Listing Thumbnail

    IBM Security QRadar Suite Software: SIEM & SOAR

     Info
    Deployed on AWS
    The threat detection and response suite built to help your security teams outsmart threats with speed, accuracy and efficiency. IBM Security QRadar SIEM (Classic) and QRadar SOAR are customer deployed software.

    Overview

    Threats are increasing in volume and sophistication at a staggering pace. Real-time monitoring and visibility are required to detect threats like ransomware, insider threats, and cloud attacks before they cause disruption.

    IBM Security® QRadar® Suite is a modernized threat detection and response solution designed to unify the security analyst experience and accelerate their speed across the full incident lifecycle. The portfolio is embedded with enterprise-grade AI and automation to dramatically increase analyst productivity, helping resource-strained security teams work more effectively across core technologies.

    IBM Security QRadar SIEM (Classic): Market-leading Security Information and Event Management (SIEM) solution enables you to run your business in the cloud and on premises with visibility and security analytics built to rapidly investigate and prioritize critical threats.

    IBM Security QRadar SOAR: Recent winner of a Red Dot Design Award for interface and user experience, QRadar SOAR helps organizations automate and orchestrate incident response workflows and ensure their specific processes are followed in a consistent, optimized and measurable way.

    For more information, visit https://www.ibm.com/qradar 

    For customized QRadar SIEM (Classic) / QRadar SOAR pricing or if you are interested in additional product capabilities such as Threat Intelligence, Data Explorer, or EDR - contact your IBM Sales Representative or email us at SecurityOrdersAWS@wwpdl.vnet.ibm.com .

    Highlights

    • Find the right size for your solution and estimate your IBM QRadar SIEM (Classic Software) price: https://www.ibm.com/qradar/security-qradar-siem/pricing?mpid=aws
    • Gain centralized visibility across AWS and hybrid cloud environments via a single pane of glass. Leverage deep integrations with AWS security services including AWS Security Hub, CloudTrail, GuardDuty, Network Firewall, WAF, Amazon Detective, CloudWatch, VPC Flow Logs and more.
    • Correlate data across users, networks, and AWS native services to gain deep insights into key threats including cloud misconfigurations, policy changes and suspicious user activity. Connect related events to ensure teams only receive a single alert for an incident.

    Details

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    IBM Security QRadar Suite Software: SIEM & SOAR

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (2)

     Info
    Dimension
    Description
    Cost/12 months
    QRadar SIEM
    500 Events Per Second, 10000 Flows Per Minute
    $12,074.40
    QRadar SOAR
    2 Authorized Users
    $22,704.00

    Vendor refund policy

    All orders are non-cancellable and all fees and other amounts that you pay are non-refundable. If you have purchased a multi-year subscription, you agree to pay the annual fees due for each year of the multi-year subscription term.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    For Sales Inquiries Contact: SecurityOrdersAWS@wwpdl.vnet.ibm.com  To contact IBM Security QRadar Suite Software support:

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    100
    In Log Analysis
    Top
    25
    In Data Security and Governance
    Top
    10
    In Data Analysis

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    1 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Threat Detection and Analytics
    Advanced security information and event management (SIEM) solution with real-time monitoring and threat detection capabilities
    Cloud Security Integration
    Deep integration with AWS security services including Security Hub, CloudTrail, GuardDuty, Network Firewall, and VPC Flow Logs
    Incident Response Automation
    Enterprise-grade AI and automation to orchestrate and streamline incident response workflows across security technologies
    Event Correlation
    Ability to correlate data across users, networks, and cloud services to provide comprehensive threat insights and minimize alert fatigue
    Multi-Environment Monitoring
    Unified security analytics platform supporting monitoring and visibility across cloud and on-premises infrastructure
    Log Aggregation and Monitoring
    Monitors entire IT environment by ingesting logs from CloudTrail, GuardDuty, EC2 network traffic, multiple AWS accounts, cloud services, on-premises networks, and remote endpoints
    Threat Detection Analytics
    Utilizes user and attacker behavior analytics with 900+ out-of-the-box detections and community threat intelligence to minimize false alarms
    Compliance Monitoring
    Supports log, event, and File Integrity Monitoring (FIM) requirements for compliance frameworks like PCI, HIPAA, and GDPR
    Advanced Defense Mechanisms
    Implements layered security defenses through honeypots, honey credentials, and honey files to detect potential intrusions
    Investigation Capabilities
    Provides detailed log timelines and automated response workflows to cut investigation times and enable rapid incident response
    Log Analysis
    Real-time security log processing and analysis of terabytes of raw logs per day using cloud-native architecture
    Detection Methodology
    Detection-as-code implementation using Python programming language for threat detection rules
    Cloud Log Integration
    Native integrations with AWS log sources including S3, CloudTrail, and VPC Flow Logs
    Security Data Lake
    Transforms raw log data into structured security data lake for comprehensive threat investigation and incident response
    Scalable Architecture
    Highly scalable data lake infrastructure designed for processing and querying large volumes of security logs efficiently

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    20 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    Mahmoud Younes

    Reliable installation and diverse use cases provide strong value

    Reviewed on May 20, 2025
    Review provided by PeerSpot

    What is our primary use case?

    Most of the use cases are based on MITRE ATT&CK, such as phishing email, DDoS attack, privilege escalation, all MITRE ATT&CKs with scanning the environments, using suspicious activity internal to our network. We have thousands of use cases covering different domains at network levels.

    We have use cases covering security controls and firewalls. We also have use cases that cover Active Directory, server events, and Citrix. Because we are working in a telecom company, we are covering 5G and 4G logs.

    What is most valuable?

    The aggregations are valuable when creating use cases with aggregations, which is beneficial for us.

    For automation, we are using multi-platform solutions. We have FortiSOAR  and IBM Resilient  for IBM Security QRadar  orchestration. We integrate with both IBM Security QRadar  and ArcSight, as we are working with customers who use both systems.

    What needs improvement?

    IBM Security QRadar has some areas for improvement. We have missed some DSM components. We need to customize logs where there is no DSM or connector for certain products.

    We can integrate but we have missed the DSM, which is the connector to pass logs coming from different applications. For example, with a university customer, we tried onboarding Canvas service. IBM Security QRadar does not support Canvas, so we had to create custom scripts and workarounds to pull logs from Canvas.

    For how long have I used the solution?

    We have been using the solution for around five years.

    What was my experience with deployment of the solution?

    The deployment is straightforward and easy for both installation types: standalone console, all-in-one, or in distribution modes.

    What do I think about the stability of the solution?

    Currently, it is very stable.

    What do I think about the scalability of the solution?

    For EPS license, if you increase or exceed the EPS license, you cannot receive events and IBM Security QRadar comes with this server. This issue existed previously when exceeding the limit for EPS license.

    How are customer service and support?

    The customer service experience is mixed. For critical issues, they provide L1 support rather than expert support initially. The L1 support follows standard steps before escalating to the development team or expertise team. In critical situations, this process can be problematic. Support needs to understand the issue first, then escalate it to the engineering team. The engineering team then sends an appointment meeting about the issue. This process can result in outages lasting three to four hours.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    I have been in the cybersecurity field since 2012. I have experience with many cybersecurity products including IBM Security QRadar, Splunk, SOAR , IBM Resilient  SOAR , Phantom , and various security controls and products.

    What was our ROI?

    ROI calculation is more applicable when using SOAR rather than SIM. In SIM, you don't have functions or enrichment to check if an IP is malicious or different reputations or websites. With SOAR, you can calculate ROI. For example, when an analyst receives alerts on IBM Security QRadar Offense, they would typically take 10 to 15 minutes to check an IP in VirusTotal , AbuseIPDB, TotalVirus, and other sources. With SOAR, the workflow takes one minute or less to complete the analysis.

    What's my experience with pricing, setup cost, and licensing?

    When comparing with Splunk, IBM Security QRadar's cost is reasonable. Splunk is more expensive than IBM Security QRadar.

    Which other solutions did I evaluate?

    We have machine learning for User Behavior Analytics  (UBA ), but IBM Security QRadar does not have AI connectors or integration with ChatGPT . Some SOARs are working with AI, such as FortiSOAR , which has chatbot and AI integration with ChatGPT  to create playbooks, assist analysts in exporting reports, and provide recommendations for alert responses.

    What other advice do I have?

    This implementation process receives a rating of six. In UAE, we have strict restrictions regarding compliance, particularly NIST compliance. Most companies should have local LLM, not public. Most SIM solutions or SOAR don't have the capability to build or need custom connectors for using AI with internal LLM, rather than cloud-based solutions ChatGPT or Gemini. Overall, I would rate IBM Security QRadar an eight out of ten.

    reviewer1370832

    Uses robust rulesets to enhance compliance audits and prevention

    Reviewed on Apr 09, 2025
    Review provided by PeerSpot

    What is our primary use case?

    Our primary use case was for compliance audits. We mainly used it for compliance purposes.

    What is most valuable?

    IBM Security QRadar  had good rulesets, and the scenarios we could write regarding the compliance-related issues were quite helpful. We mostly used it for prevention.

    What needs improvement?

    The commercials can be looked into. The costing part could be improved.

    For how long have I used the solution?

    I have been using the solution for around three years.

    What was my experience with deployment of the solution?

    There were no issues at all. It was straightforward.

    How are customer service and support?

    I was satisfied with IBM support.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    We switched mostly for commercial reasons.

    How was the initial setup?

    The initial setup was straightforward. It took a couple of weeks because we had to set up the rules and other configurations.

    What's my experience with pricing, setup cost, and licensing?

    The costing part, or commercials, was a concern.

    What other advice do I have?

    I would rate IBM Security QRadar  nine out of ten. The main reason for moving from this tool was the pricing.

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Md. Shahriar Hussain

    Real-time incident detection and user-friendly dashboard benefit daily operations

    Reviewed on Jan 03, 2025
    Review provided by PeerSpot

    What is our primary use case?

    I use it daily because it's shared as a log alert, and we have a security operations center. Every now and then, and almost every day, there are some alerts. I utilize it every day, twenty-four by seven, as you can see.

    What is most valuable?

    Actually, the dashboard is very good. The dashboard is easy to use and easy to understand what's going on and what the alerts mean. It's very user-friendly, I would say. So far, it's very good. Recently, I faced an incident, a cyber incident, and it was detected in real time. It correlates well with other solutions. I have EDR, vulnerability, and IPS, and it shows useful findings for root cause analysis.

    What needs improvement?

    There are many types of AI, and this AI is very limited in SQL and features. There may be potential for improvement. So far, it seems very limited. It shows some good features in the correlation part, but I think there is room for improvement. For instance, when creating rules, it can suggest more rules, reducing the effort needed. If AI-related support can suggest rules and integrate with existing security devices like MD, IPS, this SIM can create more relevant rules. Sometimes logs I receive don't mean anything, and I need technical stakeholders to share or forward logs, but these are sometimes inadequate. Keywords can help identify insufficient logs. I often lack time to verify logs. Sharing false positive results could be reduced to help my team.

    For how long have I used the solution?

    I have been working with the product for the last four months.

    What do I think about the stability of the solution?

    The product has been stable so far. I didn’t face any issues after deployment. I haven't encountered any software deployment issues, although I have only used it for four or five months. I might face issues after a year, two years, or with a major release or software update.

    What do I think about the scalability of the solution?

    I am satisfied with the scalability. It depends on my budget. How much I spend on licensing size is up to me.

    How are customer service and support?

    I received very good support, possibly due to a good relationship with IBM. I don't know about other companies, but I am happy with the support.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    Previously, I had another SIM before IBM brought it up, but I couldn't correlate with different solutions. Now it saves me at least one hour, sometimes up to three hours. I used Micro Focus, which I think was acquired by another company, possibly OpenText. The ownership changed. I am very satisfied with Qradar compared to OpenText. It's superior. I am not sure which one is best, but so far it is. My people had good training and needed to invest time to get good results.

    How was the initial setup?

    The initial setup was very difficult. I needed help from the local partner and expert users. Without expert users, it's challenging to deploy.

    What about the implementation team?

    Assistance from the support system is always needed.

    What was our ROI?

    It's still very early, but I have saved significant damage. Investing this amount was very much worth it for my organization.

    What's my experience with pricing, setup cost, and licensing?

    The cost depends. The price I negotiated varies by region and relationship with the OEM. Cost is not shared due to another procurement team handling negotiations, but it was reasonable as far as I know.

    What other advice do I have?

    My advice is to understand your infrastructure first. Assess the size before sending any protocol requests or RFPs to adjust licensing costs. You may procure licenses less or more than needed, impacting finances. Analyzing your infrastructure is crucial, considering the logs and security issues you will set. Trained personnel are necessary. Without them, usage is challenging. Overall, the product rating is eight out of ten.

    Which deployment model are you using for this solution?

    On-premises
    VuralSanal

    Current integration experience enhances network security through managed log collection and encryption

    Reviewed on Jan 03, 2025
    Review provided by PeerSpot

    What is our primary use case?

    I have experience with Centimeters solutions, one of which is Microsoft Sentinel. I often confuse the names, but I mean Sentinel. I also have experience with QRadar. In the past, I worked with Elasticsearch. I have generally configured some integrations, for example, between QRadar and other production environments for sending custom logs, though not all of them. I have been doing this for about two to three years. Usually, devices do not send CF in syslog or CS format logs, so we often troubleshoot on a Vural collector. Sometimes a device does not send the packet to a local collector, and we troubleshoot from the local collector's side. My colleagues and I generally use this management for production. I have integrated some network and security devices to send logs. In Turkey, there are regulations by the government that require collecting Internet traffic from VDS users. We need encryption on each log on QRadar. I focus on setting up this configuration. Our customers use Cisco StealthWatch, formerly known as NDR solutions, and we integrated these logs with QRadar and StealthWatch because we prefer not using all of them on NDR solutions. We send specific logs from StealthWatch. This integration is basic, not advanced, though there are some easy API integrations for communication between devices.

    What needs improvement?

    I think there is room for improvement with correlations in QRadar, especially in terms of customer logs. We receive logs from different types of devices and need a way to correlate them effectively. This would help identify critical or high-priority alarms in QRadar. Perhaps we are missing parameters in QRadar and need to double-check to enhance functionality.

    For how long have I used the solution?

    I have used the solution for approximately two to three years.

    What do I think about the stability of the solution?

    We sometimes experience downtime, but it depends on the version. There is some variability.

    How are customer service and support?

    Our partners in Turkey support QRadar integration because our team does not manage all aspects. We usually rely on local partners for support. They assist with advanced issues, such as hardware or other problems, that are not part of standard operations.

    How would you rate customer service and support?

    Positive

    What other advice do I have?

    All technologies are advancing towards AI integration. It is essential to integrate AI capabilities into devices to keep pace with future technologies and integrations. We should configure AI technologies in these products, though we currently lack experience and information. My overall rating for this solution is nine out of ten.

    JanHouĹľviÄŤka

    Improved integration challenges addressed with customizable user-defined rules

    Reviewed on Jan 02, 2025
    Review provided by PeerSpot

    What is our primary use case?

    I am using QRadar, like standard centimeters, for security monitoring for information systems.

    What is most valuable?

    I use standard rules and special user-defined or correlation rules. I also use behavioral analysis for users. Additionally, there is limited integration with other systems. IBM is seeking information about IBM QRadar because a part of QRadar, especially in the cloud, has been sold to Palo Alto.

    What needs improvement?

    Improving the integration with IBM Server for MetaMask for correlation rules would be beneficial. Currently, I use Sentinel in Azure, and I would prefer creating one rule to roll it out to both Sentinel and QRadar. However, this is not possible because QRadar lacks this capability.

    For how long have I used the solution?

    I have been using QRadar for five or six years.

    What do I think about the stability of the solution?

    I think QRadar is stable and currently satisfies my needs. However, there is uncertainty about the future because if IBM sold part of QRadar to Palo Alto, it would be a concerning signal.

    What do I think about the scalability of the solution?

    Scalability is fine. It is one of the three well-known CMs.

    How are customer service and support?

    I am unsure because the problem escalates through level one to level three, and then the process starts over with Novo again. This is problematic for technical support.

    Which other solutions did I evaluate?

    I am not personally using it. These boxes are in use within my company.

    What other advice do I have?

    In the middle of evaluating, I am looking for some information about comparison boxes or licenses, products, and so on. I am interested in this issue, but I will not purchase it personally. We have a plan for internal projects for this. Product rating: five out of ten.

    Which deployment model are you using for this solution?

    On-premises

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Microsoft Azure
    View all reviews