We performed a comparison between Change Auditor for Windows File Servers and IBM Security QRadar based on real PeerSpot user reviews.
Find out what your peers are saying about Splunk, Wazuh, Datadog and others in Log Management."In terms of features, the querying is great."
"The solution's most valuable aspect is that it can be fully integrated with Microsoft solutions and it doesn't impact the productivity order."
"This solution provides me with various alarms, and I have found security issues with some of my other products."
"It provides many options for searching. I can see devices from different vendors, like Cisco, in one interface, which is good for me."
"The most valuable feature is the searching capability and real-time operational use."
"QRadar UBA's most valuable feature is the risk rating of users depending on their behavior."
"The solution is flexible and easy to use."
"The detection rate is good and the false positive rate is low."
"I think this is a good product for enterprises because of the performance and out-of-the-box rules and use cases. If they want to reach the maturity level early, they can use these out-of-the-box rules and use cases. That will help them a lot."
"It showed us where weaknesses were in our environment, so we could actively target those patches first."
"The pricing could be improved. It needs to be reduced."
"The customer service and support could improve their approach to questioning issues. They tend to ask questions one at a time, which creates a lot of back-and-forth communication."
"The product does not have a team for investigating malware."
"They should speed up the incident response and also, at the same time, reduce the amount of manual effort that is required."
"The dashboard is pathetic and it takes a long time to perform a search."
"SOAR is what is expected the most from QRadar. They have something called SOAR Resilient, and it would be great if that gets induced in SIEM. IBM QRadar (as well as McAfee ESM) should have analytics platform integration. Currently, SIEMs don't have full-fledged integration with analytics where we are able to dump our data in SIEM, and the same data can be called from different analytics applications. We should be able to bring this data to a platform like Hadoop for big data and run the analytics there. Currently, people are seeing the past data and taking some actions in the present, but when it comes to analytics, there should be futuristic data where you can predict something out of your present and past data. Apart from that, I would like to see a full-fledged ITSM tool in QRadar. It sometimes has some technical issues that need to be checked. It requires a dedicated QRadar engineer to completely manage it. It has different module sets, such as event collector and event processor, and some technical glitches come in between. It takes the log but doesn't exactly process it in the way we want."
"You can scale IBM QRadar User Behavior Analytics, but it has room for improvement."
"The solution is expensive compared to other products."
"They need to improve their threat intelligence feed and they need to improve their user behavior analytics modules."
"Whenever we are upgrading or installing any type of patch, at that time we have some delays."
More Change Auditor for Windows File Servers Pricing and Cost Advice →
Earn 20 points
Change Auditor for Windows File Servers is ranked 55th in Log Management with 2 reviews while IBM Security QRadar is ranked 6th in Log Management with 198 reviews. Change Auditor for Windows File Servers is rated 9.0, while IBM Security QRadar is rated 8.0. The top reviewer of Change Auditor for Windows File Servers writes "Provides granular queries of security logs and real-time alerting helps me mitigate risks". On the other hand, the top reviewer of IBM Security QRadar writes "A highly stable and scalable solution that provides good technical support". Change Auditor for Windows File Servers is most compared with Quest InTrust, Wazuh and Splunk Enterprise Security, whereas IBM Security QRadar is most compared with Splunk Enterprise Security, Microsoft Sentinel, Wazuh, LogRhythm SIEM and Elastic Security.
See our list of best Log Management vendors.
We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.