Everbridge Integrates with IBM QRadar
March 04, 2019
Share this

Everbridge announced the integration of IT Alerting with IBM security intelligence technology to enable joint customers to automate communications, collaboration, and orchestration tasks to streamline the overall information security incident response process.

The Everbridge IT Alerting integration for the IBM QRadar Security Intelligence Platform helps InfoSec teams to automatically identify the required IT personnel and engage with them in a matter of minutes, wherever they might be. Everbridge’s enterprise-scale IT Alerting enables clients to execute consistent, predictable, repeatable processes for fast action with communications that are context-meaningful to responders and stakeholders alike.

Everbridge IT Alerting leverages IBM QRadar, the company’s security intelligence platform which analyzes data across an organization’s IT infrastructure in real-time to identify potential security threats. Leveraging QRadar’s open application programming interfaces (API), IT Alerting provides security teams with the ability to automatically or manually launch an Everbridge incident when an offense is generated in IBM QRadar. Everbridge and IBM customers will be able to leverage comprehensive security information and event management (SIEM), log management, anomaly detection, network analysis, user behavior analytics, and vulnerability management to analyze data in real-time across an organization’s enterprise IT infrastructure to detect and prioritize potential security threats. The integration produces a common unified view and response process across service, operations, security, DevOps, and IT BC/DR. Everbridge IT Alerting provides IT workforce on-call schedule management, multi-modal targeted notifications, automated escalation, 1-click smart conferencing, 1-click ChatOps channel, automated remediation workflow execution, to help to engage the right staff and resolve the offenses generated in IBM QRadar faster.

In addition, Everbridge’s integration with the IBM Resilient Incident Response Platform enables security analysts to intelligently collaborate with stakeholders during the incident response process. The IT Alerting integration for IBM Resilient helps teams achieve more consistent, predictable and shorter incident resolution times by enabling security teams to communicate with stakeholders within workflows. Using bi-directional communications, a user can remotely control the advancement or execution of any step within a process, such as re-starting a server. Remote communications can be performed via SMS, IM, email, or phone.

“These powerful product integrations create a comprehensive 360-degree view for customers in managing security and IT operations across their enterprise,” said Vick Vaishnavi, GM, IT Alerting Business at Everbridge. “Combining Everbridge’s communication, collaboration, and smart orchestration capabilities with the unique security intelligence of IBM QRadar and the advantages of the IBM Resilient platform, joint customers can benefit from an increased security posture by leveraging a single system for threat intelligence and automated IT response and alerting.”

The Everbridge IT Alerting integration for QRadar is available to the security community through IBM Security App Exchange, a community where developers across the industry can share applications based on IBM Security technologies.

Share this

The Latest

March 26, 2019

APM is important regardless of what platform you run your applications on. However, cloud environments can be particularly difficult for two reasons. First, there is an attitude that everything is taken care of for you. While some functions are taken care of for you, other functions will be "add-ons" that you need to purchase and append to your cloud instance ...

March 25, 2019

Data-driven applications are helping drive cloud growth, according to a survey by Unravel Data. The data also reveals that enterprises are most concerned with a lack of sufficient technical talent to properly manage these data systems as well as the perceived high cost of deploying a modern data infrastructure ...

March 21, 2019

Achieving audit compliance within your IT ecosystem can be an iterative process, and it doesn't have to be compressed into the five days before the audit is due. Following is a four-step process I use to guide clients through the process of preparing for and successfully completing IT audits ...

March 20, 2019

Network performance issues come in all shapes and sizes, and can require vast amounts of time and resources to solve. Here are three examples of painful network performance issues you're likely to encounter this year, and how NPMD solutions can help you overcome them ...

March 19, 2019

"Scale up" versus "scale out" doesn't just apply to hardware investments, it also has an impact on product features. "Scale up" promotes buying the feature set you think you need now, then adding "feature modules" and licenses as you discover additional feature requirements are needed. Often as networks grow in size they also grow in complexity ...

March 18, 2019

Network Packet Brokers play a critical role in gaining visibility into new complex networks. They deliver the packet data and information IT and security teams need to identify problems, recognize security issues, and ensure overall network performance. However, not all Packet Brokers are created equal when it comes to scalability. Simply "scaling up" your network infrastructure at every growth point is a more complex and more expensive endeavor over time. Let's explore three ways the "scale up" approach to infrastructure growth impedes NetOps and security professionals (and the business as a whole) ...

March 15, 2019

Loyal users are the key to your service desk's success. Happy users want to use your services and they recommend your services in the organization. It takes time and effort to exceed user expectations, but doing so means keeping the promises we make to our users and being careful not to do too much without careful consideration for what's best for the organization and users ...

March 14, 2019

What's the difference between user satisfaction and user loyalty? How can you measure whether your users are satisfied and will keep buying from you? How much effort should you make to offer your users the ultimate experience? If you're a service provider, what matters in the end is whether users will keep coming back to you and will stay loyal ...

March 13, 2019

What if I said that a 95% reduction in the amount of IT noise, 99% reduction in ticket volume and 99% L1 resolution rate are not only possible, but that some of the largest, most complex enterprises in the world see these metrics in their environments every day, thanks to Artificial Intelligence (AI) and Machine Learning (ML)? Would you dismiss that as belonging to the realm of science fiction? ...

March 12, 2019
As a consumer, when you order products online, how do you expect them to get delivered? Some key requirements are: the product must arrive on time, well-packed, and ultimately must give you an easy gateway to return it if it is not as per your expectations. All this has been made possible via a single application. But what if this application doesn't function the way you want or cracks down mid-way, or probably leaks off information about you to some potential hackers? Technical uncertainty and digital chaos are the two double-edged swords dangling over this billion-dollar ecommerce market. Can Quality Assurance and Software Testing save application developers from this endless juggle? ...