IBM Security QRadar and Trellix Endpoint Security Platform are both prominent in the security tools market, focusing on threat intelligence and endpoint protection respectively. IBM Security QRadar appears to have the upper hand in large-scale implementations requiring deep insights, while Trellix impresses with its efficient central management and integration capabilities.
Features: IBM Security QRadar provides seamless log extraction from raw events, scalability through simple appliance linking, and extensive built-in rules for compliance monitoring. Its integration with IBM’s ecosystem and enhanced dashboard capabilities makes it a strong option for complex security environments needing deep threat insights. Trellix Endpoint Security Platform excels in central management, facilitating easy deployment, and integrating a variety of security measures such as encryption and intrusion prevention. It utilizes a user-specific dashboard for personalized reporting.
Room for Improvement: IBM Security QRadar could improve its incident management by enhancing control over alert closures and incorporating sophisticated anomaly detection analytics. More comprehensive integration with diverse security tools and consistent interface improvement are necessary. Trellix could enhance integration among its own modules and simplify configurations, particularly for data loss prevention and orchestration features. Additionally, improving interface usability and reducing system resource consumption could enhance experience.
Ease of Deployment and Customer Service: IBM Security QRadar supports deployment across on-premises and cloud environments, offering strong support, but response times may vary based on the issue. Trellix Endpoint Security Platform supports hybrid deployments and is user-friendly, especially for smaller enterprises due to its flexible deployment approach. Both platforms offer responsive technical support, though response quality can sometimes fluctuate.
Pricing and ROI: IBM Security QRadar is considered a pricier solution, with costs dependent on negotiation. Licensing is based on events per second, including additional fees for hardware and applications. Despite high initial costs, users report good ROI owing to comprehensive security insights. Trellix Endpoint Security Platform offers competitive pricing, with device-based licensing and extra charges for managed services. Users find it a good value balance, though costs can rise for larger deployments.
With SOAR, the workflow takes one minute or less to complete the analysis.
Investing this amount was very much worth it for my organization.
We have observed tremendous return on investment after implementing Trellix Endpoint Security as it is a more cost-effective solution compared to other products.
Clients appreciate the solution’s customization capabilities and ongoing product improvements.
There are two parts: one is the encryption which is standard and no AI is needed, but the data protection part could benefit from AI to detect new types of data and protect it.
They assist with advanced issues, such as hardware or other problems, that are not part of standard operations.
Support needs to understand the issue first, then escalate it to the engineering team.
The support is really good; for instance, if a critical ticket is submitted, you will get paged right away as it gets logged, and their analyst will look into it, letting you know as soon as possible so you can work on it.
The response time is a notable issue.
I would rate their customer service nine out of ten.
When we implemented Trellix Endpoint Security in their network, multiple malwares were detected.
For EPS license, if you increase or exceed the EPS license, you cannot receive events.
I would rate the scalability of the solution as a six out of ten, indicating some challenges due to downtime requirements.
Trellix Endpoint Security is scalable.
I think QRadar is stable and currently satisfies my needs.
The product has been stable so far.
I would rate its stability as nine out of ten.
I would rate the stability of Trellix Endpoint Security as near perfect, close to ten out of ten.
I think it's stable enough; earlier it had glitches, but now it's stable enough.
We receive logs from different types of devices and need a way to correlate them effectively.
If AI-related support can suggest rules and integrate with existing security devices like MD, IPS, this SIM can create more relevant rules.
IBM Security QRadar does not support Canvas, so we had to create custom scripts and workarounds to pull logs from Canvas.
What needs improvement in Trellix Endpoint Security is the reduction of resource consumption by the scanning feature.
Improvements are needed in forensic analytics to detect specific vulnerabilities.
The product does not seem to be cloud-native.
Splunk is more expensive than IBM Security QRadar.
It was costly mainly because of the value you can get right now compared to other solutions.
The license costs are very reasonable, around 1,000 to 1,200 rupees per year.
Trellix Endpoint Security is cost-effective and provides excellent value for money.
Recently, I faced an incident, a cyber incident, and it was detected in real time.
IBM is seeking information about IBM QRadar because a part of QRadar, especially in the cloud, has been sold to Palo Alto.
We have FortiSOAR and IBM Resilient for IBM Security QRadar orchestration.
Trellix Endpoint Security is a proven, robust, and cost-effective solution that protects the organization from different types of ransomware and attacks.
Including options like Application Control (formerly Solidcore), integrated monitoring, change control, DLP, and advanced threat protection, the solution offers comprehensive security.
The detection capability of Trellix Endpoint Security is higher than traditional antivirus solutions.
Product | Market Share (%) |
---|---|
Trellix Endpoint Security Platform | 4.2% |
IBM Security QRadar | 1.4% |
Other | 94.4% |
Company Size | Count |
---|---|
Small Business | 89 |
Midsize Enterprise | 36 |
Large Enterprise | 102 |
Company Size | Count |
---|---|
Small Business | 67 |
Midsize Enterprise | 36 |
Large Enterprise | 59 |
IBM Security QRadar (recently acquired by Palo Alto Networks) is a security and analytics platform designed to defend against threats and scale security operations. This is done through integrated visibility, investigation, detection, and response. QRadar empowers security groups with actionable insights into high-priority threats by providing visibility into enterprise security data. Through centralized visibility, security teams and analysts can determine their security stance, which areas pose a potential threat, and which areas are critical. This will help streamline workflows by eliminating the need to pivot between tools.
IBM Security QRadar is built to address a wide range of security issues and can be easily scaled with minimal customization effort required. As data is ingested, QRadar administers automated, real-time security intelligence to swiftly and precisely discover and prioritize threats. The platform will issue alerts with actionable, rich context into developing threats. Security teams and analysts can then rapidly respond to minimize the attackers' strike. The solution will provide a complete view of activity in both cloud-based and on-premise environments as a large amount of data is ingested throughout the enterprise. Additionally, QRadar’s anomaly detection intelligence enables security teams to identify any user behavior changes that could be indicators of potential threats.
IBM QRadar Log Manager
To better help organizations protect themselves against potential security threats, attacks, and breaches, IBM QRadar Log Manager gathers, analyzes, preserves, and reports on security log events using QRadar Sense Analytics. All operating systems and applications, servers, devices, and applications are converted into searchable and actionable intelligent data. QRadar Log Manager then helps organizations meet compliance reporting and monitoring requirements, which can be further upgraded to QRadar SIEM for a more superior level of threat protection.
Some of QRadar Log Manager’s key features include:
Reviews from Real Users
IBM Security QRadar is a solution of choice among users because it provides a complete solution for security teams by integrating network analysis, log management, user behavior analytics, threat intelligence, and AI-powered investigations into a single solution. Users particularly like having a single window into their network and its ability to be used for larger enterprises.
Simon T., a cyber security services operations manager at an aerospace/defense firm, notes, "The most valuable thing about QRadar is that you have a single window into your network, SIEM, network flows, and risk management of your assets. If you use Splunk, for instance, then you still need a full packet capture solution, whereas the full packet capture solution is integrated within QRadar. Its application ecosystem makes it very powerful in terms of doing analysis."
A management executive at a security firm says, "What we like about QRadar and the models that IBM has, is it can go from a small-to-medium enterprise to a larger organization, and it gives you the same value."
Trellix Endpoint Security Platform offers essential features like centralized management, threat prevention, and encryption, facilitating seamless scaling and integration with other systems while prioritizing user security.
This comprehensive platform focuses on endpoint protection, antivirus capabilities, and malware defense. It enhances cybersecurity with data loss prevention, advanced threat detection, and AI-driven features for reliable protection without impacting performance. Central management and advanced reporting streamline integration and ease of use. Flexible policy deployment through the management console and its robust security measures, such as DLP and device control, further increase protection. Challenges include high CPU and memory usage affecting performance, a complex interface, and lengthy deployment. Third-party integration and Windows Hello support need improvement. Additional concerns involve improved threat detection and faster technical support responses.
What are the key features of Trellix Endpoint Security Platform?Trellix Endpoint Security Platform is widely implemented in industries such as banking and government for securing mobile and desktop devices. Its capabilities cover network security, device control, and remote access protection, catering to diverse environments by offering robust cybersecurity management against advanced threats.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.