As a PS consultant on projects where the customer is transitioning from a competitor's SIEM to QRadar, they are very pleased when they see the number of quality offenses being caught soon after implementation and integration of log sources just from the out-of-the box rules enabled by default.
Sr SIEM Consultant at a tech services company with 51-200 employees
Built-in rules are enabled by default and tunable to meet the specific needs of each organization.
Pros and Cons
- "Network-Based Anomaly Detection (NBAD): Using NetFlow, JFlow, SFlow, or QFlow (all 7 layers), offenses are detected as a response when a rule is triggered."
- "Some UI enhancements would be nice, such as exporting custom event properties and the ability to export rules."
What is our primary use case?
How has it helped my organization?
As a Professional Services consultant, I have heard many reports of how QRadar SIEM has quickly identified offenses which the users were unaware of previously. In addition to giving CISO’s gained visibility and increasing security posture, QRadar adheres to an organization's regulatory compliance across a number of industries (i.e. Healthcare, Financial, Retail, Energy and Government)
What is most valuable?
- Correlation Rule Engine, built-in use cases: QRadar has the highest number of built-in use cases among any SIEM on the market. There are many built-in rules that are enabled by default and easily tunable to meet the specific needs of each organization. The correlation engine automates what is a manual process for many SIEM platforms.
- Network-Based Anomaly Detection (NBAD): Using NetFlow, JFlow, SFlow, or QFlow (all 7 layers), offenses are detected as a response when a rule is triggered.
- QRadar Vulnerability Management: Built-in vulnerability scanner or leverage for other supported scanners to either schedule a scan and/or import the results from a scan. Importing the results enriches the assets profile database to quickly identify assets that have known vulnerabilities.
- X-Force Threat Intelligence: Threat intelligence IP reputation feed which leverages a series of international data centers to collect tens of thousands of malware samples, to analyze web pages and URLs, and to run analysis to categorize potentially malicious IP addresses and URLs.
- App Exchange: Many vendors have written apps to enhance QRadar. The apps are free and enhance your SIEM experience by adding rules and custom event properties. In some cases a new tab. You will need to have purchased the third party solution. For example, if you have Palo Alto or Blue Coat, there's a free app for better integration.
What needs improvement?
Some UI enhancements would be nice, such as exporting custom event properties and the ability to export rules.
Buyer's Guide
IBM Security QRadar
October 2025
Learn what your peers think about IBM Security QRadar. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
872,837 professionals have used our research since 2012.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
We did not encounter any issues with stability.
What do I think about the scalability of the solution?
We did not encounter any issues with scalability.
How are customer service and support?
The technical support is very good.
Which solution did I use previously and why did I switch?
We had limited experience with RSA enVision, LogRhythm, and HPE ArcSight. QRadar is much easier and takes less time to implement and maintain.
How was the initial setup?
The initial setup was straightforward.
What's my experience with pricing, setup cost, and licensing?
Go through a vulnerability assessment review for price breaks. A virtualized solution will also cut down on cost.
Which other solutions did I evaluate?
We did not evaluate any other options.
What other advice do I have?
Every SIEM tool has a certain degree of complexity, especially where use cases and rules are concerned. I advise using Professional Services so your SIEM is configured by trained professionals.
Disclosure: My company has a business relationship with this vendor other than being a customer. We are a business partner of IBM.
Solution Architect with 201-500 employees
Improved our organization's total cost of ownership
Pros and Cons
- "Improved our organization's TCO."
- "GUI needs to be improved."
What is our primary use case?
- Users' behavior analytics
- Monitor leakage for data
- Payment card industry compliance
- Integration with end points management system
- Integration with Incident Response and Ticketing System
How has it helped my organization?
- Easy to deploy
- Time to value
- Total cost of ownership (TCO)
- Deployment options for on-premise
- SaaS
- Hybrid
What is most valuable?
- X-Force feed
- Watson for cyber security
- App Exchange
- Scalability and licensing model
- Vulnerability and risk management on network topology
What needs improvement?
Needs to be improved:
- Graphical User Interface (GUI)
- Multi-tenancy and domain(s) segregation.
For how long have I used the solution?
One to three years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
IBM Security QRadar
October 2025
Learn what your peers think about IBM Security QRadar. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
872,837 professionals have used our research since 2012.
IT Director at MyEyeDr.
It summarizes all the other security products.
How has it helped my organization?
It has improved our ability to research and detect anomalous behavior and activity within our network. It has really helped us in our ability to research active threats. We saw the threats when we implemented it, and we saw that we had all kinds of deficiencies in our network infrastructure that we were unaware of previously.
What is most valuable?
It has the ability to summarize all the other security products and give us a one-stop-shop dashboard.
IBM has added a new UBA (User Behavior Analytics) app to QRadar that uses the cognitive abilities of Watson to detect and prioritize user activity and risks on the network. It analyzes log activity already recorded so it can begin providing insights quickly after installation.
What needs improvement?
I'm anxious to see the Watson integration. We just finished an upgrade of our appliance so that we can be eligible to do the Watson integration. I'm anxious to see how that works.
What do I think about the stability of the solution?
It works well. We've been using it for a year now. It's helped us greatly to cut down on the time it takes to research a problem or to actually find the problem.
What do I think about the scalability of the solution?
In terms of scalability, so far, so good. What we've purchased so far is well with the infrastructure that we have. I know there are options to buy additional components should I need them.
How are customer service and technical support?
We use a business partner for implementation and support. They are always involved with it. They are not IBM.
Which solution did I use previously and why did I switch?
We weren't previously using a different solution. As security becomes more and more important, we added different security components from IBM, with QRadar being the last one. We needed some way to see all the data, all the information, and get it together in one single source of truth.
How was the initial setup?
I was involved as far as picking and approving the solution. I was not involved in the installation.
What other advice do I have?
We try to do everything all at once.
Find the right partner to help you do the implementation.
When picking a vendor, we look for the support, the ease of the installation, and the future of the product.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
IT Security Manager at a tech services company
Some of the valuable features are QM, QRM, and forensics.
What is most valuable?
Some of the valuable features are QM, QRM, and forensics.
How has it helped my organization?
There many use cases.
What needs improvement?
I would like to see SOC.
For how long have I used the solution?
We have been using this for three years.
What was my experience with deployment of the solution?
There were no deployment issues.
What do I think about the stability of the solution?
There were no stability issues.
What do I think about the scalability of the solution?
There were no scalability issues.
How are customer service and technical support?
Customer Service:
Customer service is very good.
Technical Support:Technical support is excellent.
Which solution did I use previously and why did I switch?
We used another solution and we switched due to false positives.
How was the initial setup?
The setup was straightforward and not complex.
What about the implementation team?
We used a partner and vendor team and we have expertise in-house.
What was our ROI?
The ROI is acceptable.
What's my experience with pricing, setup cost, and licensing?
It is a bit more expensive than some others, SIEM, but it is more efficient.
Which other solutions did I evaluate?
We evaluated AlienVault, McAfee, and Splunk.
What other advice do I have?
It is a good solution.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Vulnerability Manager at a tech services company with 51-200 employees
The threat protection network is the most valuable feature
Pros and Cons
- "The threat protection network is the most valuable feature, because when you get an offense, you can actually trace it back to where it originated from, how it originated, and why."
- "The threat protection network is the most valuable feature, because when you get an offense, you can actually trace it back to where it originated from, how it originated, and why."
- "I would like to see a more user-friendly product."
How has it helped my organization?
Normally, an offense comes in and an offense is something negative, it triggers when certain events don't comply with the rules, to put it plainly, it is something that will have impacted your environment very negatively. Once it comes through, you can then see from the QRadar log sources, who or what triggered the offense.
For example, if an IP is browsing somewhere where it shouldn't be browsing. Let's say that one of your log sources reported it back to QRadar. You can see if the IP that browsed on certain websites where it shouldn't be browsing. When you right-click and go to the threat protection network, that will normally show you who is browsing, where that IP is coming from, what type of website it is browsing, and if it is good or bad. If it's bad, it will give you recommendations on how to resolve the issue.
What is most valuable?
The threat protection network is the most valuable feature, because when you get an offense, you can actually trace it back to where it originated from, how it originated, and why.
What needs improvement?
I would like to see a more user-friendly product. I would like them to make it more user-friendly. At this stage, you need to use a lot of regular expressions to do your searches.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
In the first year I used it, there were a few stability problems. In the previous three years, there haven’t been any major stability issues.
What do I think about the scalability of the solution?
I've seen no scalability issues in any of the environments where I am working at the moment. I've seen how it handles a lot of load. I'm talking about a 5,000-user environment. It can handle a lot of logs and events coming through simultaneously.
If you spec it properly, with the proper hardware requirements, then it doesn’t crash. I've seen how people give it way less specs than it should have, then it does crash. But that was the fault on the users’ side, and not the fault of the product.
How is customer service and technical support?
I would give technical support a rating of an eight out of 10. When they help you with a call for a problem with the product, which I've had twice, the next day, they roll out an update worldwide for all their products to be patched on that problem.
They lose too much time, in my opinion. Normally, you struggle a bit to get a hold of them and get to the correct person to assist you. Even though this isn't a very big delay, it usually takes about an hour. However, in my company, an hour can make a very big difference in my life. For example, it will take me about an hour to an hour and a half to get support from them. I'm a person who loves to get it done now. So if you don't mind waiting about an hour, then it can be very good support. When you log a call with IBM, it takes them about an hour to start working on the problem.
How was the initial setup?
The setup was very straightforward. It's basically, "next, next, type in machine details and next”, then you are finished.
What's my experience with pricing, setup cost, and licensing?
IBM's Qradar is not for small companie. Unfortunately, it would be 'overkill' to place it plainly. The pricing would be too much.
Which other solutions did I evaluate?
I wasn't completely part of the whole process when they chose a product. I know they evaluated AlienVault, which unfortunately, I do not have any experience with, neither was I part of the whole processes. I'm not able to provide pointers as to why the company chose IBM QRadar. I believe it's because we are a partner with them.
What other advice do I have?
Just spec it correctly and it will do its job for you. It has an active community. IBM patches the product regularly when problems are picked up. I haven’t heard about a lot of problems from other people using the product.
Disclosure: My company has a business relationship with this vendor other than being a customer. We are a Partner.
Sr. Security Engineer at a tech services company with 11-50 employees
We use it to create use cases and review offenses. One of the valuable features is its correlation engine.
What is most valuable?
- User-friendly
- Easy to deploy
- Easy to create use cases
- Easy to review an offense
- Its correlation engine is one of the best
How has it helped my organization?
I usually work on the deployment and fine-tuning of this product. However, I have some operational experience as well. For instance, you can simply audit all the IT equipment in your environment, such as the firewall, the IPS, and the Active Directory (AD) server.
What needs improvement?
It should have built-in blocking capability.
For how long have I used the solution?
I have used this solution for four years.
What do I think about the stability of the solution?
On a scale of 100, it is 95% stable.
What do I think about the scalability of the solution?
I did experience some scalability issues in one organization.
How are customer service and technical support?
The technical support is excellent.
Which solution did I use previously and why did I switch?
We were not using any other solution previously. This was my first solution. I am still working on it. I also have experience with McAfee Nitro and LogRhythm.
How was the initial setup?
The setup was straightforward.
What's my experience with pricing, setup cost, and licensing?
The pricing will definitely vary according to your EPS, but it is worth spending money on this product.
Which other solutions did I evaluate?
We looked at other solutions, such as McAfee Nitro and LogRhythm.
What other advice do I have?
Work on sizing as much as you can so you can avoid any issues after deployment. You should also fulfill hardware requirements for this product. Otherwise, you will not get its full functionality.
Disclosure: My company has a business relationship with this vendor other than being a customer. I am a vendor.
IT Manager at a comms service provider with 1,001-5,000 employees
Contextual and threat-based incident management.
What is most valuable?
- Paradigm shift, security intelligence 2.0
- Contextual-based incident management
- Threat-based incident management
- A single management console to handle all the data
- Ease of use
- Existing integration capabilities
- Out-of-the-box reports
- Parser development
How has it helped my organization?
It has helped us in the reduction of VPN frauds via the active monitoring of various frauds.
What needs improvement?
- There is a scope of improvement in the orchestration layer, such as the SecOps from RSA. RSA Security Analytics bundles their offering with their SecOps (a subset of Archer - Risk Governance tool). This gives them a competitive edge.
- The reporting and dashboard capabilities require a bit of improvement in terms of fine tuning and bifurcation for the technical and management reports.
For how long have I used the solution?
I have used this solution for four years.
What do I think about the stability of the solution?
There were no stability issues.
How is customer service and technical support?
I would give technical support a rating of 9/10.
How was the initial setup?
The setup was straightforward and the deployment was easy.
What's my experience with pricing, setup cost, and licensing?
The pricing policy is a bit on the higher side. IBM offers discounts when applicable.
Which other solutions did I evaluate?
We looked at other solutions such as RSA enVision and HPE ArcSight.
What other advice do I have?
Trust it, test it, and deploy it.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Lead Developer
Based on the analysis, we can easily identify from where the threat is originating.
What is most valuable?
The most valuable features of this solution are analyzing who is saying what and in case of a threat, we can easily identify from where the threat is originating, based on the analysis.
How has it helped my organization?
We have implemented this QRadar solution to identify the data, whether it is being used at various parties including our trading partners, i.e., both the internal as well as external partners. Thus, by using this product, we can also come to the conclusion as to how the data is being applied best and we can decide what to link, i.e., if we need any infrastructure improvements and so on.
What do I think about the stability of the solution?
I am not currently responsible for this product. However, I did not hear any complaints from the other people in terms of its stability.
What do I think about the scalability of the solution?
We are not directly managing this product. I am from the integration team and the QRadar solution is mostly used by our information security.
Which solution did I use previously and why did I switch?
Initially, we were using another IBM product. With QRadar, we are getting better outputs such as the reports and other outputs.
The reason why we chose IBM is because we are using so many products from IBM today.
In general, the most important criteria that we look for while selecting a vendor are that there should be other proven solutions offered by the vendor and they need to be a type of investigator since we belong to a specific healthcare industry. So, we are very careful when we are choosing a vendor.
How was the initial setup?
We were involved in the setup in terms of sending the information back and forth to QRadar. Other than that, I did not take part in the installation.
What other advice do I have?
Definitely invest in the QRadar solution.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free IBM Security QRadar Report and get advice and tips from experienced pros
sharing their opinions.
Updated: October 2025
Product Categories
Security Information and Event Management (SIEM) Log Management User Entity Behavior Analytics (UEBA) Endpoint Detection and Response (EDR) Security Orchestration Automation and Response (SOAR) Managed Detection and Response (MDR) Extended Detection and Response (XDR)Popular Comparisons
CrowdStrike Falcon
Fortinet FortiEDR
Dynatrace
Splunk Enterprise Security
Microsoft Sentinel
Darktrace
SentinelOne Singularity Complete
Microsoft Defender XDR
Cortex XDR by Palo Alto Networks
Elastic Security
Grafana Loki
Varonis Platform
Buyer's Guide
Download our free IBM Security QRadar Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which would you recommend to your boss, IBM QRadar or Splunk?
- What SOC product do you recommend?
- Has anyone got experience in deployment of a SIEM solution?
- IBM QRadar is rated above competitors (McAfee, Splunk, LogRhythm) in Gartner's 2020 Magic Quandrant. Agree/Disagree?
- What is your opinion of IBM QRadar?
- What are the biggest differences between Securonix UEBA, Exabeam, and IBM QRadar?
- Why do most companies prefer IBM QRadar?
- What Solution for SIEM is Best To Be NIST 800-171 Compliant?
- When evaluating Security Information and Event Management (SIEM), what aspect do you think is the most important feature to look for?
- What are the main differences between Nessus and Arcsight?
















Damian, regarding rule export, the question is what do you want to do with this export. QRadar as probably you know has CMT tool (Content Management Tool) which will allow you export custom rules. though that has been said. Always is the question what next. if you want to import them to other Qradar system then yes you can, if you think about them in category of Yara rules then no you cannot use this export in third party solutions