January 10, 2024 By Chris Meenan 2 min read

ASUS selects IBM Security QRadar EDR to help protect its commercial customers’ laptops and desktops

Endpoint devices remain one of the most critical exposure points in businesses cybersecurity posture. The rise of malicious and automated cyber activity targeting endpoints leaves organizations struggling against attackers who can easily exploit zero-day vulnerabilities with ransomware attacks. In this landscape, it’s essential for organizations to take advantage of AI-powered security technologies that help them find and remediate attacks at the endpoint with speed, and at scale. 

In order to provide their customers with access to such capabilities, ASUS recently entered into a collaboration with IBM Security to provide our QRadar Endpoint Detection and Response (EDR) solution directly to their enterprise customers.  

As a multinational PC manufacturer selling products in more than 70 countries, ASUS selected IBM Security to provide integrated endpoint security in its business laptops and desktops. Under the arrangement, ASUS can directly provide IBM Security QRadar EDR to its commercial customers, as well as managed detection and response (MDR) services delivered by IBM.  

ASUS is committed to its customers’ security and ability to defend against evolving, sophisticated cybersecurity threats. By offering QRadar EDR, ASUS enterprise customers can have the best of both worlds—high-quality hardware and advanced endpoint threat detection and response software. QRadar EDR is driven by AI and intelligent automation, and quickly identifies and remediates known and unknown endpoint threats. A lightweight agent, designed to be invisible to adversaries, is installed outside the operating system and provides deep visibility across applications and processes. It can detect anomalous behavior and remediate threats in near real time. QRadar EDR’s automated alert handling, guided remediation, visual attack storyboards, and user-friendly console helps give even the most inexperienced—or fatigued—analysts the confidence to quickly make informed decisions.  

For ASUS customers that may not have the internal resources to manage their own EDR solution, a managed detection and response option is available. QRadar MDR delivers 24/7 threat detection and fast response capabilities informed by threat intelligence. With a team of experts monitoring, tracking and resolving alerts, customers can reallocate time and resources from security management to other daily operations and strategic projects. 

QRadar EDR is one of several threat detection and response products available in IBM’s QRadar Suite. With the addition of SIEM, SOAR, Log Insights, and ASM, the broader portfolio is embedded with enterprise-grade AI and automation designed to increase analyst productivity and help resource-strained security teams work more effectively across core technologies. The suite brings together all core technologies needed for the modern security operations center—built on an open platform, with a wide partner ecosystem for flexibility and connection between IBM and existing technologies. 

The ASUS pilot program will roll out in Taiwan, home to ASUS headquarters, with potential plans to expand across APAC and then globally. Our team at IBM is excited for the advantages our new collaboration with ASUS will bring to their business customers as they move to advance their endpoint security.  

To learn more, see how QRadar EDR achieved 100% visibility across all evaluated stages in the latest MITRE Engenuity ATT&CK Evaluations. 

Learn more about IBM Security QRadar EDR

More from Security

Data privacy examples

9 min read - An online retailer always gets users' explicit consent before sharing customer data with its partners. A navigation app anonymizes activity data before analyzing it for travel trends. A school asks parents to verify their identities before giving out student information. These are just some examples of how organizations support data privacy, the principle that people should have control of their personal data, including who can see it, who can collect it, and how it can be used. One cannot overstate…

How to prevent prompt injection attacks

8 min read - Large language models (LLMs) may be the biggest technological breakthrough of the decade. They are also vulnerable to prompt injections, a significant security flaw with no apparent fix. As generative AI applications become increasingly ingrained in enterprise IT environments, organizations must find ways to combat this pernicious cyberattack. While researchers have not yet found a way to completely prevent prompt injections, there are ways of mitigating the risk.  What are prompt injection attacks, and why are they a problem? Prompt…

Building the human firewall: Navigating behavioral change in security awareness and culture

4 min read - The latest findings of the IBM X-Force® Threat Intelligence Index report highlight a shift in the tactics of attackers. Rather than using traditional hacking methods, there has been a significant 71% surge in attacks where criminals are exploiting valid credentials to infiltrate systems. Info stealers have seen a staggering 266% increase in their utilization, emphasizing their role in acquiring these credentials. Their objective is straightforward: exploit the path of least resistance, often through unsuspecting employees, to obtain valid credentials. Organizations…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters