Technology partnerships benefit customers most when partners work together to deliver more effective security. By integrating and streamlining disparate solutions, customers can reduce the time it takes to resolve security issues.

Thanks to a joint effort between Cisco Security and IBM Security, IBM QRadar customers running Cisco Firepower Next-Generation Firewall can implement advanced threat detection with a new app from the IBM App Exchange: the QRadar App for Firepower. The app is installed as a dashboard in the QRadar user interface (UI) with its own tab, providing a place for security analysts to look at various metrics and immediately focus on critical security events reported by Firepower.

Partnering for Advanced Threat Detection

The complimentary offerings of IBM QRadar Security Intelligence Platform and Cisco Security technologies provide integrated threat defense. In the past, analysts working on security information and event management (SIEM) platforms were happy just to have the important point solutions in their security infrastructure pushing event data into the SIEM’s database. But how can an analyst understand which events are significant across dozens of information sources?

IBM QRadar’s extensible architecture allows security providers such as Cisco to personalize the user experience. No longer is a SIEM just a place where a given security vendor’s data must go for the sake of correlation and compliance. The holistic experience that SIEM platforms provide is still central to its role, but with QRadar, Cisco can now provide a parallel user experience to its own interface for the consumption of security events and crucial indicators. This can shorten the learning curve for an analyst when it comes to understanding what’s important and prioritizing the time spent reviewing certain metrics and events.

The new Firepower app’s six dashboard components are all drillable so analysts can get to the underlying data sets within the familiar QRadar event summary screens, where they can view details related to intrusion events, specific malware events, indicators of compromise (IoCs) and hosts responsible for sending or receiving malware.

Learn More and Stay Tuned

The Firepower App for QRadar is the first of several apps being developed for joint customers that will be available in the first half of 2018. Other apps coming out soon include IBM QRadar integrations with Cisco Threat Grid, Identity Services Engine (ISE), and Stealthwatch and Cloud (Umbrella and Cloudlock), as well as IBM Resilient Security Orchestration, Automation, and Response (SOAR) Platform integrations with Cisco Threat Grid.

Download the QRadar App for Firepower for free or watch this video to learn more about the app:

More from

Who Carries the Weight of a Cyberattack?

Almost immediately after a company discovers a data breach, the finger-pointing begins. Who is to blame? Most often, it is the chief information security officer (CISO) or chief security officer (CSO) because protecting the network infrastructure is their job. Heck, it is even in their job title: they are the security officer. Security is their responsibility. But is that fair – or even right? After all, the most common sources of data breaches and other cyber incidents are situations caused…

Transitioning to Quantum-Safe Encryption

With their vast increase in computing power, quantum computers promise to revolutionize many fields. Artificial intelligence, medicine and space exploration all benefit from this technological leap — but that power is also a double-edged sword. The risk is that threat actors could abuse quantum computers to break the key cryptographic algorithms we depend upon for the safety of our digital world. This poses a threat to a wide range of critical areas. Fortunately, alternate cryptographic algorithms that are safe against…

Abuse of Privilege Enabled Long-Term DIB Organization Hack

From November 2021 through January 2022, the Cybersecurity and Infrastructure Security Agency (CISA) responded to an advanced cyberattack on a Defense Industrial Base (DIB) organization’s enterprise network. During that time frame, advanced persistent threat (APT) adversaries used an open-source toolkit called Impacket to breach the environment and further penetrate the organization’s network. Even worse, CISA reported that multiple APT groups may have hacked into the organization’s network. Data breaches such as these are almost always the result of compromised endpoints…

How Do You Plan to Celebrate National Computer Security Day?

In October 2022, the world marked the 19th Cybersecurity Awareness Month. October might be over, but employers can still talk about awareness of digital threats. We all have another chance before then: National Computer Security Day. The History of National Computer Security Day The origins of National Computer Security Day trace back to 1988 and the Washington, D.C. chapter of the Association for Computing Machinery’s Special Interest Group on Security, Audit and Control. As noted by National Today, those in…