IBM QRadar SIEM vs Elasticsearch Comparison

Overview

IBM QRadar SIEM is a security information & event management software for security teams to accurately detect and prioritize...

Elasticsearch is a RESTful search & analytics solution designed to helps users search and analyze trends in structured and...

  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials
  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials

Screenshots

Pricing

Starting from
/
No info available
/
  • Free trial available
  • No credit card required
  • Free account
  • Subscription based
Starting from
$16.00/mo.month
  • Free trial available
  • No credit card required
  • Free account
  • Subscription based

User reviews

4.5

(11)

5

4

3

2

1

6

4

1

0

0

  • Value for money
  • Ease of use
  • Features
  • Customer support
91%
would recommend this app

4.6

(91)

5

4

3

2

1

54

35

2

0

0

  • Value for money
  • Ease of use
  • Features
  • Customer support
99%
would recommend this app

Pros

Support for collecting Logs from different devices is amazing. Storage capacity is excellent, logs can be easily stored for years.
IBM QRadar is very good solution to assure integrity of logs.
It was a good experience. Implementation was easy.

Pros

Thanks to this search engine, we can reach the desired analysis results in the data. It is a blessing for our sector employees to have a free application running in this performance.
Flexibility and high performance are the most loved features for us. The fact that we are not using it very effectively is also a ramen of suggestions and guidance.
Our products got better, we make good money and save our time.

Cons

You can add all your log sources, monitor logs, offenses. Also you can prevent and detect attacks and investigate incidents.
Very slow product built on older technology. Collecting logs from Windows is very painful and archaic.
This is not the case where you can point-and-click a few things and have a system that alerts you properly when attacks are taking place.

Cons

ELK sovles this problem efficiently. During troubleshooting, it is biggest pain to open servers.
I still haven't figure the implementation of replication and clusterization of Elasticsearch, but maybe it is a lack of information.
A server crash could result in a total. Loss of data, so it can’t be used to store important data.
  • Vendor responds to reviews
  • Last review21 days ago
  • Vendor responds to reviews
  • Last reviewa month ago

Key features

  • Total features19
  • API
  • Access Control
  • Activity Dashboard
  • Alerts / Escalation
  • Analytics
  • Auditing
  • Authentication
  • Behavior Tracking
  • Compliance Management
  • Consolidation / Roll-Up
  • Content Management
  • Customizable Reporting
  • Data Filtering
  • Data Import/Export
  • Data Visualization
  • Document Storage
  • Event Logs
  • Event Management
  • File Management
  • Filtered Views
  • Forecasting
  • Frequency-based Tasks
  • Full Text Search
  • Geographic Maps
  • Incident Management
  • Indexing
  • Lifecycle Management
  • Monitoring
  • Natural Language Search
  • Pipeline Management
  • Planning Tools
  • Predictive Analytics
  • Prioritizing
  • Real Time Analytics
  • Real Time Data
  • Real Time Notifications
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Role Management
  • Role-Based Permissions
  • Search Functionality
  • Security Auditing
  • Single Sign On
  • Third Party Integration
  • Two-Factor Authentication
  • Usage Tracking
  • User Management
  • Visual Analytics
  • Vulnerability Scanning
  • Web Analytics
  • Total features35
  • API
  • Access Control
  • Activity Dashboard
  • Alerts / Escalation
  • Analytics
  • Auditing
  • Authentication
  • Behavior Tracking
  • Compliance Management
  • Consolidation / Roll-Up
  • Content Management
  • Customizable Reporting
  • Data Filtering
  • Data Import/Export
  • Data Visualization
  • Document Storage
  • Event Logs
  • Event Management
  • File Management
  • Filtered Views
  • Forecasting
  • Frequency-based Tasks
  • Full Text Search
  • Geographic Maps
  • Incident Management
  • Indexing
  • Lifecycle Management
  • Monitoring
  • Natural Language Search
  • Pipeline Management
  • Planning Tools
  • Predictive Analytics
  • Prioritizing
  • Real Time Analytics
  • Real Time Data
  • Real Time Notifications
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Role Management
  • Role-Based Permissions
  • Search Functionality
  • Security Auditing
  • Single Sign On
  • Third Party Integration
  • Two-Factor Authentication
  • Usage Tracking
  • User Management
  • Visual Analytics
  • Vulnerability Scanning
  • Web Analytics

Integrations

  • Total integrations6
  • Amazon EC2
  • Axonius
  • Box
  • Dropbox Business
  • G Suite
  • GitHub
  • Google Drive
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft OneDrive
  • Microsoft Outlook
  • Okta
  • Salesforce Sales Cloud
  • ServiceNow
  • SharePoint
  • Slack
  • Splunk Cloud
  • Splunk Enterprise
  • Zendesk
  • Total integrations9
  • Amazon EC2
  • Axonius
  • Box
  • Dropbox Business
  • G Suite
  • GitHub
  • Google Drive
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft OneDrive
  • Microsoft Outlook
  • Okta
  • Salesforce Sales Cloud
  • ServiceNow
  • SharePoint
  • Slack
  • Splunk Cloud
  • Splunk Enterprise
  • Zendesk

Security

  • Encryption of sensitive data at rest
  • HTTPS for all pages (web-based apps)
  • Reports/alerts for security breaches
  • Multifactor authentication options
  • Customer data removed upon service cancellation
  • Encryption of sensitive data at rest
  • HTTPS for all pages (web-based apps)
  • Reports/alerts for security breaches
  • Multifactor authentication options
  • Customer data removed upon service cancellation

IBM QRadar SIEM vs. Elasticsearch

See how IBM QRadar SIEM and Elasticsearch stack up against each other by comparing features, pricing, ratings and reviews, integrations, screenshots and security. Compare real user opinions on the pros and cons to make more informed decisions.