SANS Product Review

Key Features

Align attacks to the MITRE ATT&CK chain

Using the confidence level for each attack progression, analysts can validate the threat, visualize how the attack has occurred and is progressing and uncover what tactics can still possibly occur.

Analyst learning loop for a more decisive escalation process

Through analysis of the local environment, QRadar Advisor recommends which new investigations should be escalated to assist the analyst with driving quicker and more decisive escalations.

Enhanced Watson feedback using external threat intel feeds

Apply cognitive reasoning to identify the likely threat and connect threat entities related to the original incident such as malicious files, suspicious IP addresses, and rogue entities to draw relationships among these entities. Automatically tap into Watson for Cyber Security to apply external unstructured data including threat intelligence feeds, websites, forums, and more.

Perform cross-investigation analytics

QRadar Advisor will automatically link investigations through connected incidents, reducing duplication of effort and extending the investigation beyond the current probable incident and alert.

Priority list of investigations with the greatest risk

Identify investigations with the greatest risk, run multiple investigations at the same time and sort and filter through the data to quickly understand where you should focus your attention.

Proactive tuning of your environment for better security

Determine if you need to do additional tuning of your environment in the case of multiple duplicate investigations being triggered by the same events.

How customers use it

  • Unlock AI driven insights


    Visualizing the scope and severity of a threat.


    Apply cognitive reasoning to build relationships among discovered threat entities and get visibility into higher priority risks.

  • Screen shot of Watson Integrations insights

    Quickly gather insights


    Accelerating analysis and freeing up analysts' time.


    Automatically investigate indicators of compromise and suspicious behaviors. Quickly gather insights by correlating millions of external sources against local data, while enabling analysts to focus on more complex parts of the response cycle.

  • Screen shot of Watson Investigations relationship graph

    Faster response – now and in the future


    Possibly missing incidents due to false positives, false negatives, or by lack of automation.


    Use actionable information to make a decision on remediation. Ensure you don't miss incidents in the future by automatically adding discovered threat indicators to watch lists.

  • Focus on true positives


    Determining how prevalent active threats are, and if they are related.


    Easily see if related network events or flow communications related to a threat have gotten through or if the traffic was blocked by your existing defenses network. Focus efforts on active threats.

Technical details

Software requirements

To install and run QRadar Advisor with Watson, you will need to have the following setup in your environment:

  • IBM QRadar version 7.3.3 or higher
  • Local and Remote security monitoring
  • QRadar Console Internet Access required

Hardware requirements

There are no hardware requirements for IBM QRadar Advisor with Watson.

You may also be interested in


IBM QRadar SIEM consolidates log events and network flow data from thousands of devices, endpoints and applications distributed throughout a network.

IBM QRadar on Cloud

IBM QRadar on Cloud establishes cloud intelligence with SIEM as a Service to defend organization's security infrastructure from insider threats.

IBM QRadar User Behavior Analytics

IBM QRadar User Behavior Analytics (UBA) is an app that provides early visibility to insider threats.

IBM Security SOAR

IBM Security SOAR prepares and helps organizations to effectively orchestrate their response to cyber threats.