


IBM Security QRadar and Lumu are direct competitors in the cybersecurity sector. Lumu appears to have the upper hand in threat visibility due to its innovative approach to detecting unseen threats, whereas QRadar is recognized for reliable threat detection.
Features: IBM Security QRadar is known for its advanced threat intelligence, robust analytics, and strong security incident detection capabilities. Additionally, it supports comprehensive log management across diverse IT infrastructures. Lumu offers continuous compromise assessments, real-time threat actor visibility, and streamlined threat identification, driving proactive defense strategies.
Room for Improvement: IBM Security QRadar could enhance its deployment simplicity and user interface to address evolving user needs. There are opportunities for QRadar to integrate more seamlessly with newer technologies. Lumu can improve its integration capabilities with various security tools and expand its detection algorithms for more intricate threats. It may also enhance its documentation for better user guidance.
Ease of Deployment and Customer Service: IBM Security QRadar involves a complex deployment process requiring significant integration efforts; however, it provides robust customer support during implementation. In contrast, Lumu offers a rapid, user-friendly setup with responsive support, enabling quick adaptation to dynamic environments.
Pricing and ROI: IBM Security QRadar requires a considerable upfront investment, reflecting its extensive functionality, but delivers high long-term ROI through deep integration. Lumu provides competitive pricing with cost-effective deployment options, yielding immediate returns through its efficient threat detection focus.
They appreciate the rich telemetry data from the solution, as it provides in-depth threat identification.
Cortex XDR by Palo Alto Networks helps to reduce my total cost of ownership significantly.
In Cortex XDR by Palo Alto Networks, most of the remediation is automated and the accuracy is quite good.
With SOAR, the workflow takes one minute or less to complete the analysis.
AWS gives the chance to implement a solution out of the box with use cases that are already in IBM Security QRadar.
Investing this amount was very much worth it for my organization.
It self-reports as saving 10 to 20 hours a week of engineer time.
The technical support from Palo Alto deserves a mark of ten because they reach out within an hour whenever assistance is needed.
There is no back and forth, and they know what we are asking for and come up with the best resolution for a solution.
If any of these services are missed, it becomes a problem in terms of support tickets, follow-up, or special configuration that needs to be done in the system.
They assist with advanced issues, such as hardware or other problems, that are not part of standard operations.
Support needs to understand the issue first, then escalate it to the engineering team.
The support is really good; for instance, if a critical ticket is submitted, you will get paged right away as it gets logged, and their analyst will look into it, letting you know as soon as possible so you can work on it.
It picks up on borderline issues that matter.
You can onboard 10,000 endpoints in just hours, which demonstrates the excellent scalability of this product.
Activating the newly purchased licenses is instantaneous, allowing installations without adjustments since it's cloud-based.
Cortex XDR by Palo Alto Networks can be expanded anytime by purchasing another license without any issues related to scalability.
For EPS license, if you increase or exceed the EPS license, you cannot receive events.
Cortex remains fast and responsive, even with increasing data and alerts.
The thresholds we've seen on our firewall boxes at some instances reached 80% to 85%, but even at that level of utilization, we don't observe any latency or any issues reported with respect to accessing the application.
Cortex XDR is stable, offering high quality and reliable performance.
On cloud, you don't see any disconnections or instability.
I think QRadar is stable and currently satisfies my needs.
The product has been stable so far.
Stability has been excellent.
Improving reporting and dashboard customization, along with the addition of real-time and exportable reports, would help SOC teams greatly.
The inclusion of this feature would allow the application of DLP policies alongside antivirus policies via a single agent and console, making it more competitive as other OEMs often offer DLP solutions as part of their antivirus products.
If the per GB data could be provided at a certain level free of cost or at the same cost which the customer is taking for the entire bundle, that would be better.
We receive logs from different types of devices and need a way to correlate them effectively.
If AI-related support can suggest rules and integrate with existing security devices like MD, IPS, this SIM can create more relevant rules.
IBM Security QRadar does not support Canvas, so we had to create custom scripts and workarounds to pull logs from Canvas.
