Security information and event management %28siem%29 report from it central station 2017 11 18 thumbnail
Find out what your peers are saying about Splunk, LogRhythm, IBM and others in Security Information and Event Management (SIEM).
242,522 professionals have used our research on 5,991 solutions.
Chart Key
Average Rating
Average rating based on reviews
Views
Number of total page views
Comparisons
Number of times compared to another product
Reviews
Total number of reviews on IT Central Station
Followers
Number of followers on IT Central Station
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score. For Views, Comparisons, Reviews, and Followers the score is calculated as follows: The product with the highest count in each area gets the highest available score of 17.5 points. Every other product gets assigned points based on its total in proportion to the #1 product in that area. For example, if a product has 80% of the number of reviews compared to the product with the most reviews then the product's score for reviews would be 17.5% (weighting factor) * 80% = 14. For Average Rating, the maximum score is 30 points awarded linearly based on our rating scale of 1-10. If a product has fewer than ten reviews, then its average rating is less statistically significant. In these cases, the point contribution for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews; two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old, as well as those written by resellers, are completely excluded from the ranking algorithm.
Most Views
From IT Central Station visitors
Most Reviews
Within the last 24 months
Most Followed
By IT Central Station users
Most Compared
From IT Central Station visitors

What is Security Information and Event Management (SIEM)?

What is SIEM? A Security Information and Event Management (SIEM) system gives security managers a holistic overview of multiple security systems. SIEM tools centrally store and analyze log from different locations in order to spot patterns and trends that might signal an emerging security threat or attack. SIEM security combines a security information management (SIM) system with security event management (SEM) to form a single SIEM software solution. In this way, SIEM blends the best of event management tools with security event and incident management technologies.

There are multiple SIEM vendors competing in the market today. IT Central Station members offer a number of recommendations for those considering SIEM solutions.

One phrase that comes up repeatedly in IT Central Station dialogues about SIEM products is “real time.” According to reviewers, SIEM technology should possess real-time threat analysis and reporting capabilities. Solutions should offer real time security related logs and incident reporting. Reports need to specify possible risks and damage to infrastructure. A SIEM tool should ideally provide real time gathering of logs and Log Correlation. Notification event Triggering and the availability special Event Collectors with different environment is viewed as a most important criterion.

Some IT Central Station members stress the importance of SIEM being able to combine information from multiple sources. The solution has to be capable of intelligent queries on these combined sources. Put another way, SIEM must offer compatibility with diverse security data sources and be able to adapt to new or unknown sources. Then, the SIEM solution should perform multilevel correlation on those sources of data.

Efficient use is important. A SIEM tool must be easy to deploy, configure and use. SIEM can be more effective if it integrates with Identity and Access Management.  Alerting and workflow integration adds to administrative efficiency.

Specific features recommended include packet analysis, audit trail creation, threat intelligence and search. Users encourage potential buyers to have confidence in the power of a SIEM solution’s search performance and the performance of its threat intelligence engine.  The solution should be capable of parsing any log format.


Security Information and Event Management (SIEM) Reviews

Read reviews of Security Information and Event Management (SIEM) that are trending in the IT Central Station community:
Your trust is our top concern, so companies can't alter or remove reviews.
Security information and event management %28siem%29 report from it central station 2017 11 18 thumbnail
Find out what your peers are saying about Splunk, LogRhythm, IBM and others in Security Information and Event Management (SIEM).
242,522 professionals have used our research on 5,991 solutions.
Security information and event management %28siem%29 report from it central station 2017 11 18 thumbnail
Find out what your peers are saying about Splunk, LogRhythm, IBM and others in Security Information and Event Management (SIEM).
242,522 professionals have used our research on 5,991 solutions.

Security Information and Event Management (SIEM) Articles

Fdd16203 8ef5 4fdd afba 5f7acca6b477 avatar
199
Information Security Lead Consultant
Shaikh Jamal Uddin is a computer and cyber security expert and has done B.S. in Computer Engineering as well as CPTE, CEH, ECSA, Rapid7: NCA (Nexpose), Rapid7: MPCS (Metasploit), IBM QRadar Certified, TCSE (TrendMicro), KLCC (Kaspersky), MCSA, MCITP professional certifications. Recently, he got... more>>
Damian scott avatar 1432837163?1432837161
827

3
Sr SIEM Consultant
More than 8 years as a security engineer with the last 4 years as a SIEM consultant working delivering solutions to multiple industries. Sr QRadar Professional Services consultant with experience delivering on prem or cloud solution. Performed SOW technical review, sizing, architecture/design,... more>>
Vinod shankar li?1414336887
24,255

36
Manager, Enterprise Risk Consulting
Dynamic 9 years of IT career, reflecting progressive experience and performance in the computer and Internet industries. Specialized in providing cutting-edge solutions to traditional Security issues; establishing strategic ideas in various domains and demonstrating self-motivation, creativity,... more>>
Reviewed Fortinet FortiSIEM (AccelOps): The product is a well rounded performer when it...
9e223545 7a7f 404d b59a d11569013a8a avatar?1438002727
3,492

2
TOP REVIEWERTOP 5
Säkerhetschef / Säkerhetsskyddschef / Security Manager
I am a ㊙️ Security guy and have titles like Security Officer, Security Manager, Säkerhetschef and Säkerhetsskyddschef. These are only titles and not limitations. My knowledge of Management, IT, Processes and people are broad and i love to do many things and help people wherever I go. The... more>>
63bf1a67 f487 4f52 927f f35dbfc46342 avatar
19
TOP 5
Assisting companies with broad security analysis, securing and hardening their servers and networks, setting up complete SIEM environments. I set up controls and analyze business processes. The buzz words: Siem consultant, Certified Information Systems Security Professional (CISSP), Certified... more>>
Omar sanchez mr tech avatar 1434666108?1434666106
5,822

2
TOP 10POPULAR
Information Security Advisor, CISO & CIO, Docutek Services
About my business: Docutek is a leading business and technology consulting company specializing in the development and implementation of healthcare technology since 2008. We deliver Consulting, Integration, Support and Training. We also provide clients with security assessment. network... more>>
Reviewed Micro Focus AppPulse Suite: Frequent, detailed logs help developers determine...
A637ece2 3561 40b2 980b 5052c165a1a9 avatar?1438739081
51
0695fc19 7227 46ad 9c86 960e1b3abf3e avatar
82
6e36ca96 73e0 4085 9544 2966009b854f avatar
70
TOP 20
Senior Technical Consultant
I experience the implementation of FortiSIEM and Solarwinds LEM
Reviewed Fortinet FortiSIEM (AccelOps): Configuration in initial setup is complex. Product's...
6e8f7b28 ae5f 43d7 8f6c 610f2eac8504 avatar
131
TOP 20
Senior Security Consultant, CISSP, HPE ArcSight Specialist
24d140de 80d1 448c 8ece 95c2daa22510 avatar?1441887405
800
Cyber Security Advisor / CISO / Healthcare Security Pro
Mr. Christly is a seasoned Technology and Cybersecurity Executive and Consultant. He has demonstrated success aligning technology investments to streamline operations, secure corporate assets, reduce operating costs, grow sales, and develop the business in healthcare, education, telecom, and... more>>
Anonymous avatar x100
26
Delivery Consultant - Security Solutions
Giacomo rosapepe li?1414337700
1,016

2
Senior IT Security Consultant
Picture hassen trabelsi
358
IT Security Consultant
IT Security Consultant , PCI and PA DSS Compliance Manager , ISO 27001 Lead auditor , OWASP Co-Leader , Cyber Seceurity Expert, IT management Consultant.

Sign Up with Email