Datadog vs IBM Security QRadar comparison

Cancel
You must select at least 2 products to compare!
Datadog Logo
24,253 views|14,438 comparisons
95% willing to recommend
IBM Logo
15,094 views|9,166 comparisons
91% willing to recommend
Comparison Buyer's Guide
Executive Summary
Updated on Jul 23, 2023

We performed a comparison between IBM Security QRadar and Datadog based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.

  • Features: QRadar users say the solution provides extensive information and helpful leads for locating pertinent data. QRadar stands out with its comprehensive network visibility and strong SIEM capabilities. Datadog users like its customizable displays, error tracking, and advanced AI/ML capabilities. QRadar could improve its rule deployment and lower its false positive rate. Users would also like expanded storage capacity, streamlined user management, and a more mature architecture.  Datadog could enhance its usability and reduce its learning curve. Users said integration was another pain point.

  • Service and Support: Some QRadar customers have had trouble connecting with knowledgeable support staff and experienced delayed responses. While many users spoke highly of Datadog’s support team, others reported slow support, especially in the Asia-Pacific region.

  • Ease of Deployment: QRadar's initial setup can be complex for users without expertise, and the difficulty may vary depending on the size of the data set. Datadog’s setup is considered straightforward, and users often receive help from a partner or vendor.

  • Pricing: QRadar can be costly because users need to buy new hardware to upgrade. Opinions about Datadog's price are divided. Some users found it costly, but others thought it was acceptable. Some said the pricing model could be clearer and better explained.

  • ROI: QRadar delivers a high return on investment, improving security through its advanced user behavior analytics. Users said Datadog saved them time and improved visibility into security blind spots.

Conclusion: Users appreciate its straightforward initial setup, comprehensive documentation, and reliable support. The valuable features offered by Datadog, including dashboards, reporting, error reporting, and log centralization, are highly praised. It is also user-friendly for development teams and offers flexibility with additional features such as AI and ML capabilities. In terms of pricing, Datadog is considered reasonable compared to other solutions. Users find its customer service and support to be helpful and responsive.
To learn more, read our detailed Datadog vs. IBM Security QRadar Report (Updated: April 2024).
771,157 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The solution's SaaS model is easy to manage and works well in single- or multi-cloud environments.""It is a good one stop location where we keep all our data for our infrastructure, and it's also easier to navigate between different things.""It has provided visibility with ease of implementation and allowed multiple teams to quickly onboard it.""The most valuable feature of Datadog is its logs.""We enjoy the multistep API tests.""The ability to easily drill down into log queries quickly and efficiently has helped us to resolve several critical incidents.""Datadog is providing efficiency in the products we develop for the wireless device engineering department.""Going from viewing a metric to creating a monitor alerting on a metric is very easy."

More Datadog Pros →

"IBM Qradar's ability to simplify the number of events, not only on a technical level but by making that information easy to pan through the orchestration deduplication. It is very impressive given that we have hundreds of devices that send event logs through.""The interface is good.""The feature that I have found most valuable is how it monitors the real network. That is its leading security feature.""I think the QDI is very good.""The solution can scale.""Providing real-time visibility for threat detection and prioritization - QRadar SIEM provides contextual and actionable surveillance across the entire IT infrastructure.""The threat protection network is the most valuable feature, because when you get an offense, you can actually trace it back to where it originated from, how it originated, and why.""I think this is a good product for enterprises because of the performance and out-of-the-box rules and use cases. If they want to reach the maturity level early, they can use these out-of-the-box rules and use cases. That will help them a lot."

More IBM Security QRadar Pros →

Cons
"It would also be nice if we had more insight into our own usage of Datadog (agents and custom metrics). They provide a usage page which does help, but it is not in real-time.""The pricing is a bit confusing.""It could probably be a little bit of a better user experience.""Lately, chat support has a longer waiting time.""I found the solution to be stable, I did not experience any bugs or glitches. However, some of the managing team did.""​It would be nice to be able to graph metrics by excluding certain tags (like you can do in monitors).""I sometimes log in and see items changed, either in the UI or a feature enabled. To see it for the first time without proper communication can sometimes come as a shock.""The product could be improved by providing remote control to agents, enabling them to execute automation and collections without requiring another automation tool or integration."

