Best Security Information and Event Management (SIEM) Vendors
Over 203,888 professionals have used IT Central Station research on enterprise tech.
Compare the best Security Information and Event Management (SIEM) vendors based on product reviews, ratings, and comparisons.
All reviews and ratings are from real users, validated by our triple authentication process.
See all 30 solutions in Security Information and Event Management (SIEM)
Average rating based on reviews
Number of total page views
Number of times compared to another product
Total number of reviews on IT Central Station
Number of followers on IT Central Station
The total ranking of a product (and the bar length) is based on a weighted aggregate ranking.
For Views, Comparisons, Reviews, and Followers the score is calculated as follows:
The product with the highest count in each area gets the highest available score of 17.5 points.
Every other product gets assigned points based on its total in proportion to the #1 product in the category.
For example, if a product has 80% of the number of reviews compared to
the product with the most reviews then the product's score and bar length for reviews would be 17.5% (weighting factor) * 80% = 14.
In the final section, Average Rating, there are 30 points available to each product
independent of the other products.
Reviews and ratings that are more than 24 months old, as well as those by resellers, are excluded from the rankings.
What is Security Information and Event Management (SIEM)?
What is SIEM? A Security Information and Event Management (SIEM) system gives security managers a holistic overview of multiple security systems. SIEM tools centrally store and analyze log from different locations in order to spot patterns and trends that might signal an emerging security threat or attack. SIEM security combines a security information management (SIM) system with security event management (SEM) to form a single SIEM software solution. In this way, SIEM blends the best of event management tools with security event and incident management technologies.
There are multiple SIEM vendors competing in the market today. IT Central Station members offer a number of recommendations for those considering SIEM solutions.
One phrase that comes up repeatedly in IT Central Station dialogues about SIEM products is “real time.” According to reviewers, SIEM technology should possess real-time threat analysis and reporting capabilities. Solutions should offer real time security related logs and incident reporting. Reports need to specify possible risks and damage to infrastructure. A SIEM tool should ideally provide real time gathering of logs and Log Correlation. Notification event Triggering and the availability special Event Collectors with different environment is viewed as a most important criterion.
Some IT Central Station members stress the importance of SIEM being able to combine information from multiple sources. The solution has to be capable of intelligent queries on these combined sources. Put another way, SIEM must offer compatibility with diverse security data sources and be able to adapt to new or unknown sources. Then, the SIEM solution should perform multilevel correlation on those sources of data.
Specific features recommended include packet analysis, audit trail creation, threat intelligence and search. Users encourage potential buyers to have confidence in the power of a SIEM solution’s search performance and the performance of its threat intelligence engine. The solution should be capable of parsing any log format.
Security Information and Event Management (SIEM) Reviews
Read reviews of Security Information and Event Management (SIEM) that are trending in the IT Central Station community:
Your trust is our top concern, so companies can't alter or remove reviews.
Information Security Advisor, CISO & CIO, Docutek Services
About my business:
Docutek is a leading business and technology consulting company specializing in the development and implementation of healthcare technology since 2008. We deliver Consulting, Integration, Support and Training. We also provide clients with security assessment. network... more>>
Shaikh Jamal Uddin is a computer and cyber security expert and has done B.S. in Computer Engineering as well as CPTE, CEH, ECSA, Rapid7: NCA (Nexpose), Rapid7: MPCS (Metasploit), IBM QRadar Certified, TCSE (TrendMicro), KLCC (Kaspersky), MCSA, MCITP professional certifications. Recently, he got... more>>
More than 8 years as a security engineer with the last 4 years as a SIEM consultant working delivering solutions to multiple industries.
Sr QRadar Professional Services consultant with experience delivering on prem or cloud solution. Performed SOW technical review, sizing, architecture/design,... more>>
I am an Security guy and have the title: Security Manager.
This is only a title and not a limitation. My knowledge of Management, IT, Processes and people are broad and i love to do many things and help people wherever I go.
The last nineteen years has been a road from Novell Netware to... more>>
Dynamic 9 years of IT career, reflecting progressive experience and performance in the computer and Internet industries. Specialized in providing cutting-edge solutions to traditional Security issues; establishing strategic ideas in various domains and demonstrating self-motivation, creativity,... more>>
Cyber Security Advisor / CISO / Healthcare Security Pro
Mr. Christly is a seasoned Technology and Cybersecurity Executive and Consultant.
He has demonstrated success aligning technology investments to streamline operations, secure corporate assets, reduce operating costs, grow sales, and develop the business in healthcare, education, telecom, and... more>>
Not sure which Security Information and Event Management (SIEM) solution is right for you?Download our free Security Information and Event Management (SIEM) Report and find out what your peers are saying about Hewlett Packard Enterprise, LogRhythm, IBM, and more!