IBM Security QRadar


Welcome to the IBM Security QRadar online user group! As a participant, connect with QRadar subject matter experts and get answers to your biggest concerns on detecting and stopping advanced threats, insider threats, compliance and your cloud strategy. Also, share ideas, benchmarks, best practices and lessons learned with other QRadar users.

Stay up-to-date on what’s new with QRadar, including upcoming local user group meetings, demo webinars and feature releases. You can also expand your QRadar knowledge and technical expertise with our community blogs, forums, demos, videos and other learning materials.

We encourage you to take full advantage of the resources available in this QRadar user community. Please contact with any questions.

Latest Posts

  • Hello, I saw in qradar, this event name "Accepted password for user". The log source witch generated this event is a linux server. I would like to understand that means this event. Thank you for you in davance for your answer Regards, ------------------------------ ...

  • anyone got the https receiver working? ------------------------------ Stefan Haunß ------------------------------

  • Hi cool mind, how did you reset the allocation for both to 0 ? ------------------------------ Günter Weber ------------------------------

Latest Articles

  • Authors: Lolita Chandra and Sophia Sampath Earlier this year there was a massive transition to a largely remote workforce across the globe and over a very short span of time. According to Gallup , “From mid-March to mid-May 2020, the percentage ...

  • The IBM team is excited to announce that we have been recognized as a Customers’ Choice in the July 2020 Gartner Peer Insights ‘Voice of the Customer’: SIEM. Our team at IBM Security takes great pride in this distinction, as customer feedback continues ...

    2 people recommend this.
  • Keeping up-to-date on QRadar log source management can be a daunting task, and our new educational material is here to refine your skills and extend your capabilities. The IBM Security Learning Academy has recently published several new QRadar log ...

    1 person recommends this.
  • Hi Everyone Let me start and ask these simple questions: - Do you need to show off your QRadar investment to your CISO? - Do you need a tool to help investigate threats in your environment? - Do you need your SOC (Security Operations Centre) big screens ...

    1 person recommends this.
  • Business Email Compromise (BEC) is a growth industry. The level of expertise required launch a cyber-attack via email is minimal, and the financial incentive to succeed is significant. In April of 2020, a threat group stole nearly £600k with a ...

    2 people recommend this.

Latest Files