Try our new research platform with insights from 80,000+ expert users
reviewer1026825 - PeerSpot reviewer
Certified AIX I.T Manager at a financial services firm with 10,001+ employees
Real User
Easy to use and useful for preparing use cases

What is our primary use case?

We primarily use QRadar for monitoring and preparing use cases. 

This solution is deployed on-prem. 

What is most valuable?

The most important and valuable feature of QRadar is how useful it is for preparing use cases. It's also easy to use. 

What needs improvement?

The GUI of QRadar should be improved. 

For how long have I used the solution?

I have been using IBM QRadar for one year. 

Buyer's Guide
IBM Security QRadar
November 2024
Learn what your peers think about IBM Security QRadar. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.

What do I think about the stability of the solution?

QRadar is stable. 

What do I think about the scalability of the solution?

This solution is scalable. 

How are customer service and support?

I have contacted IBM's technical support—it was great. They are very knowledgeable. 

How was the initial setup?

QRadar is very easy to install, and I can do it myself. The time period will depend on the organization itself, since it depends on the environment and the number of servers and endpoints. 

What about the implementation team?

I implemented this solution myself. 

What's my experience with pricing, setup cost, and licensing?

I pay for licensing yearly. 

Which other solutions did I evaluate?

I also evaluated a lot of SIEM solutions, but I like LogRhythm and QRadar. 

What other advice do I have?

I rate QRadar an eight out of ten. I would recommend QRadar, as well as LogRhythm, to others considering implementation. 

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1584831 - PeerSpot reviewer
Solution Architect Cybersecurity at a tech services company with 501-1,000 employees
Real User
Protects our network from various threats
Pros and Cons
  • "The threat hunting capabilities in general are great."

    What is our primary use case?

    We use this solution for advanced threat detection, insider threat monitoring, risk and vulnerability management, and unauthorized traffic detection regarding our network. We can monitor and detect web attacks with it as well. 

    Within our organization, there are roughly 2,000 to 3,000 employees using this solution. As of now, we don't have any plans to increase our usage of IBM QRadar.

    How has it helped my organization?

    The basic use case of this solution is to identify insider threats. Insider threats are the most dangerous kind of threat for any type of organization to secure. This solution identifies who the insider threats are, and also determines if there are any malicious activities taking place inside of an organization itself. In short, it provides us with real-time visibility so we can identify who the insider threats and what malicious activities are occurring inside of our own network. It also protects our web applications from DNS attacks.

    What is most valuable?

    The threat hunting capabilities in general are great. 

    What needs improvement?

    I was going to say that the reporting could be improved, but IBM recently introduced a new cloud-based security service that integrates with QRadar. Now, reporting is much easier than before. I personally can't think of an area for improvement.

    For how long have I used the solution?

    I have been using this solution for two and a half years. 

    What do I think about the stability of the solution?

    This solution is quite stable. 

    How are customer service and technical support?

    We receive 24/7 support via email; however, we don't have to contact support often because we have our own trained team. They handle most issues.

    Which solution did I use previously and why did I switch?

    We used to use Splunk.

    How was the initial setup?

    How complex the initial setup is completely depends on the customer's infrastructure. If there are lots of tools that need to be integrated, then the setup is going to be really complex. I wouldn't say that the initial setup is complex, it's more moderate than anything. 

    Deployment took two to three weeks from beginning to end.

    What's my experience with pricing, setup cost, and licensing?

    The price of this solution is a little high.

    What other advice do I have?

    Before implementing a new solution, you need to understand your network infrastructure completely. You need to determine if third-party integration is supported or not. IBM Qradar supports a lot of third-party integration because third-party tool integration is often required. 

    Storage also needs to be defined properly as logs need to be kept for a certain amount of time. If you have to store logs for three to six months, then you'll need to ensure that you've evaluated the storage capacity properly.

    Overall, on a scale from one to ten, I would give this solution a rating of eight. We're very satisfied with it. 

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
    PeerSpot user
    Buyer's Guide
    IBM Security QRadar
    November 2024
    Learn what your peers think about IBM Security QRadar. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
    816,406 professionals have used our research since 2012.
    reviewer1349439 - PeerSpot reviewer
    IT Security Analyst at a manufacturing company with 10,001+ employees
    Real User
    Helps us monitor and generate statistics that help to illustrate what is going on in the company
    Pros and Cons
    • "I have found its network traffic log, network bit log, and QBI most valuable."
    • "We need more features in order to create rules to detect or to meet some requirements for other areas, for example, catching the event from other authentication tools."

    What is our primary use case?

    We have a lot of use cases with IBM QRadar, but our primary use is for monitoring traffic and detecting tricks.

    How has it helped my organization?

    In terms of how IBM QRadar has improved our company, on peak days it helps us monitor and generate statistics that help to illustrate what is going on in the company. For example, SMB detects ransomware and invalid log-on. If a user is located in the United States, or we expect a login in Russia, or Ukraine, or Kenya, it is very important for us because we can detect what application they are using there, or if a hacker is trying to log in by mobile or another device.

    What is most valuable?

    I have found its network traffic log, network bit log, and QBI most valuable.

    We have a lot of domain controllers in QRadar tracking all the security. It is also useful for identity management.

    What needs improvement?

    In terms of where it could be improved, this includes its forensics, incident response, and security operation center features. Additionally, some also struggle with the rules. We need more features in order to create rules to detect or to meet some requirements for other areas, such as catching the event from other authentication tools, like in Okta, for example.

    In some cases, I have issues because some tools are not integrated in QRadar, such as other tools similar to DLP (Data Loss Prevention). We need to create all the integrations manually because they are not integrated in QRadar. We have a problem, for example, because they have Symantec DLP integrated in QRadar, however, it is not working because it's not detected automatically. It is not converting all the columns, but we do have the option to create manually. This is not difficult because it's very clear in the procedures.

    For how long have I used the solution?

    I have been using IBM QRadar for seven years.

    What do I think about the stability of the solution?

    QRadar's stability is great because it is always live and is always catching and monitoring all the information that we need. When we need information, it is here in QRadar. 

    In terms of maintenance of QRadar, my internet is secured by IBM.

    What do I think about the scalability of the solution?

    For me, the scalability is good.

    At the moment, we have no more than 15 people working on QRadar. This includes analysts, forensics, internet response, and active directory.

    How are customer service and technical support?

    Tech support is good. Additionally, I can find all the information at IBM.

    How was the initial setup?

    In some cases, the system or the hardware do not meet the requirements to install one flow collector. Or the menu is not displayed. The menu has 10 options. If the CPU and memory are not enough, the menu shows only five or six options. But this information is not mentioned in the installation process. But it is not complex because the installation is very clear as long as we are meeting all the requirements for the CPU, memory, or the space.

    The solution takes maybe four months because we have a lot of integrations.

    What other advice do I have?

    I would absolutely recommend QRadar because it has a lot of options to improve or detect some information.

    On a scale of one to ten, I would give QRadar a 10.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Amazon Web Services (AWS)
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    reviewer916710 - PeerSpot reviewer
    Information Security Manager at a comms service provider with 1,001-5,000 employees
    Real User
    It is very stable. We have not faced interruptions in the past four and a half years.
    Pros and Cons
    • "It is very stable. We have not faced interruptions in the past four and a half years."
    • "It has improved comprehensive visibility for what is going on in the perimeters, and on the inside, as well."
    • "Technical support is good, but not great."

    What is our primary use case?

    We are a telecom company, and we use it for IT systems, for telecom systems and on various different levels of applications. We use it for web servers, routers, firewalls, and other security components. Our SIEM solution serves technical and non technical business units including customer care, engineering, revenue assurance, and anti fraud. 

    How has it helped my organization?

    Instant continuous monitoring so that we can take action immediately and be proactive as much as possible with handling hacking and attacking attempts. Also, It has improved comprehensive visibility for what is going on in the perimeters, and on the inside, as well. We also use it for testing our controls if it is performing well or not. We can say that the visibility, monitoring, testing and reliability of our controls is all assisted by this solution. The most important benefit we get is from the SIEM solution.

    What is most valuable?

    The most valuable features are the diversity of logs type that enable us to monitors what is going on from different perspectives and reduces the likelihood that we will miss important attempts. There are different events and flows, and there is diversity from getting the information from different sources. We can also see that there are no false positives. It is well-tuned and the rules are covering everything that we need.

    What needs improvement?

    There are some weaknesses with the QRadar Risk Manager. It has some weaknesses because of the connectivity with other vendors. It is limited. There are some vendors that you cannot connect QRadar Risk Manager with, so we you cannot get the maximum benefit of the product.

    For how long have I used the solution?

    Five years.

    What do I think about the stability of the solution?

    It is very stable. We have not faced interruptions in the past four and a half years.

    What do I think about the scalability of the solution?

    It's great! This is one of the major features of the solution.

    How are customer service and technical support?

    Technical support is good, but not great. 

    How was the initial setup?

    It was straightforward, but we had to do some customization. 

    What about the implementation team?

    When choosing a vendor, we always consider:

    • Scalability
    • Diversity of Connecting Systems
    • Storage

    Which other solutions did I evaluate?

    We considered another solution from HP and ArcSight.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    NetworkS3978 - PeerSpot reviewer
    Network Security Engineer at a wellness & fitness company with 10,001+ employees
    Real User
    It is the core of our entire SOX
    Pros and Cons
    • "It is the core of our entire SOX."
    • "Due to the skills shortage, we are able to use it from the standpoint of bringing in a lower level employee or a person who may not have security knowledge."
    • "We run 65 servers globally with just two people: an engineering person and me."
    • "The technical support is poor. Mostly because when I open a PMR for IBM, I am stuck with Level 1 staff. As an engineer, nothing that I am bringing them does not require Level 2 or Level 3 support."

    How has it helped my organization?

    QRadar improved risk assessment and vulnerability, plus it has reduced some staff. It has also improved the training abilities of the people who use it, e.g., IR teams. It is the core of our entire SOX. Therefore, we use it for everything through training all the way up through management. 

    Due to the skills shortage, we are able to use it from the standpoint of bringing in a lower level employee or a person who may not have security knowledge. We can put them in front of the product and they will still have the information that they need and have them at a level where they can run the system. Also, products, like Watson, make it work better.

    What needs improvement?

    The overall workload automation should be built into it. Part of the efficiency side of it is the ability to take the information as it comes in and assign it into a group. Now, the team leader no longer needs to assign it manually. He manages the workflow as it comes in directly to the individuals. Then, the individuals respond on it. As it closes, it goes back to the workflow, recording the amount of time it took for them to close it. It should show: 

    • How long did it take to get assigned?
    • How long did it take for the person to open it?

    Then, you can show that a person may have issues opening network problems.

    Network Breach

    We have not suffered a network breach.

    Efficiency of Security Team

    The solution has improved the efficiency of our security team.

    Events per Day

    We are at 115,000 events per second.

    For how long have I used the solution?

    More than five years.

    What do I think about the stability of the solution?

    We run 65 servers with just two people: an engineering person and me.

    What do I think about the scalability of the solution?

    We have 65 servers globally, and I just got my own.

    How is customer service and technical support?

    The technical support is poor. Mostly because when I open a PMR for IBM, I am stuck with Level 1 staff. As an engineer, nothing that I am bringing them does not require Level 2 or Level 3 support. Most of the stuff that I open ends up code changes or bug fixes.

    Our company is far more mature than most. Our issue is that the support is slow.

    How was the initial setup?

    It was a whole different product when we installed it.

    What other advice do I have?

    The most important criteria when selecting a vendor: stability. The security space is tough. Unlike a lot of other spaces, IBM will not be bought anytime soon as a 100 year-old company.

    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
    PeerSpot user
    PeerSpot user
    Sr SIEM Consultant at a tech services company with 51-200 employees
    Consultant
    Built-in rules are enabled by default and tunable to meet the specific needs of each organization.
    Pros and Cons
    • "Network-Based Anomaly Detection (NBAD): Using NetFlow, JFlow, SFlow, or QFlow (all 7 layers), offenses are detected as a response when a rule is triggered."
    • "Some UI enhancements would be nice, such as exporting custom event properties and the ability to export rules."

    What is our primary use case?

    As a PS consultant on projects where the customer is transitioning from a competitor's SIEM to QRadar, they are very pleased when they see the number of quality offenses being caught soon after implementation and integration of log sources just from the out-of-the box rules enabled by default.

    How has it helped my organization?

    As a Professional Services consultant, I have heard many reports of how QRadar SIEM has quickly identified offenses which the users were unaware of previously. In addition to giving CISO’s gained visibility and increasing security posture, QRadar adheres to an organization's regulatory compliance across a number of  industries (i.e. Healthcare, Financial, Retail, Energy and Government)

    What is most valuable?

    • Correlation Rule Engine, built-in use cases: QRadar has the highest number of built-in use cases among any SIEM on the market. There are many built-in rules that are enabled by default and easily tunable to meet the specific needs of each organization. The correlation engine automates what is a manual process for many SIEM platforms.
    • Network-Based Anomaly Detection (NBAD): Using NetFlow, JFlow, SFlow, or QFlow (all 7 layers), offenses are detected as a response when a rule is triggered.
    • QRadar Vulnerability Management: Built-in vulnerability scanner or leverage for other supported scanners to either schedule a scan and/or import the results from a scan. Importing the results enriches the assets profile database to quickly identify assets that have known vulnerabilities.
    • X-Force Threat Intelligence: Threat intelligence IP reputation feed which leverages a series of international data centers to collect tens of thousands of malware samples, to analyze web pages and URLs, and to run analysis to categorize potentially malicious IP addresses and URLs.
    • App Exchange: Many vendors have written apps to enhance QRadar. The apps are free and enhance your SIEM experience by adding rules and custom event properties. In some cases a new tab. You will need to have purchased the third party solution. For example, if you have Palo Alto or Blue Coat, there's a free app for better integration.

    What needs improvement?

    Some UI enhancements would be nice, such as exporting custom event properties and the ability to export rules.

    For how long have I used the solution?

    More than five years.

    What do I think about the stability of the solution?

    We did not encounter any issues with stability.

    What do I think about the scalability of the solution?

    We did not encounter any issues with scalability.

    How are customer service and technical support?

    The technical support is very good.

    Which solution did I use previously and why did I switch?

    We had limited experience with RSA enVision, LogRhythm, and HPE ArcSight. QRadar is much easier and takes less time to implement and maintain.

    How was the initial setup?

    The initial setup was straightforward.

    What's my experience with pricing, setup cost, and licensing?

    Go through a vulnerability assessment review for price breaks. A virtualized solution will also cut down on cost.

    Which other solutions did I evaluate?

    We did not evaluate any other options.

    What other advice do I have?

    Every SIEM tool has a certain degree of complexity, especially where use cases and rules are concerned. I advise using Professional Services so your SIEM is configured by trained professionals.

    Disclosure: My company has a business relationship with this vendor other than being a customer: We are a business partner of IBM.
    PeerSpot user
    it_user775200 - PeerSpot reviewer
    it_user775200Senior Managing Consultant - Asia Pacific (AP) IBM Q1 Labs Technical Consultant at a tech company with 10,001+ employees
    Vendor

    Damian, regarding rule export, the question is what do you want to do with this export. QRadar as probably you know has CMT tool (Content Management Tool) which will allow you export custom rules. though that has been said. Always is the question what next. if you want to import them to other Qradar system then yes you can, if you think about them in category of Yara rules then no you cannot use this export in third party solutions

    See all 3 comments
    IT Specialist​ at IT Specialist LLC
    Reseller
    Top 20
    Easy to deploy, and scalable, but the stability has room for improvement
    Pros and Cons
    • "The playbook engine is flexible and allows for the graphical visualization of processes, enabling the implementation of dynamic playbooks for incident response or testing."
    • "The solution is difficult to understand in the beginning and has complex management configurations that can be improved."

    What is our primary use case?

    Our clients who are implementing or trying to implement a Security Operations Center use the IBM QRadar SIEM solution. This solution helps automate incident processing and provides visibility into the incident management process.

    What is most valuable?

    The playbook engine is flexible and allows for the graphical visualization of processes, enabling the implementation of dynamic playbooks for incident response or testing.

    The integration of our customer's infrastructure with other security management systems, such as Active Directory, firewalls, and vulnerability management systems, is effective.

    What needs improvement?

    The solution is difficult to understand in the beginning and has complex management configurations that can be improved.

    The stability has room for improvement.

    The cost has room for improvement.

    For how long have I used the solution?

    I have been using the solution for two years.

    What do I think about the stability of the solution?

