March 3, 2017 By Shane Lundy 2 min read

I want to share a great app that went live this week on the IBM Security App Exchange called the QRadar Assistant App.

This app lets users manage extensions, such as apps and content packs installed from the Security App Exchange, through a simple dashboard widget. It also provides customers a help center with useful links to our monthly newsletters, open mics, support forum, tech tips and much more. From speaking to our customers, we could not believe how many didn’t know about these useful resources or about the App Exchange itself, so we are placing it at their fingertips.

Customers will now be informed when new extensions are available on the IBM Security App Exchange, and when updates to the extensions they have already installed are available. Once users have installed this app, there is no more need to navigate to the App Exchange, download to a PC, upload and install via extension management. Customers simply click on the extension they are interested in and it will install directly from the extension.

These extensions are helping our customers in every security area: users, endpoint, cloud, network, cognitive, response, threat intelligence and more. Stay tuned for exciting features and use cases that will get delivered with the QRadar Assistant App.

If a picture is worth a thousand words, what is a video worth? Watch this quick video and see just how useful the QRadar Assistant App will be to all our customers.

Watch the video to learn more

More from

SpyAgent malware targets crypto wallets by stealing screenshots

4 min read - A new Android malware strain known as SpyAgent is making the rounds — and stealing screenshots as it goes. Using optical character recognition (OCR) technology, the malware is after cryptocurrency recovery phrases often stored in screenshots on user devices.Here's how to dodge the bullet.Attackers shooting their (screen) shotAttacks start — as always — with phishing efforts. Users receive text messages prompting them to download seemingly legitimate apps. If they take the bait and install the app, the SpyAgent malware gets…

Exploring DORA: How to manage ICT incidents and minimize cyber threat risks

3 min read - As cybersecurity breaches continue to rise globally, institutions handling sensitive information are particularly vulnerable. In 2024, the average cost of a data breach in the financial sector reached $6.08 million, making it the second hardest hit after healthcare, according to IBM's 2024 Cost of a Data Breach report. This underscores the need for robust IT security regulations in critical sectors.More than just a defensive measure, compliance with security regulations helps organizations reduce risk, strengthen operational resilience and enhance customer trust.…

What Telegram’s recent policy shift means for cyber crime

4 min read - Since its launch in August 2013, Telegram has become the go-to messaging app for privacy-focused users. To start using the app, users can sign up using either their real phone number or an anonymous number purchased from the Fragment blockchain marketplace. In the case of the latter, Telegram cannot be linked to the user’s real phone number or any other personally identifiable information (PII).Telegram has also long been known for its hands-off moderation policy. The platform explicitly stated in its…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today