Best Software for 2025 is now live!
By IBM
Save to My Lists
Claimed
Claimed

Top Rated IBM Security QRadar NDR Alternatives

IBM Security QRadar NDR Reviews & Product Details

IBM Security QRadar NDR Overview

IBM Security QRadar NDR Details
Show LessShow More

Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
711,096 Twitter followers
LinkedIn® Page
www.linkedin.com
317,108 employees on LinkedIn®
Ownership
SWX:IBM
Phone
1-866-277-7488
Total Revenue (USD mm)
$73,621
Description

IBM offers a wide range of technology and consulting services; a broad portfolio of middleware for collaboration, predictive analytics, software development and systems management; and the world's most advanced servers and supercomputers.


SC
Overview Provided by:
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

IBM Security QRadar NDR Media

Answer a few questions to help the IBM Security QRadar NDR community
Have you used IBM Security QRadar NDR before?
Yes
G2 reviews are authentic and verified.

There are not enough reviews of IBM Security QRadar NDR for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Dynatrace Logo
Dynatrace
4.5
(1,323)
Dynatrace has redefined how you monitor today’s digital ecosystems. AI-powered, full stack and completely automated, it’s the only solution that provides answers, not just data, based on deep insight into every user, every transaction, across every application. The world’s leading brands trust Dynatrace to optimize customer experiences, innovate faster and modernize IT operations with absolute confidence.
2
Datadog Logo
Datadog
4.3
(541)
Datadog is a monitoring service for IT, Dev and Ops teams who write and run applications at scale, and want to turn the massive amounts of data produced by their apps, tools and services into actionable insight.
3
KnowBe4 PhishER/PhishER Plus Logo
KnowBe4 PhishER/PhishER Plus
4.6
(483)
KnowBe4 PhishER is the key ingredient of an essential security workstream. It's your lightweight Security Orchestration, Automation and Response (SOAR) platform to orchestrate your threat response and manage the high volume of potentially malicious email messages reported by your users. And, with automatic prioritization of emails, PhishER helps your InfoSec and Security Operations team cut through the inbox noise and respond to the most dangerous threats more quickly.
4
Palo Alto Cortex XSIAM Logo
Palo Alto Cortex XSIAM
4.3
(474)
5
Sumo Logic Logo
Sumo Logic
4.3
(323)
Sumo Logic enables enterprises to build analytical power that transforms daily operations into intelligent business decisions
6
Tines Logo
Tines
4.8
(240)
Tines allows security teams automate any workflow regardless of complexity. It works by receiving or fetching alerts from external systems. Tines can perform an unlimited number of steps including log and threat intelligence searches to reliably determine if the alert warrants action.
7
Cynet - All-in-One Cybersecurity Platform Logo
Cynet - All-in-One Cybersecurity Platform
4.7
(208)
AutoXDR™ converges multiple technologies (EPP, EDR, UBA, Deception, Network Analytics and vulnerability management), with a 24/7 cyber SWAT team, to provide unparalleled visibility and defend all domains of your internal network: endpoints, network, files and users, from all types of attacks.
8
Intezer Logo
Intezer
4.5
(192)
Automate your malware analysis. Get answers quickly about any suspicious file, URL, endpoint or memory dump.
9
Resolver Logo
Resolver
4.3
(160)
All implementations include training and advice on the most effective way to manage your processes within the application.
10
LogRhythm SIEM Logo
LogRhythm SIEM
4.1
(143)
LogRhythm empowers organizations on six continents to successfully reduce risk by rapidly detecting, responding to, and neutralizing damaging cyberthreats
Show More