    I give the stability a seven out of ten. There is sometimes unexpected behavior within the logic of the playbook engine and features.

    What do I think about the scalability of the solution?

    I give the scalability an eight out of ten.

    How are customer service and support?

    We have had issues that were not resolved by technical support.

    How would you rate customer service and support?

    Neutral

    How was the initial setup?

    For the most part, the initial setup is straightforward and I give it a seven out of ten. The initial deployment and configuration require one month, followed by an additional 11 months of implementing various use cases and processes that need to be automated.

    What's my experience with pricing, setup cost, and licensing?

    I give the price of the solution a four out of ten. The solution comes with a high price tag, while some of the competitors provide identical functionality in their offerings at no extra cost.

    What other advice do I have?

    I give the solution a seven out of ten.

    We have around 20 users.

    The solution is of good quality and can be implemented successfully. However, in order to fully utilize its benefits, one must possess expertise in Python programming.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer:
    PeerSpot user
    Ertugrul Akbas - PeerSpot reviewer
    Manager at ANET
    Real User
    Top 10
    Scalable, easy to use, but lacking features and modern user interface
    Pros and Cons
    • "IBM QRadar User Behavior Analytics's most important feature is its ease of use."
    • "IBM QRadar User Behavior Analytics could improve machine learning use cases because they are limited and most of the use cases are rule-based. They should develop more use cases, such as in Securonix or Exabeam because they will detect a threat. Using machine learning is mainly on the correlation rules, but if you think about Exabeam or Securonix, they detect using machine learning or machine learning-based algorithms."

    What is our primary use case?

    We are mainly using predefined rules on IBM QRadar User Behavior Analytics

    How has it helped my organization?

    When we started using IBM QRadar User Behavior Analytics's add-on or extension, we received more than 17 new use cases. Our organization has benefited from using IBM QRadar User Behavior Analytics.

    What is most valuable?

    IBM QRadar User Behavior Analytics's most important feature is its ease of use. 

    What needs improvement?

    IBM QRadar User Behavior Analytics could improve machine learning use cases because they are limited and most of the use cases are rule-based. They should develop more use cases, such as in Securonix or Exabeam because they will detect a threat. Using machine learning is mainly on the correlation rules, but if you think about Exabeam or Securonix, they detect using machine learning or machine learning-based algorithms.

    Using the interface of IBM QRadar User Behavior Analytics is the same for years, they should redesign the interface to make it more modern. Some historical queries take a long time, they should improve or change their database. There are some missing operators on the correlation side. For example, some before operated.

    For how long have I used the solution?

    I have been using IBM QRadar User Behavior Analytics for approximately three years.

    What do I think about the stability of the solution?

    IBM QRadar User Behavior Analytics is stable most of the time. However, it works on the client-side which requires a lot of system resources, such as RAM. In some cases, if the work is high, the stability deteriorates, but mainly it is stable.

    What do I think about the scalability of the solution?

    The scalability of IBM QRadar User Behavior Analytics is good. 

    We have two people using this solution. We do not have plans to increase usage.

    How are customer service and support?

    We use a consultancy company for support and are not directly connected to IBM support.

    How was the initial setup?

    The deployment of IBM QRadar User Behavior Analytics is very easy when compared to other machine learning solutions. The full deployment took approximately three weeks with less than 5,000 EPAs.

    What about the implementation team?

    We used a consultant that help us deploy and do maintenance for IBM QRadar User Behavior Analytics.

    What was our ROI?

    I rate the return on investment of IBM QRadar User Behavior Analytics a four out of five.

    What's my experience with pricing, setup cost, and licensing?

    IBM QRadar User Behavior Analytics is an application framework and you can install many applications without any additional costs.

    I rate the price of IBM QRadar User Behavior Analytics a four out of five.

    What other advice do I have?

    IBM QRadar User Behavior Analytics is a good solution. If there is a big enough budget they might be able to afford the solution since it is expensive. If the conditions are okay, then they should select the solution.

    I rate IBM QRadar User Behavior Analytics a six out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    Download our free IBM Security QRadar Report and get advice and tips from experienced pros sharing their opinions.
    Updated: November 2024
    Buyer's Guide
    Download our free IBM Security QRadar Report and get advice and tips from experienced pros sharing their opinions.