More Datadog Cons →

"Technical support really needs to be improved. Right now, they aren't where they need to be at all.""The product does not have a team for investigating malware.""Whenever we are upgrading or installing any type of patch, at that time we have some delays.""It's resource-intensive.""There are areas in IBM Security QRadar that could benefit from improvement. Its ability to customize knowledge for specific purposes could be enhanced. Also, it lacks clarity in presenting details. It is also difficult to see the reports.""The solution is expensive compared to other products.""Pricing model could be more cost-effective.""In a future release, the solution could provide malware analysis."

More IBM Security QRadar Cons →

Pricing and Cost Advice
  • "​Pricing seems reasonable. It depends on the size of your organization, the size of your infrastructure, and what portion of your overall business costs go toward infrastructure."
  • "It has always scaled for us. Cost scales up too, but that is not necessarily a bad thing. It's reasonable for what they're providing."
  • "Pricing and licensing are reasonable for what they give you. You get the first five hosts free, which is fun to play around with. Then it's about four dollars a month per host, which is very affordable for what you get out of it. We have a lot of hosts that we put a lot of custom metrics into, and every host gives you an allowance for the number of custom metrics."
  • "At my last company, we did see ROI, specifically around response time. We could get to mission critical things that were down and losing revenue on immediately. So, the product paid itself back."
  • "The pricing and licensing through AWS Marketplace has been good. It would be nice if it was cheaper, but their pricing is reasonable for what it is. Sometimes, for their newer features, they charge as if it's fully fleshed out, even though it is a newer feature and it may have less stuff than their other items."
  • "It costs the same amount it would if we were hosting it ourselves, so we are incredibly happy with the cost."
  • "The pricing came up a bit compared to their competitors. It is not that the price has risen, but that the competitors have gone down. They keep adding more features that I would have expected to be baked in at a more nominal price. I have been increasingly dissatisfied with the pricing, but not enough to jump ship."
  • "It didn't scale well from the cost perspective. We had a custom package deal."
  • More Datadog Pricing and Cost Advice →

  • "found other solutions, with more features at the same cost or less. You don’t have to leave the Gartner Magic Quadrant to beat their price."
  • "Most of the time, it is easier and cheaper to buy a new product or the QRadar box."
  • "IBM's Qradar is not for small companie. Unfortunately, it would be 'overkill' to place it plainly. The pricing would be too much."
  • "IBM's Qradar is not for small companie. Unfortunately, it would be 'overkill' to place it plainly. The pricing would be too much."
  • "Go through a vulnerability assessment review for price breaks. A virtualized solution will also cut down on cost."
  • "It is expensive. It is not a product that I can provide for SMBs. It is a program that I can only provide for really large enterprises."
  • "The maintenance costs are high."
  • "Pricing (based on EPS) will be more accurate."
  • More IBM Security QRadar Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Log Management solutions are best for your needs.
    771,157 professionals have used our research since 2012.
    Comparison Review
    Vinod Shankar
    Questions from the Community
    Top Answer:There are many factors and we know little about your requirements (size of org, technology stack, management systems, the scope of implementation). Our goal was to consolidate APM and infra… more »
    Top Answer:With Datadog, we have near-live visibility across our entire platform. We have seen APM metrics impacted several times lately using the dashboards we have created with Datadog; they are very good core… more »
    Top Answer:Our organization ran comparison tests to determine whether the Datadog or Dynatrace network monitoring software was the better fit for us. We decided to go with Dynatrace. Dynatrace offers network… more »
    Top Answer:It mostly depends on your use-cases and environment. Exabeam and Securonix have a stronger UEBA feature set, friendlier GUI and are not licensed based on capacity (amount of logs and information… more »
    Top Answer:For tools I’d recommend:  -SIEM- LogRhythm -SOAR- Palo Alto XSOAR Doing commercial w/o both (or at least an XDR) is asking to miss details that are critical, and ending up a statistic. Also,… more »
    Top Answer:The event collector, flow collector, PCAP and SOAR are valuable.
    Ranking
    3rd
    out of 95 in Log Management
    Views
    24,253
    Comparisons
    14,438
    Reviews
    94
    Average Words per Review
    432
    Rating
    8.6
    6th
    out of 95 in Log Management
    Views
    15,094
    Comparisons
    9,166
    Reviews
    29
    Average Words per Review
    487
    Rating
    7.6
    Comparisons
    Also Known As
    IBM QRadar, QRadar SIEM, QRadar UBA, QRadar on Cloud, QRadar, IBM QRadar User Behavior Analytics, IBM QRadar Advisor with Watson
    Learn More
    Overview

