IBM’s new QRadar offering for security operations teams, announced at RSA, aims to pull together large customers’ heterodox security environments. IBM at the RSA conference today announced the availability of its new QRadar Security Suite, which is designed to help simplify the challenges faced by security teams tasked with managing an ever-growing list of different security tools.QRadar is a largely AWS-based SaaS system that features four core products that can be managed from the central QRadar console. The first is Log Insights, which the company said is a cloud-native log analytics platform designed with optimized search and rapid analysis on very large datasets.The second is QRadar EDR (Endpoint detection and response ) and XDR (extended detection and response), an endpoint management system with AI and behavioral modeling features that allow it to monitor devices from outside the endpoint, making it more difficult to confuse and giving it the ability to quickly correlate alerts from different sources and, in concert with the rest of the platform, perform automatic investigations. The third is QRadar SOAR (security orchestration and response), an automated incident detection and response system that, according to IBM, can substantially reduce the response time in the event of a ransomware attack or other data breach. Finally, QRadar offers SIEM (security information and event management), providing a unified interface for a host of capabilities like real-time threat detection, threat intelligence integration, and AI-powered network and user analytics.By unifying these capabilities under one management system, IBM hopes to provide a dramatically simpler and more powerful front-end for security teams at larger companies. “By helping analysts respond faster and more efficiently, QRadar Suite can also help security teams improve their productivity and free up analysts’ time for higher-value work,” the company said in a statement.The idea of a unifying security console isn’t new, according to ESG distinguished analyst Jon Oltsik, but the QRadar release is a positive move for IBM, particularly in regard to its customer base, which skews heavily toward larger companies with commensurately complicated security infrastructure.Combining cloud, analytics, and security experience“It’s a step in the right direction for IBM,” he said. “If you combine the cloud-based platform with IBM’s analytics and experience in security, it’s a good package.” Like other vendors, IBM realizes there are gaps in their security offerings, Oltsik noted, but QRadar’s wide base of compatibility — the company cites “hundreds” of such integrations — may help it stand out in the market.“[IBM’s] customers are some of the biggest in the world, they’re going to have heterogenous security portfolios,” he said. “Other vendors mostly offer lip service around that.”IBM said that QRadar’s components, which are available immediately, can be purchased a la carte or as a full suite. As mentioned, are all delivered as a service via AWS, with the exception of the SIEM component, which will be initially hosted on IBM Cloud. (It will become available on AWS later in the quarter, per an IBM spokesperson.) The company declined to provide specific pricing details. Related content news analysis SEC rule for finance firms boosts disclosure requirements Amendments to Regulation S-P requires broker-dealers, investment companies, registered investment advisers, and transfer agents to disclose incidents to customers. By Evan Schuman May 17, 2024 5 mins Data Breach Financial Services Industry Data Privacy feature DDoS attacks: Definition, examples, and techniques Distributed denial of service (DDoS) attacks have been part of the criminal toolbox for over twenty years, and they’re only growing more prevalent and stronger. By Josh Fruhlinger May 17, 2024 10 mins DDoS Cyberattacks news FCC proposes BGP security measures Protecting the Border Gateway Protocol is as important as protecting the border. By Gyana Swain May 17, 2024 1 min Regulation Network Security news US AI experts targeted in cyberespionage campaign using SugarGh0st RAT Threat actors use phishing techniques to obtain non-public information about generative artificial intelligence. By Lucian Constantin May 16, 2024 4 mins Phishing Data and Information Security PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe