


IBM Security QRadar and WithSecure Elements Endpoint Detection and Response (EDR) are prominent players in the cybersecurity sector. While IBM Security QRadar stands out for its comprehensive security intelligence capabilities, WithSecure Elements EDR provides specialized endpoint security, making it more cost-effective for organizations focusing solely on endpoint protection.
Features: IBM Security QRadar is celebrated for its scalability, ease of extracting information from raw logs, and compliance monitoring, supported by an array of inbuilt rules and automatic log source identification. WithSecure Elements EDR offers robust endpoint protection with integration capabilities and a user-friendly dashboard for quick problem identification.
Room for Improvement: IBM Security QRadar could enhance its graphing tools for anomaly detection and improve Java dependency issues for deployment. WithSecure Elements EDR could benefit from optimizing RAM usage, enhancing pricing structures, and reducing false positives to boost practicality.
Ease of Deployment and Customer Service: IBM Security QRadar supports multiple deployment environments, including on-premises and cloud options, with generally excellent technical support. WithSecure offers deployment mainly across hybrid, public cloud, and on-premises environments, focusing on endpoint solutions, supported by good customer service.
Pricing and ROI: IBM Security QRadar is considered expensive, with complex licensing tied to EPS and flows, but it delivers strong ROI with its extensive features. It suits enterprises with larger budgets. WithSecure Elements EDR offers competitive pricing and a more economical choice for smaller organizations focused on endpoint protection, providing substantial ROI based on organizational needs.
They appreciate the rich telemetry data from the solution, as it provides in-depth threat identification.
Cortex XDR by Palo Alto Networks helps to reduce my total cost of ownership significantly.
In Cortex XDR by Palo Alto Networks, most of the remediation is automated and the accuracy is quite good.
With SOAR, the workflow takes one minute or less to complete the analysis.
AWS gives the chance to implement a solution out of the box with use cases that are already in IBM Security QRadar.
Investing this amount was very much worth it for my organization.
The technical support from Palo Alto deserves a mark of ten because they reach out within an hour whenever assistance is needed.
There is no back and forth, and they know what we are asking for and come up with the best resolution for a solution.
If any of these services are missed, it becomes a problem in terms of support tickets, follow-up, or special configuration that needs to be done in the system.
They assist with advanced issues, such as hardware or other problems, that are not part of standard operations.
Support needs to understand the issue first, then escalate it to the engineering team.
The support is really good; for instance, if a critical ticket is submitted, you will get paged right away as it gets logged, and their analyst will look into it, letting you know as soon as possible so you can work on it.
You can onboard 10,000 endpoints in just hours, which demonstrates the excellent scalability of this product.
Activating the newly purchased licenses is instantaneous, allowing installations without adjustments since it's cloud-based.
Cortex XDR by Palo Alto Networks can be expanded anytime by purchasing another license without any issues related to scalability.
For EPS license, if you increase or exceed the EPS license, you cannot receive events.
Cortex remains fast and responsive, even with increasing data and alerts.
The thresholds we've seen on our firewall boxes at some instances reached 80% to 85%, but even at that level of utilization, we don't observe any latency or any issues reported with respect to accessing the application.
Cortex XDR is stable, offering high quality and reliable performance.
On cloud, you don't see any disconnections or instability.
I think QRadar is stable and currently satisfies my needs.
The product has been stable so far.
The system is stable with WithSecure Elements Endpoint Detection and Response.
Improving reporting and dashboard customization, along with the addition of real-time and exportable reports, would help SOC teams greatly.
The inclusion of this feature would allow the application of DLP policies alongside antivirus policies via a single agent and console, making it more competitive as other OEMs often offer DLP solutions as part of their antivirus products.
If the per GB data could be provided at a certain level free of cost or at the same cost which the customer is taking for the entire bundle, that would be better.
We receive logs from different types of devices and need a way to correlate them effectively.
If AI-related support can suggest rules and integrate with existing security devices like MD, IPS, this SIM can create more relevant rules.
IBM Security QRadar does not support Canvas, so we had to create custom scripts and workarounds to pull logs from Canvas.
The pricing on SentinelOne is far more reasonable and cheaper than Cortex XDR by Palo Alto Networks.
I would say it is definitely not a cheap product, considering how mature it is and how scalable all Palo Alto products are together.
Cortex XDR is perceived as expensive by some customers, yet offers dynamic pricing.
Splunk is more expensive than IBM Security QRadar.
It was costly mainly because of the value you can get right now compared to other solutions.
It depends on how much you want to spend.
It incorporates AI for normal behavior detection, distinguishing unusual operations.
The product provides automation responses in case of a threat attack, severity assessments, centralized manageability, and comprehensive compliance features, resulting in reduced costs.
It includes machine learning to easily analyze data and detect complex threats across endpoints, networks, or clouds.
Recently, I faced an incident, a cyber incident, and it was detected in real time.
IBM Security QRadar gives the opportunity to improve the time to market of the releases with a great evaluation of cybersecurity breaches.
Compared to ArcSight, Splunk, or any other SIEM tools where you need their processing language such as structured query language, SPL, and in Sentinel there is KQL query languages, IBM Security QRadar doesn't require reliance on query languages.
| Product | Mindshare (%) |
|---|---|
| Cortex XDR by Palo Alto Networks | 3.4% |
| IBM Security QRadar | 1.9% |
| WithSecure Elements Endpoint Detection and Response | 0.9% |
| Other | 93.8% |



| Company Size | Count |
|---|---|
| Small Business | 45 |
| Midsize Enterprise | 21 |
| Large Enterprise | 48 |
| Company Size | Count |
|---|---|
| Small Business | 91 |
| Midsize Enterprise | 39 |
| Large Enterprise | 105 |
| Company Size | Count |
|---|---|
| Small Business | 6 |
| Large Enterprise | 1 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
IBM Security QRadar offers real-time threat detection, data correlation, and integration with third-party solutions, providing a user-friendly interface, scalability, and extensive reporting capabilities for SIEM needs.
IBM Security QRadar is designed for comprehensive security monitoring in diverse environments, aiding sectors like telecom and finance with advanced threat detection and breach management. It aggregates data and analyzes user behavior, while its customizable and out-of-the-box rules deliver robust security insights and vulnerability management. The platform seeks enhancements in integration, performance, and user interface, with a focus on AI and cloud service compatibility.
What are the most important features of IBM Security QRadar?Telecom, finance, and cloud-based industries implement IBM Security QRadar for threat detection, compliance, and security monitoring. It is deployed for log collection and correlation, user behavior analytics, and ensuring secure data transfer and incident management, focusing on compliance and anomaly detection.
WithSecure Elements Endpoint Detection and Response offers robust endpoint protection featuring automated flaw detection and a comprehensive dashboard, ensuring ease of use with its stable performance and seamless setup.
Designed for safeguarding infrastructures, WithSecure Elements Endpoint Detection and Response provides efficient integration and functionality, leveraging encrypted drive storage to overcome access challenges. While requiring improvement in mobile solutions and reducing false positives, its managed scalability and continuous security updates are valuable. Yet, memory demands and manual reporting needs pose challenges requiring attention. Its usability spans specialized banking security, email scanning, and real-time threat prevention, serving various endpoints including Windows, Linux, and servers.
What are the key features of WithSecure Elements Endpoint Detection and Response?In banking, WithSecure Elements Endpoint Detection and Response employs tailored security measures, adding filters for sensitive page protection. It is applied to manage email security and detect abnormal activities, especially in environments with Windows and Linux systems, effectively preventing unauthorized installations and malware intrusions.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.