    Datadog is a cloud monitoring solution that is designed to assist administrators, IT teams, and other members of an organization who are charged with keeping a close eye on their networks. Administrators can use Datadog to set real-time alerts and schedule automated report generation. They can deal with issues as they arise and keep up to date with the overall health of their network while still being able to focus on other tasks. Users can also track the historical performance of their networks and ensure that they operate at the highest possible level.

    Datadog Benefits

    Some of the ways that organizations can benefit by deploying Datadog include:

    • Gain an integrated view of the services and programs that IT teams are employing across their networks. Users can view and monitor all of the disparate programs that they have running across their networks with this one solution. They can track these programs across the entirety of the data’s life cycle.
    • Analyze and utilize massive amounts of data in real time. Datadog’s dashboards gather data in real time. Administrators can utilize their network’s data the minute that it becomes relevant to them. Decisions can be made based on the most current information available.
    • Keep your cloud network secured against digital threats. Datadog enables users to create alerts that will notify the minute that threats arise. IT teams and administrators can rapidly address any issue that comes up and prevent any existing problem from growing worse.
    • Easily get it up and running. Users can set up Datadog, configure it, and employ API integrations to connect it to external solutions with ease.

    Datadog Features

    • Customizable and prefabricated monitoring dashboards. Administrators are supplied with two different types of dashboards that they can choose from when they are setting up Datadog. They can customize the dashboards to fit any specialized monitoring need. Additionally, users can choose to use prefabricated dashboards that come with the solution.
    • Disaster recovery feature. Datadog has a built-in feature that enables organizations to continue functioning if some disaster strikes their network. If the network suffers damage, Datadog can restore lost data and infrastructure. Should a digital threat do damage to the network, Datadog ensures that the damage is not irreparable.
    • Vulnerability scanning tool. Users can keep ahead of threats to their networks by employing Datadog’s vulnerability scanning feature. This tool scans the entirety of a user’s network and warns them if a vulnerability is detected. Users can then move to patch these holes in their security before the threat to their network can escalate.

    Reviews from Real Users

    Datadog is a solution that stands out when compared to many of its competitors. It can offer organizations many advantages. Two major advantages are the dashboards that users can create and the monitoring capability that it gives system administrators.

    A senior manager in charge of site reliability engineering at Extra Space Storage writes, “The dashboards we created are core indicators of the health of our system, and it is one of the most reliable sources we have turned to, especially as we have seen APM metrics impacted several times lately. We can usually rely on logs to tell us what the apps are doing.”

    Housecall Pro’s senior director of DevOps writes, “We value the monitoring capability since it allows us to be pushed alerts, rather than having to observe graphs continually.

    IBM Security QRadar is a security and analytics platform designed to defend against threats and scale security operations. This is done through integrated visibility, investigation, detection, and response. QRadar empowers security groups with actionable insights into high-priority threats by providing visibility into enterprise security data. Through centralized visibility, security teams and analysts can determine their security stance, which areas pose a potential threat, and which areas are critical. This will help streamline workflows by eliminating the need to pivot between tools.

    IBM Security QRadar is built to address a wide range of security issues and can be easily scaled with minimal customization effort required. As data is ingested, QRadar administers automated, real-time security intelligence to swiftly and precisely discover and prioritize threats. The platform will issue alerts with actionable, rich context into developing threats. Security teams and analysts can then rapidly respond to minimize the attackers' strike. The solution will provide a complete view of activity in both cloud-based and on-premise environments as a large amount of data is ingested throughout the enterprise. Additionally, QRadar’s anomaly detection intelligence enables security teams to identify any user behavior changes that could be indicators of potential threats. 

