The most valuable feature is the co-ordination of the data it has, such as getting all sorts of log files from different viewpoints and putting it together in one place, so that the incident responders can get all the data they need to see the bigger picture.
Information Security Analyst at a media company with 1,001-5,000 employees
It takes log files from different viewpoints and puts them together in one place. I would like to see better support.
What is most valuable?
How has it helped my organization?
We get more insights into the company's assets and vulnerabilities.
What needs improvement?
It is hard to tell which areas have room from improvement because we always think of new features and inform them to IBM, which they include in the next patch.
We recently went to an IBM conference to look into the Watson feature and see what they could do for us.
I would like to see better support. Their support is good, but I would say, they could do better.
What do I think about the stability of the solution?
For us, it's kind of wonky because we always try to be bleeding edge and always try to do updates. So, we're always pushing the system to its limit. It's pretty stable, but we always have open issues with it, with IBM.
Buyer's Guide
IBM Security QRadar
November 2024
Learn what your peers think about IBM Security QRadar. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
What do I think about the scalability of the solution?
The scaling was done pretty well with IBM and the architecture teams. I think our system has scaled appropriately.
How are customer service and support?
The technical support really depends on who you get, at the time you call. There are good guys and bad guys. I can't really say. On a scale of 1 to 5, I would give them a 4/5 rating from our experience. We have a pretty good relationship with them.
Which solution did I use previously and why did I switch?
When I started out, this product was already bought and implemented by my company.
How was the initial setup?
The setup was a mixture of both, i.e., simple and complex.
It was complex because I had never dealt with it before. I had never set up a system like that. At the end, it got better.
What other advice do I have?
You should totally go for it. I've seen a couple systems out there, but I think IBM QRadar is one of the better solutions available.
Professionalism and to always be there when I call are the most important criteria when selecting a vendor. With IBM it's pretty good. We have our sales guy, who is always on top of everything.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Head of IT Security, Governance and Compliance at a consumer goods company with 10,001+ employees
Easy to use, provides environment visibility, and assists with incident discovery in advance of problems to the business
Pros and Cons
- "This is a good tool to have because it gives you the ability to track what is currently happening in your environment."
- "The modularity could be improved."
What is our primary use case?
We are using QRadar as a managed service.
How has it helped my organization?
This product helps us to find security incidents before they become a problem to the business. We are able to attend to them quicker and we can put protection in place so that should they occur again, we are able to deal with them more easily.
What is most valuable?
The most valuable feature is the ease of use.
What needs improvement?
The modularity could be improved.
For how long have I used the solution?
We have been using IBM QRadar for three years.
What do I think about the stability of the solution?
This is a very stable product.
What do I think about the scalability of the solution?
We have had no issues with scalability and we have approximately 1,500 users. We are not using its full capabilities at the moment because we are still growing. In the next year or two, we will see.
How are customer service and technical support?
I don't deal with IBM directly. Rather, I deal with our service provider and they deal with IBM.
How was the initial setup?
The initial set was very easy for us because we just bought what we were looking for, and not the entire infrastructure.
What about the implementation team?
The company that we subscribe to for this service takes care of the installation, maintenance, and management of it. They give us updates that concern the features we use, so the maintenance doesn't affect us much.
What's my experience with pricing, setup cost, and licensing?
We use QRadar as a managed service and we pay licensing fees to the partner.
What other advice do I have?
This is a good tool to have because it gives you the ability to track what is currently happening in your environment. Otherwise, if you did not have that, you'd only react to an event or an incident that has already caused problems. The proactiveness goes a long way because it saves your environment and your business from being negatively affected.
In summary, this is a good product but there is always room for improvement.
I would rate this solution a nine out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
IBM Security QRadar
November 2024
Learn what your peers think about IBM Security QRadar. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
Information Security Specialist at a comms service provider with 501-1,000 employees
Not user friendly, doesn't integrate well, and has terrible technical support
Pros and Cons
- "The solution can scale."
- "The solution is clunky."
What is our primary use case?
We use the solution for a variety of tasks. We use it, for example, for authentication, network-related authentication, user-related tasks, and Windows UNIX servers. It's a lot. There's a ton of use cases. I really can't sync right now about every single use case, however, the main things are authentication and network-related systems and all flavors of UNIX Windows.
How has it helped my organization?
It helped our organization in the sense that having it was better than nothing. However, I did not enjoy the product overall and I advised we switch to something else.
What is most valuable?
The user behavior analytics as part of our deployment was okay, even though it was clunky.
The solution can scale.
What needs improvement?
I really didn't like QRadar to be honest. I inherited it. I was part of the reason that we moved over to LogRhythm. The solution just isn't user friendly.
The solution is clunky.
The interface could be much better.
The integration capabilities within the product are not that great.
For how long have I used the solution?
I've been using the solution for about two years at this point. My team has been using it for two to three years, so we have a total of about five years of experience in all.
What do I think about the stability of the solution?
I wouldn't describe the solution as stable.
It was really buggy. Like other app integrations, it wasn't straightforward. It was pretty clunky. We tried to integrate Qualys with it and it wasn't effective. To integrate anything took quite a bit of time and energy. It wasn't easy. When it did, it didn't work properly. It wasn't really pulling in the data correctly.
What do I think about the scalability of the solution?
Scalability was hard as it was on-prem. We needed to add more modules, and had to add more of the servers to stack it. It wasn't that a simple task at all. I wouldn't say that it scales well, although technically, you can scale it.
When we were using the solution, we had ten to 15 users on it. They were anyone from Information Security Engineers to regular IT admins.
How are customer service and technical support?
Technical support was awful. We often didn't even have any assistance available to us. On a scale from one to ten, I'd rate them at a three. We were very unsatisfied with the level of support we received. They just simply weren't helpful when it came down to it.
Which solution did I use previously and why did I switch?
The organization didn't previously use a different solution before choosing QRadar.
We actually switched to LogRhythm as I didn't like how the solution was working for the organization.
How was the initial setup?
I didn't handle the initial setup. It was handled before I arrived at the organization.
What other advice do I have?
I'm not sure of which version of the solution we're using.
I wouldn't recommend the solution. I'd probably tell others to shy away and look at other products like possibly Splunk, however, it's a pricey option. LogRhythm is pretty good. We're having some issues with it. That said, for the most part, it's okay.
Exabeam also seems like it might be a good option. I haven't worked with it personally, however, I've had some experience with a POC.
Overall, I would rate the solution at a three out of ten. We didn't have a good experience with it. If it offered, for example, easier behavior analytics, easier integrations, better interface, supported model integration, and a good user interface to perform analysis I might rate it higher. Basically, it just needs to be much more user-friendly.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Sr. Security Analyst with 1,001-5,000 employees
Enables us to integrate with some of the top security products on the market
What is our primary use case?
In recent years, our focus has been the third-party integrations. Like most companies, we have several security products. (I hope most other companies are not relying on a single product). The challenge with a SIEM is taking the data produced by a log source and presenting it in a readable manner for technical and non-technical staff. That can be done with custom-built reports or in dashboards. With the IBM Security App Exchange you add a new extension (i.e. download from the App Exchange site) and configure it.
How has it helped my organization?
Since IBM opened up the API for third-party app integration it has made it increasingly easy to add other tools into the dashboards.
What is most valuable?
Currently, the App Exchange offers over 192 applications that allow QRadar to integrate with some of the top security programs on the market, along with extension add-ons provided by QRadar. Some third-party apps include (but not limited to) Splunk, McAfee, Cisco, Carbon Black, Palo Alto, ObservIT, Exabeam, Gigamon, PhishMe. Extension add-ons by QRadar include report extensions, MS AD extensions, user behavior analytics, etc.
We have a very small team and anytime I can integrate with our other tools, and save time doing so, that is a plus for my company.
What needs improvement?
Keep up with more apps. They need to continue working with other companies to develop apps for integrations. Yes, they currently have 192 apps, but that number is nowhere near the number of security products on the market. That means if your company has a product that is not in the application list then you just have to work a little harder to pull the data you need from the log source.
I'm not against hard work, I'm just trying to work smarter and faster. Time is money, so saving time without compromising the end product is a win for everyone. It would reflect well for IBM because it would show they understand the customers’ needs and it would reflect well internally because we would be able to present cleaner dashboards and reports without hours or days devoted to building them.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
We experienced some memory usage issues with a user behavior app.
What do I think about the scalability of the solution?
We haven't really had any scalability issues. You are always limited to your EPS/FPM licensing, so you have to make sure you don’t exceed those limits.
How is customer service and technical support?
Tech support is excellent.
How was the initial setup?
The initial setup is straightforward.
Which other solutions did I evaluate?
We do a SIEM solutions review every few years. Other options we have evaluated: LogRhythm, Splunk, AlienVault.
What other advice do I have?
Research, and don’t be afraid to do a few PoCs. Also, make sure you have a team for the tool. Most solutions require a team, so if you cannot apply a team towards the tool then hopefully you can use one of the managed SIEM options.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Director of Cyber Security at a insurance company with 10,001+ employees
The ability to correlate large amounts of data into rules that provide real-time alerting is valuable.
What is most valuable?
