

IBM Security QRadar and One Identity Safeguard compete in the broader security software market. IBM Security QRadar seems to have the upper hand in security intelligence and log management, while One Identity Safeguard excels in privileged access management due to its session recording and password management features.
Features: IBM Security QRadar offers comprehensive capabilities such as log management, SIEM, application monitoring, and vulnerability scanning. It is renowned for its scalability, ease of use, and robust rule sets. One Identity Safeguard is distinguished by its privileged access management features, offering robust session recording, password management, and support for multi-factor authentication, with flexibility to integrate into various infrastructures.
Room for Improvement: IBM Security QRadar could improve integration with non-IBM security tools, simplify its user interface, and enhance its dashboards. The complexity of initial configurations also needs to be addressed. One Identity Safeguard faces challenges in documenting complex configuration processes and integrating with third-party tools. Enhancements to the GUI intuitiveness and management of SSL/TLS connections would benefit its users.
Ease of Deployment and Customer Service: IBM Security QRadar supports both on-premises and hybrid cloud environments, praised for its efficient support despite some feedback on delays in navigating the technical support process. One Identity Safeguard supports on-premises and private cloud deployment, praised for ease of integration, though service response times and support complexity receive critiques.
Pricing and ROI: IBM Security QRadar is known for its relatively high costs influenced by EPS and storage needs, yet it provides a strong ROI for log management and security intelligence. One Identity Safeguard, also considered expensive, particularly at the enterprise level, offers straightforward licensing and pricing models. Despite higher upfront costs compared to competitors, such as CyberArk, it is recognized for favorable ROI in privilege management.
With SOAR, the workflow takes one minute or less to complete the analysis.
AWS gives the chance to implement a solution out of the box with use cases that are already in IBM Security QRadar.
Investing this amount was very much worth it for my organization.
It has also reduced the time spent on password management, saving our team time in managing privileged accounts, and is helping with automation that reduces manual efforts.
Instead of manually reconstructing activity, everything is already logged and searchable, which has improved response time during internal reviews.
It has reduced inside and external threats, which is essential for preventing privileged user damage, and decreased privileged account incidents by 40%.
They assist with advanced issues, such as hardware or other problems, that are not part of standard operations.
Support needs to understand the issue first, then escalate it to the engineering team.
The support is really good; for instance, if a critical ticket is submitted, you will get paged right away as it gets logged, and their analyst will look into it, letting you know as soon as possible so you can work on it.
Documentation and knowledge base resources are also useful for resolving common issues and understanding product features, making customer support reliable and meeting enterprise expectations.
The customer team is knowledgeable and technically strong, especially when dealing with configuration issues, session monitoring, or password-related queries.
I sometimes need escalations to reach expertise.
For EPS license, if you increase or exceed the EPS license, you cannot receive events.
The scalability of One Identity Safeguard is perfect, scoring ten out of ten.
The system can distribute tasks across nodes, improving performance as demand grows.
The platform is designed to support horizontal scaling, so adding capacity is relatively straightforward without redesigning the entire architecture.
On cloud, you don't see any disconnections or instability.
I think QRadar is stable and currently satisfies my needs.
The product has been stable so far.
With proper sizing and high availability configuration, the system handles multiple concurrent sessions efficiently, making it a dependable and stable platform suitable for enterprise environments.
It appears designed as a dependable enterprise-grade solution, reflecting well in its production performance.
I would rate it a nine out of ten for stability.
We receive logs from different types of devices and need a way to correlate them effectively.
If AI-related support can suggest rules and integrate with existing security devices like MD, IPS, this SIM can create more relevant rules.
IBM Security QRadar does not support Canvas, so we had to create custom scripts and workarounds to pull logs from Canvas.
For some configurations on the SPS side, if I need to make changes, such as for DNS servers, I must redeploy the machine.
There are many steps. We are still in the onboarding phase, and it seems very manual.
Another area for improvement could be the threat detection capabilities, like those seen in other PAM vendors.
Splunk is more expensive than IBM Security QRadar.
It was costly mainly because of the value you can get right now compared to other solutions.
It depends on how much you want to spend.
It is one of those where the more you buy, the cheaper it is.
It is cheaper than CyberArk.
Regarding pricing, it may appear slightly on the higher side initially compared to some alternatives, but when we evaluate it against the security benefits, compliance support, and risk reduction, it proves to be cost-effective in the long run.
Recently, I faced an incident, a cyber incident, and it was detected in real time.
IBM Security QRadar gives the opportunity to improve the time to market of the releases with a great evaluation of cybersecurity breaches.
Compared to ArcSight, Splunk, or any other SIEM tools where you need their processing language such as structured query language, SPL, and in Sentinel there is KQL query languages, IBM Security QRadar doesn't require reliance on query languages.
The auditing and approval mechanisms are features we did not have before and are greatly appreciated.
Automatic credential rotation helps our team by removing the need for manual changes to privileged passwords, reducing the risk of stale or shared credentials and ensuring that every access is controlled and compliant.
The password vault has been a game changer because it provides a secure and controlled way to store, manage, and rotate sensitive credentials without exposing them to users.
| Product | Mindshare (%) |
|---|---|
| IBM Security QRadar | 7.0% |
| One Identity Safeguard | 2.2% |
| Other | 90.8% |


| Company Size | Count |
|---|---|
| Small Business | 92 |
| Midsize Enterprise | 39 |
| Large Enterprise | 106 |
| Company Size | Count |
|---|---|
| Small Business | 64 |
| Midsize Enterprise | 25 |
| Large Enterprise | 31 |
IBM Security QRadar offers real-time threat detection, data correlation, and integration with third-party solutions, providing a user-friendly interface, scalability, and extensive reporting capabilities for SIEM needs.
IBM Security QRadar is designed for comprehensive security monitoring in diverse environments, aiding sectors like telecom and finance with advanced threat detection and breach management. It aggregates data and analyzes user behavior, while its customizable and out-of-the-box rules deliver robust security insights and vulnerability management. The platform seeks enhancements in integration, performance, and user interface, with a focus on AI and cloud service compatibility.
What are the most important features of IBM Security QRadar?Telecom, finance, and cloud-based industries implement IBM Security QRadar for threat detection, compliance, and security monitoring. It is deployed for log collection and correlation, user behavior analytics, and ensuring secure data transfer and incident management, focusing on compliance and anomaly detection.
One Identity Safeguard manages and monitors privileged access, enhancing security with features like automatic session recording, real-time monitoring, and credential rotation. It integrates seamlessly, supports compliance with audit trails, and improves operational efficiency across organizations. This robust platform significantly bolsters security protocols while controlling sensitive operations.
We monitor all User Entity Behavior Analytics (UEBA) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.