    IBM QRadar Log Manager

    To better help organizations protect themselves against potential security threats, attacks, and breaches, IBM QRadar Log Manager gathers, analyzes, preserves, and reports on security log events using QRadar Sense Analytics. All operating systems and applications, servers, devices, and applications are converted into searchable and actionable intelligent data. QRadar Log Manager then helps organizations meet compliance reporting and monitoring requirements, which can be further upgraded to QRadar SIEM for a more superior level of threat protection.

    Some of QRadar Log Manager’s key features include:

    • Data processing and capture on any security event
    • Disaster recovery options and high availability 
    • Scalability for large enterprises
    • SoftLayer cloud installation capability
    • Advanced threat protection

    Reviews from Real Users

    IBM Security QRadar is a solution of choice among users because it provides a complete solution for security teams by integrating network analysis, log management, user behavior analytics, threat intelligence, and AI-powered investigations into a single solution. Users particularly like having a single window into their network and its ability to be used for larger enterprises.

    Simon T., a cyber security services operations manager at an aerospace/defense firm, notes, "The most valuable thing about QRadar is that you have a single window into your network, SIEM, network flows, and risk management of your assets. If you use Splunk, for instance, then you still need a full packet capture solution, whereas the full packet capture solution is integrated within QRadar. Its application ecosystem makes it very powerful in terms of doing analysis."

    A management executive at a security firm says, "What we like about QRadar and the models that IBM has, is it can go from a small-to-medium enterprise to a larger organization, and it gives you the same value."

    Sample Customers
    Adobe, Samsung, facebook, HP Cloud Services, Electronic Arts, salesforce, Stanford University, CiTRIX, Chef, zendesk, Hearst Magazines, Spotify, mercardo libre, Slashdot, Ziff Davis, PBS, MLS, The Motley Fool, Politico, Barneby's
    Clients across multiple industries, such as energy, financial, retail, healthcare, government, communications, and education use QRadar.
    Top Industries
    REVIEWERS
    Financial Services Firm22%
    Computer Software Company15%
    Comms Service Provider11%
    Manufacturing Company5%
    VISITORS READING REVIEWS
    Educational Organization31%
    Computer Software Company12%
    Financial Services Firm10%
    Manufacturing Company7%
    REVIEWERS
    Financial Services Firm23%
    Computer Software Company15%
    Comms Service Provider10%
    Security Firm6%
    VISITORS READING REVIEWS
    Educational Organization18%
    Computer Software Company15%
    Financial Services Firm10%
    Government6%
    Company Size
    REVIEWERS
    Small Business37%
    Midsize Enterprise19%
    Large Enterprise44%
    VISITORS READING REVIEWS
    Small Business16%
    Midsize Enterprise39%
    Large Enterprise45%
    REVIEWERS
    Small Business39%
    Midsize Enterprise15%
    Large Enterprise45%
    VISITORS READING REVIEWS
    Small Business21%
    Midsize Enterprise30%
    Large Enterprise50%
    Buyer's Guide
    Datadog vs. IBM Security QRadar
    April 2024
    Find out what your peers are saying about Datadog vs. IBM Security QRadar and other solutions. Updated: April 2024.
    771,157 professionals have used our research since 2012.

    Datadog is ranked 3rd in Log Management with 137 reviews while IBM Security QRadar is ranked 6th in Log Management with 198 reviews. Datadog is rated 8.6, while IBM Security QRadar is rated 8.0. The top reviewer of Datadog writes "Very good RUM, synthetics, and infrastructure host maps". On the other hand, the top reviewer of IBM Security QRadar writes "A highly stable and scalable solution that provides good technical support". Datadog is most compared with Dynatrace, Azure Monitor, New Relic, AWS X-Ray and Elastic Observability, whereas IBM Security QRadar is most compared with Microsoft Sentinel, Splunk Enterprise Security, Wazuh, LogRhythm SIEM and Google Chronicle Suite. See our Datadog vs. IBM Security QRadar report.

    See our list of best Log Management vendors.

    We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.