Integrate with IBM QRadar

Modified on Tue, 4 Jun at 3:54 PM

IBM QRadar is a network security management platform that provides situational awareness and compliance support. It combines flow-based network knowledge, security event correlation, and asset-based vulnerability assessment to deliver comprehensive security insights. By integrating QRadar with, you can monitor and analyze vulnerabilities across your applications seamlessly.

Setting Up IBM QRadar Integration

Obtain the API Key from

  • Log in to and navigate to Profile Management.

  • Copy your API key from the Profile Management page.

Open Dashboard Designer in QRadar:

  • In your IBM QRadar platform, open the Dashboard Designer.

Add a Connector Source:

  • In the navigation pane, go to Connector & Sources > Connector Sources.

  • Click the Add Source button to open the Add Connector Source window.

Configure the QRadar Connector:

  • From the Connector Type list, select QRadar Connector.

  • In the Connector Source Name field, enter a name for the QRadar source. The source name can contain alphanumeric characters and underscores.

Enter the Endpoint URL:

Add API Key Header:

  • Add a header with the key API key and paste the API key obtained from your profile.

Finalize the Integration:

  • Complete the configuration by clicking Save.

  • Now, configure your parser/schema within IBM QRadar to access the key-value pairs from the JSON response.

Example JSON Schema

Below is an example schema that you can use to parse vulnerabilities data

For more detailed information, refer to IBM's official documentation. >


  • Comprehensive Monitoring: Monitor vulnerabilities across your applications directly within IBM QRadar.

  • Enhanced Situational Awareness: Use flow-based network knowledge and security event correlation to gain a holistic view of your security posture.

  • Customizable Alerts: Create custom alerts based on severity levels, status, and other key attributes.

By following these steps, you can integrate IBM QRadar with to effectively monitor and respond to security vulnerabilities across your applications.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons

Feedback sent

We appreciate your effort and will try to fix the article