Content
Content
Olga Hout
Product Manager, QRadar Integrations
Amber Borgersen
PM, QRadar Go-To-Market Strategy
• Q&A Panel
IBM Security / © 2023 IBM Corporation * product name not yet finalized 5
QRadar 7.5.0 moves to Continuous Delivery
What is Continuous Delivery?
• A modern software development approach enabling frequent releases
• 7.5.0 upgrade packs are released approximately every 8 to 12 weeks
• Interim fixes can be released more frequently if needed
• Endpoint monitoring
• New content for Turla (MD5, SHA1 and SHA256
Hashes, Filenames, URLs, IPs)
• Advanced Turla behaviour content coming soon
IBM QRadar Analyst Workflow simplifies and expedites the offense Visualize offenses, network data, threats, malicious user behavior, and cloud
investigation and search experience. environments from around the world in geographical maps, and auto updating
charts.
• Splunk v8.24
IBM Security / © 2023 IBM Corporation * product name not yet finalized 11
QRadar SIEM Roadmap
Now Next Future focus
Q Radar SIEM SOAR An alyst Workflow Reference Set Management: 3Q 2023
– Improved SIEM and SOAR Integration for a better in – Additional actions through right-click functionality, stability improvements – Reference data API Enhancements
product and seamless interaction – Enhanced query building options – Support for Multi-tenancy
Q Radar Network Threat Analytics (NTA) v1.2 U s er Behavior Analytics Ar iel Search & Log Sources: 3Q 2023
– Enhanced analytics with new geographic – User Imports improvements – Reference data AQL performance improvements
visualizations of network communications and – ML Performance fine tuning – Custom properties enhancements
findings – Individual timeout thresholds for LogSources, monitoring expensive
Reference Set Management Q 2/Q3 LSX
U s e Case Manager v 3.7 (formerly known as QRadar – Description for reference set functionality
T u ning) Support for multiple CIDRs D is aster Recovery: 4Q 2023
– Enables users to optimally configure QRadar SIEM to – Better Disaster Recovery and Restore through Console
more accurately detect threats throughout the attack Gra nular Role Based Access Control – Phase 1 Q2/Q3
chain -Give only the permissions needed to prevent data spillage G r anular Role Based Access Control – Phase 2
– Users can export flexible reports related to their pre- - Implemented for Log Sources & Offenses -Give only the permissions needed to prevent data spillage
defined detection rules, as well as visualize
mappings of system rules to MITRE ATT&CK Ar iel Search & Log Sources G r afana Plugin
– Reference data Ariel Query Language (AQL) performance improvements – Modern Visualization with options to customize and drill down
– Custom properties enhancements
As s et Management
U s e Case Manager v 3.8 (formerly known as QRadar Tuning) – Enhancements to Assets Module to have more functionality via
– Support for all MITRE platforms, with the ability to select preferred APIs
platforms
Cer tificate Management
– Stabilize and Improve the certificate management experience to
reduce Support costs
12
IBM Security / For IBM Internal Use Only
Coming Soon …
AWS VPC Flow logs support (updates): SAP ETD 2.0: (version update) To collect events from an
The IBM® QRadar® integration for Amazon VPC (Virtual SAP Enterprise Threat Detection server. SAP Enterprise
Private Cloud) Flow Logs collects VPC flow logs from Threat Detection enables real-time security intelligence
an Amazon S3 bucket by using an SQS queue. to help protect against cybersecurity threats and help
ensure data loss prevention.
Amazon GuardDuty DSM: Collecting
Amazon GuardDuty events from the log group of the Falcon Data Replicator (DSM): FDR support near real-
Amazon CloudWatch logs services. time event collection from endpoints and cloud workloads.
Ac tivity Tracker for IBM Cloud DSM: Event mapping and
DSM update. Azure Sentinel DSM: Ingestion of events/alerts from
IBM Guardium Insights DSM: DSM for Guardium Insights Azure Sentinel to QRadar
to automatically map its out-of-the-box policy violations.
IBM Security © 2023 IBM Corporation / IBM Internal & Business Partner Use only
Introducing a new
QRadar
QRadar SIEM
The power
of Cloud
19
What’s New
Architecture
• Vertical & Horizonal Scaling • Multi-Tenancy & HA by Design • New Columnar Store • Hyper Parsers-3x Insights
• Zero downtime upgrades • Separate Tenant Pipelines • Faster Scalable Search • Zero Data Loss
Data Sources QRadar Log Insights Management Plane Unified Analyst Experience
QRadar SIEM
SaaS
QRadar Log Insights Pipeline – Per Tenant ClickHouse as a Service
KQL Queries
Data
Explorer
OnPrem Acquire Normalize Store
DC
Container DC
Storage ClickHouse DAS UDS Cases
Inbound
Queue Queue DB
Storage
Ingestion
DC Parsing
Etc
TII
https://www.youtube.com/watch?v=LF_IXNdg6kY
A new approach…
The Unified
Analyst
Experience
IBM Security / © 2023 IBM Corporation 22
What’s New
Visualizations & Dashboards
More powerful dashboard experience Integrate with existing
capabilities
Native Dashboards
Plug-In for
Grafana Dashboards
n o t f i na l s o ft w a r e
n o t f i na l s o ft w a r e
Powerful
n o t f i na l s o ft w a r e
n o t f i n a l s o f t w a r e
n o t f i n a l s o f t w a r e n o t f i na l s o ft w a r e
IBM Security Threat Investigator automatically As case details are entered, IBM Security Cases provides
analyzes and investigates cases to help you make the related recommended actions, as well as forming a
more informed decisions. case response team.
What’s New
UAX | Federated Search
Included XDR Functionalities
QRadar Unified Analyst Experience: QRadar Unified Analyst Experience: New QRadar Unified Analyst Experience: One- QRadar SIEM: Leverages the scalability of
Reduce alert investigation and response attack visualizations and additional click response actions the open-source community with YARA
time from days to minutes via automated telemetry sources for new detection use rules.
investigation, root cause analytics and cases QRadar SIEM: Real-time and periodic
mitigation recommendations threat detection with SIGMA rules. QRadar Suite on Prem: Release on-
Search based Analytics & Alerting: premise foot-print for QRadar SIEM.
QRadar Log Insights: Cloud-scale data Provide near real-time threat detection by Leverage threat intelligence and
ingestion, rapid search and powerful creating alerts using scheduled search automatically update security content Ingest and support Network Flows for
visualizations queries detection with MITRE alignment network detection & response
QRadar SOAR: Automate and QRadar Log Insights for QRoC: Support Behavioral Anomaly Analytics Support User Behavior Analytics and ITDR
orchestrate workflows Enable Log Insights to be used as a Data for insider threat
Lake for existing QRoC customers Support Reference Data & Network
QRadar XDR: Alert correlation, automated Hierarchy for efficient threat detection Executive and Compliance Reporting
investigation, and recommended responses Build a QRadar Log Insights adoption path
across EDR, SIEM, NDR, Cloud, and more. for existing QRadar SIEM customers Continuous asset discovery & profiling for Parser parity with QRadar
visibility, context, and Shadow IT detection
QRadar EDR on Prem: Enables on-premise Support AWS Built In (ABI) data sources
deployment of an EDR solution to meet the and turn-key automated AWS native
needs of regulatory requirements deployment
Thank you
Follow us on: © Copyright IBM Corporation 2022. All rights reserved. The information contained in these materials is provided for
informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of
direction represents IBM’s current intent, is subject to change or withdrawal, and represent only goals and objectives.
IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines
ibm.com/security Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks
or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through
securityintelligence.com prevention, detection and response to improper access from within and outside your enterprise. Improper access can
result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your
systems, including for use in attacks on others. No IT system or product should be considered completely secure and no
ibm.com/security/community single product, service or security measure can be completely effective in preventing improper use or access. IBM
systems, products and services are designed to be part of a lawful, comprehensive security approach, which will
necessarily involve additional operational procedures, and may require other systems, products or services to be most
effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise
xforce.ibmcloud.com immune from, the malicious or illegal conduct of any party.
@ibmsecurity
youtube.com/ibmsecurity