IBM’s new QRadar offering for security operations teams, announced at RSA, aims to pull together large customers’ heterodox security environments. IBM at the RSA conference today announced the availability of its new QRadar Security Suite, which is designed to help simplify the challenges faced by security teams tasked with managing an ever-growing list of different security tools.QRadar is a largely AWS-based SaaS system that features four core products that can be managed from the central QRadar console. The first is Log Insights, which the company said is a cloud-native log analytics platform designed with optimized search and rapid analysis on very large datasets.The second is QRadar EDR (Endpoint detection and response ) and XDR (extended detection and response), an endpoint management system with AI and behavioral modeling features that allow it to monitor devices from outside the endpoint, making it more difficult to confuse and giving it the ability to quickly correlate alerts from different sources and, in concert with the rest of the platform, perform automatic investigations. The third is QRadar SOAR (security orchestration and response), an automated incident detection and response system that, according to IBM, can substantially reduce the response time in the event of a ransomware attack or other data breach. Finally, QRadar offers SIEM (security information and event management), providing a unified interface for a host of capabilities like real-time threat detection, threat intelligence integration, and AI-powered network and user analytics.By unifying these capabilities under one management system, IBM hopes to provide a dramatically simpler and more powerful front-end for security teams at larger companies. “By helping analysts respond faster and more efficiently, QRadar Suite can also help security teams improve their productivity and free up analysts’ time for higher-value work,” the company said in a statement.The idea of a unifying security console isn’t new, according to ESG distinguished analyst Jon Oltsik, but the QRadar release is a positive move for IBM, particularly in regard to its customer base, which skews heavily toward larger companies with commensurately complicated security infrastructure.Combining cloud, analytics, and security experience“It’s a step in the right direction for IBM,” he said. “If you combine the cloud-based platform with IBM’s analytics and experience in security, it’s a good package.” Like other vendors, IBM realizes there are gaps in their security offerings, Oltsik noted, but QRadar’s wide base of compatibility — the company cites “hundreds” of such integrations — may help it stand out in the market.“[IBM’s] customers are some of the biggest in the world, they’re going to have heterogenous security portfolios,” he said. “Other vendors mostly offer lip service around that.”IBM said that QRadar’s components, which are available immediately, can be purchased a la carte or as a full suite. As mentioned, are all delivered as a service via AWS, with the exception of the SIEM component, which will be initially hosted on IBM Cloud. (It will become available on AWS later in the quarter, per an IBM spokesperson.) The company declined to provide specific pricing details. Related content news CISA inks 68 tech vendors to secure-by-design pledge — but will it matter? CISA’s pledge drew some big names, but the impact on software security could be limited. Meanwhile the org has extended its comment period on the CIRCIA cyberattack reporting law. By Jon Gold May 10, 2024 4 mins Regulation Technology Industry Security Practices news Google Chrome gets a patch for actively exploited zero-day vulnerability Details of the use-after-free memory vulnerability were not publicly released, but Google says it’s aware an exploit for the bug exists. By Lucian Constantin May 10, 2024 3 mins Threat and Vulnerability Management Zero-day vulnerability Vulnerabilities news Dell data breach exposes data of 49 million customers The company says the breach compromised non-critical customer data and involved no sensitive personal or financial information. By Shweta Sharma May 10, 2024 3 mins Data Breach Hacking feature Social engineering: Definition, examples, and techniques Social engineering is the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems, or data. Train yourself to spot the signs. By Josh Fruhlinger May 10, 2024 15 mins Phishing Social Engineering PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe