"One or two people can maintain and support the solution. The maintenance is not difficult."
More Hillstone I-Series Server Breach Detection System Pros →
"IBM QRadar User Behavior Analytics's most important feature is its ease of use."
"It provides many options for searching. I can see devices from different vendors, like Cisco, in one interface, which is good for me."
"The feature that I find the most useful is that IBM QRadar User Behavior Analytics is free of charge. It's a fully free product that can be installed on top of IBM QRadar SIEM."
"It's hard for me to pinpoint any one feature that's most valuable because it is all about consuming logs and analyzing them. We started using QRadar UBA because we needed something that could analyze Linux authentication information. Other products take care of the Windows platform."
"IBM QRadar User Behavior Analytics has easy architecture, has a good portfolio and integration."
"I have used IBM QRadar User Behavior Analytics in a Cloud Pak on Amazon, and there it runs on top of it and is easy to assess. Additionally, I have installed processes and characters."
"Integration is very easy and the reporting is good."
"The scalability is very good. It's not a problem."
"Hillstone I-Series Server Breach Detection System can improve by having more anti-spam features that will hopefully eliminate all of the other threats."
More Hillstone I-Series Server Breach Detection System Cons →
"I don't give it a 10 because it is something we have to request. I would love it if UBA was included out of the box like Microsoft."
"Whenever we are upgrading or installing any type of patch, at that time we have some delays."
"IBM QRadar User Behavior Analytics could improve machine learning use cases because they are limited and most of the use cases are rule-based. They should develop more use cases, such as in Securonix or Exabeam because they will detect a threat. Using machine learning is mainly on the correlation rules, but if you think about Exabeam or Securonix, they detect using machine learning or machine learning-based algorithms."
"The solution lacks vendor support."
"The user interface and configurability of IBM QRadar User Behavior Analytics can be improved. It has a lot of pre-configured settings and not many things can be changed. It also needs more integrations. Currently, User Behavior Analytics is integrated only with IBM QRadar. It could have deeper integrations. It can also have more complicated scoring models. Currently, it has a very simple linear scoring model for users."
"The solution could improve by having more out-of-the-box use cases."
"We sometimes get an error about the hard drive. Approximately once in two months, we can't find the logs, and they go missing, which is a terrible issue. We are getting support for this issue from our support company."
"The dashboard is pathetic and it takes a long time to perform a search."
More IBM QRadar User Behavior Analytics Pricing and Cost Advice →
Hillstone I-Series Server Breach Detection System is ranked 18th in User Behavior Analytics - UEBA with 1 review while IBM QRadar User Behavior Analytics is ranked 7th in User Behavior Analytics - UEBA with 10 reviews. Hillstone I-Series Server Breach Detection System is rated 7.0, while IBM QRadar User Behavior Analytics is rated 7.2. The top reviewer of Hillstone I-Series Server Breach Detection System writes "Simple maintenance, scalable, but better anti-spam features needed". On the other hand, the top reviewer of IBM QRadar User Behavior Analytics writes "It has good support and works with Linux platforms". Hillstone I-Series Server Breach Detection System is most compared with , whereas IBM QRadar User Behavior Analytics is most compared with Splunk User Behavior Analytics, Securonix UEBA, Microsoft Defender for Identity, Cynet and Exabeam Fusion SIEM.
See our list of best User Behavior Analytics - UEBA vendors.
We monitor all User Behavior Analytics - UEBA reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.