Try our new research platform with insights from 80,000+ expert users

IBM Security QRadar vs syslog-ng comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 25, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

IBM Security QRadar
Ranking in Log Management
7th
Average Rating
8.0
Reviews Sentiment
6.6
Number of Reviews
217
Ranking in other categories
Security Information and Event Management (SIEM) (3rd), User Entity Behavior Analytics (UEBA) (2nd), Endpoint Detection and Response (EDR) (16th), Security Orchestration Automation and Response (SOAR) (4th), Managed Detection and Response (MDR) (6th), Extended Detection and Response (XDR) (11th)
syslog-ng
Ranking in Log Management
16th
Average Rating
9.0
Reviews Sentiment
3.2
Number of Reviews
7
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2026, in the Log Management category, the mindshare of IBM Security QRadar is 4.0%, up from 3.9% compared to the previous year. The mindshare of syslog-ng is 1.8%, down from 2.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Log Management Mindshare Distribution
ProductMindshare (%)
IBM Security QRadar4.0%
syslog-ng1.8%
Other94.2%
Log Management
 

Featured Reviews

HarshBhardiya - PeerSpot reviewer
SOC Engineer at a outsourcing company with 10,001+ employees
Have managed daily asset and alert monitoring effectively but have encountered limitations with manual processes and interface usability
It's still very manual and doesn't work on its own. It's still in an early stage and not on par where we can consider it a really successful detection system. The accuracy is not there. The UI could be better when compared to Sentinels where we can use flags and tagging. It could be much more user-friendly. IBM Security QRadar has all features and is fully competitive with other SIEM tools, but when it comes to user-friendliness, a new user takes time to get used to it. More intuitive, user-friendly interfaces and more helpful documentation would be beneficial. The query searching and data fetching could be faster. In large to very large organizations with around 5,000 or 6,000 assets or beyond, even with proper configurations and RAM and hardware backing up, the query is fairly slow.
OC
IT Infrastructure & Cloud Security Manager at Thux
Has ensured compliance by centralizing log data and supporting secure connections
We currently do not use that feature. We currently have just an open-source release, not a premium release. My boss has indicated that he wants to buy a premium syslog-ng version next month. I think we can use other features of this tool in the future. In syslog-ng, I think a GUI would be beneficial. I am unsure if the premium module has a GUI to administer it.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It is a bit easier to use than other products, such as Splunk or ELK Elasticsearch."
"The most valuable feature is the DSM Editor. The custom parsing tool is very nice, outstanding."
"Senses, tracks, and links significant incidents and threats."
"The most valuable features would have to be the products' ability to customize vulnerability management settings."
"What I like about IBM QRadar User Behavior Analytics is that it uses machine learning algorithms to generate risk scoring for the user activity. I also like that it syncs with our Active Directory users, so it really has full coverage for all users in our environment."
"Vulnerability detection is the most valuable feature. It's the tool that finds the threats."
"The query search and log fetching are really helpful in IBM Security QRadar when compared to other tools."
"This solution provides me with various alarms, and I have found security issues with some of my other products."
"The ability to extract and store the logs is the most valuable feature of syslog-ng."
"For us, the most valuable feature is the use of compound search for searching logs at a specific time, by a specific user, or specific behavior."
"Syslog-ng provides easy access to all my logs. It helps me show managers and other clients precisely where an incident occurred. I also like it because you can integrate syslog-ng with multiple solutions to allow real-time monitoring."
"Syslog-ng has built-in features that we can use to create alerts for a SIEM solution. It isn't a true SIEM solution, but it's sufficient for the time being."
"What I appreciate most about syslog-ng is its configuration; its C-style config is much easier to understand, read, and write than other popular solutions such as syslog or rsyslog."
"We chose syslog-ng because it is easy to install, easy to maintain, easy to update, and due to the fact that all data arrive in raw format, we can manipulate it as we want."
"Syslog-ng has a separate config file in addition to the core configuration."
 

Cons

"The tech support is not that good."
"The solution should enhance its capabilities of UEBA and AI/ML tech modeling."
"There was some complexity in the initial setup due to bandwidth issues."
"The implementation and configuration are not easy."
"It's still very manual and doesn't work on its own. It's still in an early stage and not on par where we can consider it a really successful detection system."
"What needs to be improved in IBM QRadar User Behavior Analytics is the user experience. It's not optimal. Some screens are a bit clunky. The solution needs to be more user-friendly."
"There are several vulnerabilities that IBM is working with us on."
"We need more features in order to create rules to detect or to meet some requirements for other areas, for example, catching the event from other authentication tools."
"In syslog-ng, I think a GUI would be beneficial. I am unsure if the premium module has a GUI to administer it."
"There is room for improvement in terms of observability."
"There is always the potential for additional integration and protocol extensions."
"The filtering has room for improvement."
"Syslog-ng has built-in features that we can use to create alerts for a SIEM solution. It isn't a true SIEM solution, but it's sufficient for the time being."
"It's hard to find people who know how to use syslog-ng. I often find problems with configurations, and solutions aren't integrated correctly with syslog-ng. For example, there might be data with extra decimals, or the collector agents are incorrectly named. It isn't a problem with the solution; it's a lack of professionals."
 

