Q1 Labs launches real-time social network tracking
Q1 Labs' new SIEM system brings real-time social network and application monitoring to the market.


Q1 Labs has launched a new security information and event management (SIEM) system, giving companies the ability to track employees' social network and multimedia use.
QRadar 7.0 is able to check anomalies in workers' use of applications to help detect any threats, as well as pick up on the kinds of information employees are making public in real-time.
Social network use can also be correlated with other access information. This allows administrators to check what sensitive databases have been accessed before the user has visited a social network, in case of any foul play or unwanted transmission of information onto the likes of Facebook or Twitter.
Another major feature of Q1 Labs' newest product is client-side vulnerability profiling, which identifies any potential threats on a network and then alerts when these are exposed.
Firms using QRadar 7.0 can also prioritise remediation steps based on the risk profile of each application.
On showing IT PRO the product in action, John Burnham, vice president of marketing for Q1 Labs, explained how the firm was delighted to have achieved an industry first in its social media and application monitoring, stressing the impact social networks have had on business.
"Social media is what the web was to enterprises in the mid-1990s," Burnham said.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The recent HP acquisition of ArcSight, along with the addition of this new product, will place Q1 Labs in a better position in the SIEM space, Burnham suggested.
"We were really pleased ArcSight was bought," he explained, adding that Q1 Labs is now the biggest independent firm in security intelligence.
As for whether Q1 Labs would ever be sold, Burnham stressed the company is "not for sale," although he expected to see other acquisitions in the space.
"Our goal is to become the Oracle of security intelligence," he added.
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
Level up your log management: Six-phase strategy for achieving continuous improvement
whitepaper Improve security operations, manage risk more effectively, and gain intelligent digital forensics capabilities.
By ITPro
-
Threat intelligence integration: From source to secure
whitepaper Discover what to consider when choosing a source of threat intelligence
By ITPro
-
Ultimate guide to monitoring and logging requirements
whitepaper Discover how you can comply with multiple regulations and industry standards
By ITPro
-
Optimizing SIEM with log management
whitepaper Get guidance on how you can get maximum protection from your SIEM solution
By ITPro
-
A CISO’s guide to log management for cybersecurity
whitepaper Gain the ability to collect, aggregate, and correlate data more effectively
By ITPro
-
Four measures SMBs can take to avoid common security pitfalls
In-depth Security can be challenging for SMBs, but it’s possible to make yourself more resilient to reduce the impact of cyber attacks
By Kate O'Flaherty
-
Automation antidotes for the top poisons in cyber security management
Whitepaper How orchestration and collaboration tools can provide a healthy defense against the most serious threats
By ITPro
-
Six myths of SIEM
Whitepaper Things have changed when it comes to SIEM solutions
By ITPro