IBM Security QRadar and Trellix Endpoint Security compete in the cybersecurity market. IBM QRadar has the upper hand in security intelligence and integration capabilities, while Trellix focuses strongly on endpoint protection, particularly for antivirus and firewall functions.
Features: IBM Security QRadar offers ease of extracting information from logs, scalability, and minimal necessity for highly skilled personnel. It provides advanced log management, SIEM capabilities, and broad integration options. Trellix Endpoint Security offers robust endpoint protection with antivirus and firewall capabilities, central management, and ease of control, making it suitable for managing extensive security needs like DLP and firewall management.
Room for Improvement: IBM Security QRadar could improve in user interface design, API accessibility, and better integration performance with other security tools. Some users find its graphs and search features less optimized for performance and usability. Trellix Endpoint Security could enhance its configuration ease and interface, along with expanding support for Linux and Mac systems and advancing its threat protection capabilities.
Ease of Deployment and Customer Service: IBM Security QRadar supports versatile deployment across on-premises, cloud, and hybrid setups. Customer service reviews vary widely, with mixed experiences in technical support. Trellix Endpoint Security is similarly deployable across different environments, with customer service generally rated reliable, though there's room for more prompt communication improvements according to some users.
Pricing and ROI: IBM Security QRadar is seen as a premium product with pricing based on events per second, which can be costly for high data volumes. However, larger enterprises value its benefits and features, yielding good ROI. Trellix Endpoint Security offers more economical pricing and licensing options, providing significant value especially for smaller or cost-sensitive organizations.
Investing this amount was very much worth it for my organization.
Clients appreciate the solution’s customization capabilities and ongoing product improvements.
We have observed tremendous return on investment after implementing Trellix Endpoint Security as it is a more cost-effective solution compared to other products.
They assist with advanced issues, such as hardware or other problems, that are not part of standard operations.
The problem escalates through level one to level three, and then the process starts over with Novo again.
I received very good support, possibly due to a good relationship with IBM.
The response time is a notable issue.
I would rate their customer service nine out of ten.
Some engineers are knowledgeable.
Trellix Endpoint Security is scalable.
I would rate the scalability of the solution as a six out of ten, indicating some challenges due to downtime requirements.
I think QRadar is stable and currently satisfies my needs.
The product has been stable so far.
I would rate the stability of Trellix Endpoint Security as near perfect, close to ten out of ten.
I would rate its stability as nine out of ten.
We receive logs from different types of devices and need a way to correlate them effectively.
If AI-related support can suggest rules and integrate with existing security devices like MD, IPS, this SIM can create more relevant rules.
Improving the integration with IBM Server for MetaMask for correlation rules would be beneficial.
The product does not seem to be cloud-native.
It would also help if detection specifics were identified more quickly and the problem-solving process accelerated, especially to meet larger clients' expectations.
What needs improvement in Trellix Endpoint Security is the reduction of resource consumption by the scanning feature.
Trellix Endpoint Security is cost-effective and provides excellent value for money.
The license costs are very reasonable, around 1,000 to 1,200 rupees per year.
Recently, I faced an incident, a cyber incident, and it was detected in real time.
IBM is seeking information about IBM QRadar because a part of QRadar, especially in the cloud, has been sold to Palo Alto.
The scenarios we could write regarding the compliance-related issues were quite helpful.
Trellix Endpoint Security is a proven, robust, and cost-effective solution that protects the organization from different types of ransomware and attacks.
Including options like Application Control (formerly Solidcore), integrated monitoring, change control, DLP, and advanced threat protection, the solution offers comprehensive security.
The product does not seem to be cloud-native and there are issues with automating it.
IBM Security QRadar (recently acquired by Palo Alto Networks) is a security and analytics platform designed to defend against threats and scale security operations. This is done through integrated visibility, investigation, detection, and response. QRadar empowers security groups with actionable insights into high-priority threats by providing visibility into enterprise security data. Through centralized visibility, security teams and analysts can determine their security stance, which areas pose a potential threat, and which areas are critical. This will help streamline workflows by eliminating the need to pivot between tools.
IBM Security QRadar is built to address a wide range of security issues and can be easily scaled with minimal customization effort required. As data is ingested, QRadar administers automated, real-time security intelligence to swiftly and precisely discover and prioritize threats. The platform will issue alerts with actionable, rich context into developing threats. Security teams and analysts can then rapidly respond to minimize the attackers' strike. The solution will provide a complete view of activity in both cloud-based and on-premise environments as a large amount of data is ingested throughout the enterprise. Additionally, QRadar’s anomaly detection intelligence enables security teams to identify any user behavior changes that could be indicators of potential threats.
IBM QRadar Log Manager
To better help organizations protect themselves against potential security threats, attacks, and breaches, IBM QRadar Log Manager gathers, analyzes, preserves, and reports on security log events using QRadar Sense Analytics. All operating systems and applications, servers, devices, and applications are converted into searchable and actionable intelligent data. QRadar Log Manager then helps organizations meet compliance reporting and monitoring requirements, which can be further upgraded to QRadar SIEM for a more superior level of threat protection.
Some of QRadar Log Manager’s key features include:
Reviews from Real Users
IBM Security QRadar is a solution of choice among users because it provides a complete solution for security teams by integrating network analysis, log management, user behavior analytics, threat intelligence, and AI-powered investigations into a single solution. Users particularly like having a single window into their network and its ability to be used for larger enterprises.
Simon T., a cyber security services operations manager at an aerospace/defense firm, notes, "The most valuable thing about QRadar is that you have a single window into your network, SIEM, network flows, and risk management of your assets. If you use Splunk, for instance, then you still need a full packet capture solution, whereas the full packet capture solution is integrated within QRadar. Its application ecosystem makes it very powerful in terms of doing analysis."
A management executive at a security firm says, "What we like about QRadar and the models that IBM has, is it can go from a small-to-medium enterprise to a larger organization, and it gives you the same value."
Trellix Endpoint Security provides aggressive robust protection for every endpoint in an enterprise organization. Trellix uses dynamic threat intelligence and mounts a superb defense across the complete threat lifecycle. This solution will keep your organization more secure and resistant to any possible threat of risks. Trellix offers an amalgamated suite of next-generation endpoint security tools. These tools give users the benefit of machine learning, intuitive intelligence, and greater assistance to ensure their networks are being protected non-stop against threats - potential or realized - and can stop attacks before they happen. Trellix uses MDR (managed detection and response) and XDR (extended detection and response) to give users a comprehensive endpoint security solution.
Trellix Endpoint Security Benefits
Trellix Endpoint Security Top Features
Reviews from Real Users
“It has a great console. We can manage everything from the central console and it is very easy. Every year we are getting the benefits of legacy also. It's easy to set up.” - S Fazlul H., IT Lead Engineer, Information Technology at Banglalink
“There is a new feature where you can set thresholds for all the CPU consumption allowing for no consumption on the servers when the scans happen. It is a separate plugin or addon, and if we have it on all the virtual machines it automatically checks the resources, and based on that, it will schedule the scans. That is something that I have not seen in other antivirus solutions, such as Symantec.” - Sabari K. Senior Engineer at a comms service provider
We monitor all Extended Detection and Response (XDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.