The QRadar SOAR Add-on integrates the IBM Security QRadar SOAR Platform with Splunk to simplify and streamline the process of escalating and managing cases. Escalating a Splunk alert or Splunk ES notable event to IBM QRadar SOAR allows the platform to generate a detailed, case-specific response plan that enables security team members to quickly respond. Additionally, security team members can add artifacts and other incident details to case records, and can leverage built-in threat intelligence to gather valuable context needed to inform an intelligent and decisive response. Complete documentation is available on GitHub: https://github.com/ibmresilient/resilient-reference/tree/master/developer_guides/qradar-soar-splunk-addon For support, please visit https://ibm.com/mysupport . Do not use the "Contact Developer" link, as that email address is not monitored.
(0)
Categories
Created By
Type
Downloads
Licensing
Splunk Answers
Resources