The ability to correlate large amounts of data into rules that provide real-time alerting is the most valuable feature.
How has it helped my organization?
It has provided us with quicker mitigation to threats. We used to do everything manually, so it automated a lot of workflows that in the past, we weren't able to do from an automation perspective.
What needs improvement?
We are still two versions behind, so I don't know specifically what could be improved. I've told all the executives and staff we met at a recent IBM conference that integration with other solutions is important so that we don't have to do a bunch of different things to consider.
What do I think about the stability of the solution?
We are the largest user of QRadar, so the stability is average. There are several vulnerabilities that IBM is working with us on. They don't have a test environment big enough to imitate the stress we put on it. Stability is probably OK for the normal customers, but we break everybody's apps just because of our size.
What do I think about the scalability of the solution?
There are some vulnerabilities that may be further exasperated at our size, so they are trying to fix some of those issues and bring stability, but it's really product issues that don't scale right now.
Which solution did I use previously and why did I switch?
It was functionality which drove us to change. QRadar had better functionality than what we were getting out of the previous solution. Scale was probably also a factor at that time. It was right after IBM bought Q1 Labs, so it was an industry leader along with some others. We did an evaluation and QRadar came out on top.
How was the initial setup?
Initial setup was pretty straightforward. It's a complex solution, but it was straightforward for a large environment.
Which other solutions did I evaluate?
The two big options we evaluated would be IBM and HP. What we understood was that QRadar would be a more simplistic implementation, taking up less time.
What other advice do I have?
Make sure you really understand all the requirements before you implement. I think the group that did this implementation didn't necessarily understand fully what we were going to use it for, so it was maybe designed for smaller things. So, you should really understand the requirements prior to stepping into it.
If QRadar is going to be a central sort of hub for IBM's security solutions, make sure that the other tools integrate very easily into it. That would probably be the biggest task.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Security Operations Center Manager at a financial services firm with 1,001-5,000 employees
Search capabilities are sufficient for most tasks. We need to see improved rule based access controls and rule/event tuning.
Pros and Cons
- "Search capabilities are sufficient for most tasks."
- "Search capability and indexing still lag behind competitors. We also need to see improved rule based access controls and rule/event tuning."
How has it helped my organization?
Log aggregation and event correlation did not occur in an enterprise fashion before this product. Troubleshooting more complex issues became much simpler with the addition of this product.
What is most valuable?
Search capabilities are sufficient for most tasks, although not as easy to use as some other products.
What needs improvement?
Search capability and indexing still lag behind competitors. We also need to see improved rule based access controls and rule/event tuning.
The search capabilities in QRadar are decent in their ability to be granular but the methodology of search prevents the rapid and easy modification of search parameters as an analyst works through the hunting process.
There are several examples of this. Let’s say you add two or three parameters to your search using various filter methods.
You can quickly change items like the scope of time for your search or the presentation of data, but you cannot quickly change the other parameters such as the IP address you are looking for. So you have a search of 10.0.1.1, the system processes that search, but then you realize you need to search for 10.1.1.2 instead.
You have to delete the old IP and recreate. At that point the search starts over from the beginning. In a system like Splunk if when using the filters the query string is written for you and can be easily modified/edited on the fly. While that may still result in a search restarting the manipulation of that search is faster and more efficient. This is just a single example.
What do I think about the stability of the solution?
I feel that some of the stability issues are attributed to our network. However, too many issues existed with the product and too many more appeared as they tried to fix different issues.
What do I think about the scalability of the solution?
We never scaled the product before we decided to remove it from our network. From all appearances, scalability was not going to be an issue.
How are customer service and technical support?
Technical support was OK at best due to the length of time before resolution.
Which solution did I use previously and why did I switch?
I used ArcSight at a previous company. I would much rather have a correctly scoped and built QRadar to manage. However, as a consumer of ArcSight, it was a very good product.
How was the initial setup?
I was not involved in the initial setup.
What's my experience with pricing, setup cost, and licensing?
Do your due diligence. I found other solutions, with more features at the same cost or less. You don’t have to leave the Gartner Magic Quadrant to beat their price.
Which other solutions did I evaluate?
I did not choose this product.
What other advice do I have?
Evaluate the product based on a full set of requirements and your security analyst workflow. Do not base your decision on the company name or promises of new abilities years down the line.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Security Manager at a pharma/biotech company with 1,001-5,000 employees
The search capability and data consolidation are some of the key features. I want to see a three-dimensional perspective of the data.
What is most valuable?
The search capability (I've used other solutions) and data consolidation are some of the key features.
How has it helped my organization?
For this organization, it was the first log management solution. So, it definitely gave us the ability to search through the data when we had events. We could search based on the identity of the person, or the machine, or the IP address. We could do a lot of different searches. We could also do payload searches, and depending on how much capacity you have, you can do quite a lot with it.
What needs improvement?
I want to see a three-dimensional perspective of the data. I don't want to see just an event perspective of the data. I want to be able to identify a user, and within clicks, know all the activity of that user. I don't want to see it in events. I want to see it in relevant information.
There needs a little bit more investment into enhancing the user interface. That is the main thing; making it represent an actual incident response state-of-mind, similar to how you would troubleshoot an incident. That is the main issue. It was a major position by IBM when they bought it. But we see a lot of things being done around the Cognitive side, around the Watson side. But what we're not seeing the growth in, is the actual tools interface and usability. And that's what we wanted to see. We wanted to be able to see seamless identification of log sources, seamless categorization and normalizing of log sources, seamless alerts. In all those things, for the solution to mature, it has to be able to take data and make sense of it by itself, without a lot of input. And those are the areas that they can really improve it.
What do I think about the stability of the solution?
It's been stable. Stability hasn't been a problem, as long as you have enough capacity. It's all about sizing it right for the size of your environment. We do drop packets every day. So depending on how our log volume increases or reduces, you see the impact on the packets being dropped.
How are customer service and technical support?
We've used technical support and it hasn't been great. It didn't seem like we could get the answers we needed without having to use professional services. For a solution like this, little things like how to tune it, how to upgrade it; there are things that as a customer we don't feel the need to use professional services for. We want to be able to just find a document on how to upgrade, and that has been difficult to find.
Which solution did I use previously and why did I switch?
We didn't have a previous solution. We kind of inherited it as part of another acquisition from IBM, and then we scaled it up to meet our capacity.
How was the initial setup?
We got the basic functionality working, which is not difficult. It's getting the full value out of the solution, which is harder.
What other advice do I have?
From an analytics perspective, it's a good tool. But you have to have the resources to own it. It's not only about buying it. It's not only about capacity, but somebody has to care and feed it. It's not one of those things that you can put it in, walk away and just consume the data. If you don't take care of it and feed it, you won't get what you need out of it.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Managing Director at Volta River Authority
Great predictive analysis capabilities and provides good visibility
Pros and Cons
- "We find predictive analysis capabilities valuable."
- "The solution should include remote action capabilities."
What is our primary use case?
Our primary use case for the solution is providing visibility for what occurs in our security system and IT assets. So all our event logs and information from a setting and criticality level go there. Additionally, there's AI used to trigger alerts when things are going bad, and then we can action them.
What is most valuable?
We find predictive analysis capabilities valuable.
What needs improvement?
The solution should include remote action capabilities.
For how long have I used the solution?
We have been using the solution for approximately three years.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
The solution is scalable. Over 1,000 people in our organization use the solution.
How was the initial setup?
The initial setup is moderate, and it is neither easy nor difficult. However, it took approximately one week to complete the implementation.
What about the implementation team?
We implemented it through a vendor team.
Which other solutions did I evaluate?
We chose this solution because it was provided to us through software as a service.
What other advice do I have?
I rate the solution an eight out of ten. The solution is good but can be improved with enhanced remote control ability. I recommend the solution to new users considering it.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free IBM Security QRadar Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Product Categories
Security Information and Event Management (SIEM) Log Management User Entity Behavior Analytics (UEBA) Endpoint Detection and Response (EDR) Security Orchestration Automation and Response (SOAR) Managed Detection and Response (MDR) Extended Detection and Response (XDR)Popular Comparisons
CrowdStrike Falcon
Splunk Enterprise Security
Microsoft Sentinel
Elastic Security
LogRhythm SIEM
Sumo Logic Security
Rapid7 InsightIDR
Fortinet FortiSIEM
AlienVault OSSIM
Securonix Next-Gen SIEM
Cortex XSIAM
USM Anywhere
Buyer's Guide
Download our free IBM Security QRadar Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What SOC product do you recommend?
- Has anyone got experience in deployment of a SIEM solution?
- IBM QRadar is rated above competitors (McAfee, Splunk, LogRhythm) in Gartner's 2020 Magic Quandrant. Agree/Disagree?
- What is your opinion of IBM QRadar?
- What are the biggest differences between Securonix UEBA, Exabeam, and IBM QRadar?
- Why do most companies prefer IBM QRadar?
- What Solution for SIEM is Best To Be NIST 800-171 Compliant?
- When evaluating Security Information and Event Management (SIEM), what aspect do you think is the most important feature to look for?
- What are the main differences between Nessus and Arcsight?
- Which is the best SIEM solution for a government organization?