IBM QRadar Version 7.3 Planning and Installation Guide

· · · · · ·
· IBM Redbooks
4.6
14 reviews
Ebook
112
Pages
Eligible

About this ebook

With the advances of technology and the reoccurrence of data leaks, cyber security is a bigger challenge than ever before. Cyber attacks evolve as quickly as the technology itself, and hackers are finding more innovative ways to break security controls to access confidential data and to interrupt services. Hackers reinvent themselves using new technology features as a tool to expose companies and individuals. Therefore, cyber security cannot be reactive but must go a step further by implementing proactive security controls that protect one of the most important assets of every organization: the company's information.

This IBM® Redbooks® publication provides information about implementing IBM QRadar® for Security Intelligence and Event Monitoring (SIEM) and protecting an organization's networks through a sophisticated technology, which permits a proactive security posture. It is divided in to the following major sections to facilitate the integration of QRadar with any network architecture:
Chapter 2, "Before the installation" on page 3 provides a review of important requirements before the installation of the product.

Chapter 3, "Installing IBM QRadar V7.3" on page 57 provides step-by-step procedures to guide you through the installation process.

Chapter 4, "After the installation" on page 77 helps you to configure additional features and perform checks after the product is installed.

QRadar is an IBM Security prime product that is designed to be integrated with corporate network devices to keep a real-time monitoring of security events through a centralized console. Through this book, any network or security administrator can understand the product's features and benefits.

Ratings and reviews

4.6
14 reviews
David. Richter
February 16, 2023
Qradar security framework has several modules that counterbalance network heat, excessive data packet injection, recognizition that the spike is message protocol or signal status: no data. It's first in rank goal is preemptive interruption long before the gang up his a network backbone For example, tracing and logging an out-of-sync packet sequence doesn't end with logging the date/time I am a civilian, but Qradar would view recording the exception, not the mandated endpoint. Qradar will ,"grep' a network more than the network
Did you find this helpful?
Shubham Kumar
July 25, 2018
Love to read this book
2 people found this review helpful
Did you find this helpful?

Rate this ebook

Tell us what you think.

Reading information

Smartphones and tablets
Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.
Laptops and computers
You can listen to audiobooks purchased on Google Play using your computer's web browser.
eReaders and other devices
To read on e-ink devices like Kobo eReaders, you'll need to download a file and transfer it to your device. Follow the detailed Help Center instructions to transfer the files to supported eReaders.