QRadar Console

QRadar Console

It is the main module for managing Log and Flow views, reports, Offenders, asset data and admin functions. All modules have a single interface and can be viewed from the QRadar Console. One of the most essential tasks is to manage Qradar Deployment devices from a hub.

READ MORE
QRadar Event Processor Collector

QRadar Event Processor Collector

QRadar Event Collector is the module in which Logs are collected and the EPS (Event per Second) Licensing is counted and normalized.

READ MORE
QRadar HA (High Availability)

QRadar HA (High Availability)

You can continue to collect, store, and process event and stream data on your hardware, on your network, or by using the High Availability feature when a software error occurs.

READ MORE
QRadar Flow Processor

QRadar Flow Processor

It is a module that collects Network Flow data, counts the EPS license, normalizes it, runs the rule / correlation mechanism and stores it on the Flow data. It supports Netflow, Jflow, Sflow, Packageer protocols.

READ MORE
QRadar & Network Visibility (QFlow QNI-Network Insights)

QRadar & Network Visibility (QFlow QNI-Network Insights)

QRADAR & NETWORK VISIBILITY (QFLOW, QNI-NETWORK INSIGHTS)

READ MORE
QRadar Data Node Appliance

QRadar Data Node Appliance

As Platin Bilisim, we are able to install QRadar products to our customers and aim for maximum performance.

READ MORE
What is QRadar Risk Manager? What are the Uses field?

What is QRadar Risk Manager? What are the Uses field?

READ MORE
IBM X-Force Threat Management

IBM X-Force Threat Management

READ MORE
QRadar Extensions and AppStore

QRadar Extensions and AppStore

READ MORE
QRadar STIX - QRadar TAXII

QRadar STIX - QRadar TAXII

QRadar STIX ( Structured Threat Information Expression)+ QRadar TAXII (Trusted Automated Exchange of Intelligence Information)

READ MORE
Platin Rule Library

Platin Rule Library

What should we do to create an effective security infrastructure? What are the steps after SIEM when entering the Incident Response and SOC processes? What should be the security approach for correct alarming and correlation?

READ MORE