews

IBM Security QRadar Reviews

Jonathan S.

Advanced user of IBM Security QRadar
★★★★★
Excellent SIEM

What do you like best?

It is a very complete tool that includes the Zero Trust cybersecurity model, in addition to being incorporated with many products on the market as well as its easy handling and the components that can be incorporated. This tool has a high level of analysis of the offenses with the use of X-Force and Watson, also the generation of the graphical relationships of these offenses are very structured and allow a greater vision of each event.

What do you dislike?

Nothing so far the tool is excellent and meets all requirements.

Recommendations to others considering the product:

It is an excellent tool that has many elements that complement the management of security events. I recommend it for all types of organizations since it helps a lot with the management and monitoring of the entire infrastructure to prevent security incidents as well as to maintain an adequate level of risk and have a broader vision of the network infrastructure and services. .

What problems are you solving with the product? What benefits have you realized?

With the implementation of the solution, the adjustment of security policies has been drastically improved, as well as the monitoring and discarding of false positives in a faster and more efficient way. It has also helped us to monitor users and measure their level of risk, as well as vulnerability scans scheduled on specific dates to systems and network equipment to initiate mitigation plans for these vulnerabilities and to be able to correct them according to their level of criticality.

Review source: G2.com

Leave a reply

Your total score

B2B Software Guide