Thursday, December 11, 2025
Email Us
Info Security Watch
No Result
View All Result
Info Security Watch
No Result
View All Result
Home Threat Intelligence

Palo Alto Networks Acquires IBM’s QRadar Assets in Strategic Move for Advanced SIEM Capabilities

Administrator by Administrator
September 7, 2024
in Threat Intelligence, Threat Detection, Artificial Intelligence, News, Cybersecurity, Threat Hunting
373 28
0
Palo Alto Networks Acquires IBM’s QRadar Assets in Strategic Move for Advanced SIEM Capabilities
552
SHARES
2.5k
VIEWS
Share on FacebookShare on Twitter

Palo Alto Networks has completed its acquisition of IBM’s QRadar SaaS assets, marking a significant development in the cybersecurity space. The acquisition promises to bring advanced analytics, more accurate threat detection, and enhanced security operations to Palo Alto Networks’ Cortex XSIAM platform.

QRadar Enhances Palo Alto Networks’ Security Offerings

QRadar, IBM’s cloud-based Security Information and Event Management (SIEM) solution, excels at collecting and analyzing log data from various sources, offering robust threat detection and response capabilities. This acquisition strengthens Palo Alto Networks’ Cortex XSIAM platform by integrating QRadar’s advanced features to create a unified, data-driven security platform.

Nikesh Arora, Chairman and CEO of Palo Alto Networks, commented on the collaboration:

“Our partnership with IBM reinforces our commitment to innovation and our conviction in the tremendous benefit of QRadar customers adopting Cortex XSIAM for a robust, data-driven security platform that offers transformative efficiency and effectiveness in defending against evolving cyber threats.”

Advancing SIEM with Cortex XSIAM

The Cortex XSIAM platform already integrates SOAR, ASM, XDR, and SIEM functionalities. The addition of QRadar’s advanced analytics powered by machine learning further enhances threat assessment accuracy, reducing false positives and improving overall threat detection. This integration will streamline security operations by centralizing data and automating responses to cyber threats.

Strategic Partnership with IBM

Through this acquisition, IBM and Palo Alto Networks are setting the stage for future cybersecurity advancements. Arvind Krishna, Chairman and CEO of IBM, remarked:

“Working with Palo Alto Networks will be a strategic advantage for IBM as our two companies partner on advanced threat protection, response, and security operations using Cortex XSIAM and watsonx, backed by IBM Consulting.”

IBM’s QRadar will contribute to improved threat intelligence by leveraging IBM Security X-Force feeds, staying current on malicious IP addresses and URLs, further enhancing threat detection capabilities.

Free Migration for QRadar Customers

As part of this transition, IBM Consulting is offering free migration services to help QRadar customers move to the Cortex XSIAM platform. This offer highlights the commitment to ensuring seamless integration and enhanced security for customers.

Unified Platform with Best-in-Class Capabilities

With QRadar’s integration, Palo Alto Networks is positioning its Cortex XSIAM platform as a comprehensive solution for organizations that demand high-quality cybersecurity solutions while benefiting from a unified approach. The platform now features advanced AI, automation, and streamlined security operations, helping enterprises protect against evolving cyber threats.

Tags: QRadarPalo Alto NetworksCortex XSIAMSIEMWatsonxCybersecurityIBMIBM Security X-ForceAI in CybersecurityThreat Detection
Advertisement Banner
No Result
View All Result

Trending

Internet Security, Zero Trust, Multi-Factor Authentication, Real-Time Threat Intelligence, AI in Cybersecurity, Market Report
Market Trends

Internet Security Strategic Business Report 2023-2030

September 11, 2024
BreachSeek, AI Penetration Testing, Cybersecurity, LangChain, LangGraph, LLMs, Vulnerability Testing, KFUPM
Tools

BreachSeek: AI-Based Automated Multi-Platform Penetration Testing Tool

September 10, 2024
Endpoint Privilege Management, PAM, CISOs, Cybersecurity, ThreatLocker, Administrative Privileges, Insider Threats
Endpoint Security

Navigating Endpoint Privilege Management

September 11, 2024
Hussein Syed, RWJBarnabas Health, CISO, Cybersecurity, Healthcare Security, Becker’s Hospital Review Healthcare Cybersecurity, Industry Recognition, Leadership
Leadership

Hussein Syed, RWJ Barnabas Health CISO, Honored as One of 54 CISOs To Know Nationwide

September 10, 2024
Cybersecurity, Government Cybersecurity, AI, Zero Trust, Cyber Hygiene, Global Cybercrime, Cybersecurity Strategy Categories: Cybersecurity News, Government Cybersecurity, Global Threats
Defense

Governments Urged to Get Back to Basics to Stay Ahead of Cybersecurity Threats

September 10, 2024
Terrorist Organizations Exploit Financial Systems for Funding
Financial Crimes

Terrorist Organizations Exploit Financial Systems for Funding

September 8, 2024
Info Security Watch

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

Follow Us

Recent News

Cyware Achieves FedRAMP Ready Status to Enhance Cybersecurity

Cyware Achieves FedRAMP Ready Status to Enhance Cybersecurity

November 14, 2024
Computer Security Market Advancements Highlighted by Key Drivers and Innovations: Strategic Insights and Forecasts to 2031

Computer Security Market Key Drivers, Innovations, and Forecasts to 2031

September 18, 2024
New York, United States of America
Thursday, December 11, 2025
Partly cloudy
3 ° c
2 c -4 c
Fri
3 c -5 c
Sat
  • About
  • Terms of Service
  • Affiliate Disclosure
  • Disclaimer
  • Contact Us

© 2024 Info Security Watch. All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Information Security
  • Cybersecurity
    • Intrusion Detection & Prevention Systems (IDPS)
    • Data Loss Prevention (DLP)
    • Threat Hunting
    • Secure Remote Access
    • Data Centre Security
    • Cybersecurity Architecture Design
    • Behavioral Analytics
    • Mobile Security
    • Wireless Network Security
    • Privileged Access Management (PAM)
  • OSINT (Open Source Intelligence)
    • OSINT Techniques
    • Sentiment Analysis
    • Image & Video Analysis
    • OSINT for Financial Crime
    • Automated Threat Intelligence Platforms
    • Human Intelligence (HUMINT) Integration
    • Cybercrime Investigation
    • Geolocation Intelligence
    • Metadata Analysis
    • OSINT in Crisis Response
    • Counterterrorism OSINT
  • Digital Forensics
    • Database Forensics
    • Malware Forensics
    • Video Forensics
    • Audio Forensics
    • Anti-Forensics Techniques
    • Forensic Report Writing
    • Cross-Border Digital Investigations
    • Cryptocurrency Forensics
    • Digital Evidence Preservation
    • Legal and Regulatory Forensics
  • Cybersecurity Compliance & Risk Management
    • Compliance
    • Cyber Risk Quantification
  • Financial Analysis
    • Financial Crimes
    • Financial Systems
    • Financial Security
    • Offshore Accounts
    • Shell Companies
    • Terrorist Financing
    • Money Laundering
    • Fraud Detection
  • Business
  • Blockchain
    • Cryptocurrency
  • Investigations
    • Corporate Investigation
    • Investigation Tools
    • Investigative Journalism
  • Data Privacy
    • Data Protection,
  • Intelligence Gathering
    • Data Gathering
  • Dark Web
  • Global Security
    • Cyber Defense
  • Threat Intelligence
    • Cyber Risk Quantification
    • Social Media
    • Report
    • Supply Chain Security
    • Threat Detection
  • Defense
    • Offshore
  • Privacy Policy
  • Framework
    • Government
    • Illicit Funds
    • IoT Security
  • Networking
  • Public Records
  • Ransomware
    • Ransomware Attacks
  • Vulnerabilities
  • Tools
  • Enterprise
  • Artificial Intelligence
  • Quantum Computing
  • Zero-Day
  • Disclaimer
  • Affiliate Disclosure
  • Terms of Service
  • Contact Us

© 2024 Info Security Watch. All Rights Reserved