January 10, 2024 By Chris Meenan 2 min read

ASUS selects IBM Security QRadar EDR to help protect its commercial customers’ laptops and desktops

Endpoint devices remain one of the most critical exposure points in businesses cybersecurity posture. The rise of malicious and automated cyber activity targeting endpoints leaves organizations struggling against attackers who can easily exploit zero-day vulnerabilities with ransomware attacks. In this landscape, it’s essential for organizations to take advantage of AI-powered security technologies that help them find and remediate attacks at the endpoint with speed, and at scale. 

In order to provide their customers with access to such capabilities, ASUS recently entered into a collaboration with IBM Security to provide our QRadar Endpoint Detection and Response (EDR) solution directly to their enterprise customers.  

As a multinational PC manufacturer selling products in more than 70 countries, ASUS selected IBM Security to provide integrated endpoint security in its business laptops and desktops. Under the arrangement, ASUS can directly provide IBM Security QRadar EDR to its commercial customers, as well as managed detection and response (MDR) services delivered by IBM.  

ASUS is committed to its customers’ security and ability to defend against evolving, sophisticated cybersecurity threats. By offering QRadar EDR, ASUS enterprise customers can have the best of both worlds—high-quality hardware and advanced endpoint threat detection and response software. QRadar EDR is driven by AI and intelligent automation, and quickly identifies and remediates known and unknown endpoint threats. A lightweight agent, designed to be invisible to adversaries, is installed outside the operating system and provides deep visibility across applications and processes. It can detect anomalous behavior and remediate threats in near real time. QRadar EDR’s automated alert handling, guided remediation, visual attack storyboards, and user-friendly console helps give even the most inexperienced—or fatigued—analysts the confidence to quickly make informed decisions.  

For ASUS customers that may not have the internal resources to manage their own EDR solution, a managed detection and response option is available. QRadar MDR delivers 24/7 threat detection and fast response capabilities informed by threat intelligence. With a team of experts monitoring, tracking and resolving alerts, customers can reallocate time and resources from security management to other daily operations and strategic projects. 

QRadar EDR is one of several threat detection and response products available in IBM’s QRadar Suite. With the addition of SIEM, SOAR, Log Insights, and ASM, the broader portfolio is embedded with enterprise-grade AI and automation designed to increase analyst productivity and help resource-strained security teams work more effectively across core technologies. The suite brings together all core technologies needed for the modern security operations center—built on an open platform, with a wide partner ecosystem for flexibility and connection between IBM and existing technologies. 

The ASUS pilot program will roll out in Taiwan, home to ASUS headquarters, with potential plans to expand across APAC and then globally. Our team at IBM is excited for the advantages our new collaboration with ASUS will bring to their business customers as they move to advance their endpoint security.  

To learn more, see how QRadar EDR achieved 100% visibility across all evaluated stages in the latest MITRE Engenuity ATT&CK Evaluations. 

Learn more about IBM Security QRadar EDR

More from Security

Enterprise security is facing an identity crisis: Findings from the latest X-Force Threat Intelligence Index

2 min read - In this year’s IBM X-Force Threat Intelligence Index, our annual report of cybersecurity trends, we observed a pronounced surge in cyber threats targeting identities. Cyber criminals leveraged stolen credentials in 30% of the investigations X-Force responded to in 2023, which tracks a 71% increase compared to the previous year. Let’s take a look at some of the key findings from this year’s report. There are several ways that cybercriminals obtain valid credentials to use in breaches. In 2023, one of…

How to implement the General Data Protection Regulation (GDPR)

10 min read - The General Data Protection Regulation (GDPR), the European Union's landmark data privacy law, took effect in 2018. Yet many organizations still struggle to meet compliance requirements, and EU data protection authorities do not hesitate to hand out penalties. Even the world's biggest businesses are not free from GDPR woes. Irish regulators hit Meta with a EUR 1.2 billion fine in 2023. Italian authorities are investigating OpenAI for suspected violations, even going so far as to ban ChatGPT briefly. Many businesses…

What are breach and attack simulations?

4 min read - Breach and Attack Simulation (BAS) is an automated and continuous software-based approach to offensive security. Similar to other forms of security validation such as red teaming and penetration testing, BAS complements more traditional security tools by simulating cyberattacks to test security controls and provide actionable insights. Like a red team exercise, breach and attack simulations use the real-world attack tactics, techniques, and procedures (TTPs) employed by hackers to proactively identify and mitigate security vulnerabilities before they can be exploited by…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters