By Robert MacAdams on Wednesday, 03 October 2018
Category: IBM QRadar

QRadar SIEM Varonis app

The QRadar SIEM app list grew even larger last month with the addition of 2 more cybersecurity vendors. Varonis Systems, Inc., a pioneer in data security and analytics, launched an app for integration with QRadar SIEM security intelligence platform that provides companies with comprehensive visibility and response capabilities for all data security threats. Varonis customers using QRadar will now have the added context to unusual file activity, email, and active directory behavior that their solution provides, and can view alerts directly in the QRadar SIEM, view event details and investigate further in Varonis' Web UI directly from the QRadar console.

The new Varonis app is available on the QRadar xForce app exchange for free. The xForce app exchange is a central location or community for security experts, vendors, developers, cybersecurity threat feed services and similar security services that collaborate, provide tools, apps and share applications for QRadar and other IBM Security technologies and vendors that wish to help their mutual customers without barriers. This business model IBM has been building is being accept with great enthusiasm and accolades by customers. As threats increase and become more difficult to discover, the collaborative efforts of the entire security community is needed to respond rapidly and effectively.

Varonis app for QRadar leverages the QRadar SIEM Security Intelligence Platform and applies advanced analytics to data throughout the enterprise to help security teams accurately detect, understand and prioritize threats that matter most to the business. By leveraging QRadar's open API, the Varonis app for QRadar provides mutual benefit for both Varonis and IBM customers, enhancing their security posture, streamlining threat detection, prioritizing offenses and simplifying remediation.

You can download the QRadar Varonis app here: https://exchange.xforce.ibmcloud.com/hub/extension/7d7d4f706e8f6f251cc42cfb6b01928f

And watch a quick demonstration here:

https://www.youtube.com/watch?v=xkmMpWYrLQ4 

Related Posts