Pricing and Cost Advice

"It's very expensive but it fits our budget."
"It is costlier as compared to the other alternatives available in the market."
"IBM has subscriptions plans that run for one year."
"Pricing and licensing are competitive. Their new licensing options allow logs to bypass the correlation engine for a flat rate, which is also appealing for log data that is compliance-driven for a small amount of money."
"It is a perpetual license that we have for the event collector. The licensing is done based on the number of events and flows that you receive on this particular device. These are perpetual licenses, which means once you purchase them, they don't expire, which means that the support to IBM is definitely renewed after every one year. We have an enterprise agreement with IBM, which puts the cost in a totally different category as compared to someone who is not an IBM partner and is approaching IBM for this solution. We were able to get massive discounts. To give you an idea, we recently purchased 30,000 event licenses, and it costs around $480,000. It is definitely not a cheap product. We have licenses for about 270,000 events per second and 3 million flows per second. All the appliances and their events and flows are basically clubbed together and charged or rather calculated through a single source. The console receives all the details from all the event processes that we have globally. So, the license that we have is a single license for 270,000 events per second and 3 million flows per second, but that can be managed centrally. I was only part of the secondary purchase, which was 30,000 events per second for about $480,000. You can calculate how much we paid for 270,000 events. Reducing its price would be a compromise. We have already used a lower-priced product in the form of NNT, but we had to get rid of it because it was not doing the job that we actually wanted to do. You get what you pay for."
"On a scale of one to ten, I rate the price a one, where one is an extremely expensive product, and ten is a cheap product."
"The price of this product is high."
"On a scale from one to ten, where one is cheap and ten is expensive, I rate IBM Security QRadar's pricing a five out of ten."
"Syslog-ng is a free open-source solution."
"Syslog-ng is open-source."
report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
884,873 professionals have used our research since 2012.
 

Comparison Review

VS
Manager, Enterprise Risk Consulting at a tech company with 1,001-5,000 employees
Jun 28, 2015
Qradar vs. ArcSight
Continuing with the SIEM posts we have done at Infosecnirvana, this post is a Head to head comparison of the two Industry leading SIEM products in the market – HP ArcSight and IBM QRadar Both the products have consistently been in the Gartner Leaders Quadrant. Both HP and IBM took over niche SIEM…
 

Top Industries

By visitors reading reviews
Computer Software Company
12%
Financial Services Firm
10%
Manufacturing Company
8%
Government
6%
Government
11%
Financial Services Firm
9%
Manufacturing Company
9%
Computer Software Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business91
Midsize Enterprise39
Large Enterprise105
By reviewers
Company SizeCount
Small Business3
Midsize Enterprise2
Large Enterprise3
 

Questions from the Community

What are the biggest differences between Securonix UEBA, Exabeam, and IBM QRadar?
It mostly depends on your use-cases and environment. Exabeam and Securonix have a stronger UEBA feature set, friendlier GUI and are not licensed based on capacity (amount of logs and information in...
What SOC product do you recommend?
For tools I’d recommend: -SIEM- LogRhythm -SOAR- Palo Alto XSOAR Doing commercial w/o both (or at least an XDR) is asking to miss details that are critical, and ending up a statistic. Also, rememb...
What is your experience regarding pricing and costs for IBM Security QRadar?
Pricing and the license of EPS were managed by the governance team. I was not responsible for managing those. I was supposed to put up the requirement of the license needed to integrate that amount...
What needs improvement with syslog-ng?
We currently do not use that feature. We currently have just an open-source release, not a premium release. My boss has indicated that he wants to buy a premium syslog-ng version next month. I thin...
What is your primary use case for syslog-ng?
In Italy, we have to be compliant with the Garante for privacy. We have to log every login, logout, or login failure made by a system administrator. We store all syslog data of the infrastructure. ...
What advice do you have for others considering syslog-ng?
When it comes to parsing, I can parse both structured and unstructured data, though our data are only structured. Currently, we collect all data we receive as raw data. Each file is stored for each...
 

Also Known As

IBM QRadar, QRadar SIEM, QRadar UBA, QRadar on Cloud, IBM QRadar Advisor with Watson
No data available
 

Overview

 

Sample Customers

Clients across multiple industries, such as energy, financial, retail, healthcare, government, communications, and education use QRadar.
Tecnocom, University of Victoria, University of Exeter, Datapath
Find out what your peers are saying about IBM Security QRadar vs. syslog-ng and other solutions. Updated: March 2026.
884,873 professionals have used our research since 2012.