Having some sort of certification or training, along with more periodic webinars might be helpful.
The pricing on SentinelOne is far more reasonable and cheaper than Cortex XDR by Palo Alto Networks.
I would say it is definitely not a cheap product, considering how mature it is and how scalable all Palo Alto products are together.
Cortex XDR is perceived as expensive by some customers, yet offers dynamic pricing.
Splunk is more expensive than IBM Security QRadar.
It was costly mainly because of the value you can get right now compared to other solutions.
It depends on how much you want to spend.
In our environment, it costs approximately 1200 a month.
It incorporates AI for normal behavior detection, distinguishing unusual operations.
The product provides automation responses in case of a threat attack, severity assessments, centralized manageability, and comprehensive compliance features, resulting in reduced costs.
It includes machine learning to easily analyze data and detect complex threats across endpoints, networks, or clouds.
Recently, I faced an incident, a cyber incident, and it was detected in real time.
IBM Security QRadar gives the opportunity to improve the time to market of the releases with a great evaluation of cybersecurity breaches.
Compared to ArcSight, Splunk, or any other SIEM tools where you need their processing language such as structured query language, SPL, and in Sentinel there is KQL query languages, IBM Security QRadar doesn't require reliance on query languages.
It provides peace of mind knowing that any device on our network, whether it is our own, BYOD device, or an unauthorized device, is being tracked and analyzed at multiple levels.
| Product | Mindshare (%) |
|---|---|
| Cortex XDR by Palo Alto Networks | 4.7% |
| IBM Security QRadar | 3.2% |
| Lumu | 1.3% |
| Other | 90.8% |


| Company Size | Count |
|---|---|
| Small Business | 45 |
| Midsize Enterprise | 21 |
| Large Enterprise | 48 |
| Company Size | Count |
|---|---|
| Small Business | 91 |
| Midsize Enterprise | 39 |
| Large Enterprise | 105 |
| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 1 |
| Large Enterprise | 4 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
IBM Security QRadar offers real-time threat detection, data correlation, and integration with third-party solutions, providing a user-friendly interface, scalability, and extensive reporting capabilities for SIEM needs.
IBM Security QRadar is designed for comprehensive security monitoring in diverse environments, aiding sectors like telecom and finance with advanced threat detection and breach management. It aggregates data and analyzes user behavior, while its customizable and out-of-the-box rules deliver robust security insights and vulnerability management. The platform seeks enhancements in integration, performance, and user interface, with a focus on AI and cloud service compatibility.
What are the most important features of IBM Security QRadar?Telecom, finance, and cloud-based industries implement IBM Security QRadar for threat detection, compliance, and security monitoring. It is deployed for log collection and correlation, user behavior analytics, and ensuring secure data transfer and incident management, focusing on compliance and anomaly detection.
Lumu detects and validates network compromises by analyzing metadata like DNS, NetFlow, and proxy logs. It provides real-time indicators and context to enhance detection, improve threat visibility, and reduce investigation time.
Lumu offers organizations a streamlined solution to identify network compromises through comprehensive metadata analysis, including DNS, NetFlow, and proxy logs. By providing real-time compromise indicators alongside contextual information, Lumu elevates threat visibility and shortens investigation durations. Its simple interface and integration flexibility with platforms, alongside automated incident responses, highlight its value. While users appreciate limited false positives, ease of use, and the context provided, enhancements in SIEM and XDR integration, asset context enrichment, and reporting are areas users would like to see further developed.
What features define Lumu?Organizations use Lumu to monitor outbound traffic, detect compromised endpoints, log firewall activities, and enable active threat blocking. Its integration ease via API supports threat detection across LAN and Wi-Fi, monitoring email traffic, and acting as a managed SOC for security event coordination. Companies appreciate Lumu's adaptability in hybrid environments and its ability to efficiently locate and analyze threats within network metadata, ensuring quick deployment and extendibility across external platforms.
We monitor all Extended Detection and Response (XDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.