Security information and event management %28siem%29 report from it central station 2016 12 18
Find out what your peers are saying about and others in Security Information and Event Management (SIEM).
189,743 professionals have used our research on 5,358 solutions.
Chart Key
Views
Number of total page views
Comparisons
Number of times compared to another product
Reviews
Total number of reviews on IT Central Station
Followers
Number of followers on IT Central Station
Average Rating
Average rating based on reviews
The total ranking of a product (and the bar length) is based on a weighted aggregate ranking. For Views, Comparisons, Reviews, and Followers the score is calculated as follows: The product with the highest count in each area gets the highest available score of 17.5 points. Every other product gets assigned points based on its total in proportion to the #1 product in the category. For example, if a product has 80% of the number of reviews compared to the product with the most reviews then the product's score and bar length for reviews would be 17.5% (weighting factor) * 80% = 14.
In the final section, Average Rating, there are 30 points available to each product independent of the other products.
Reviews and ratings that are more than 24 months old, as well as those by resellers, are excluded from the rankings.

What is Security Information and Event Management (SIEM)?

What is SIEM? A Security Information and Event Management (SIEM) system gives security managers a holistic overview of multiple security systems. SIEM tools centrally store and analyze log from different locations in order to spot patterns and trends that might signal an emerging security threat or attack. SIEM security combines a security information management (SIM) system with security event management (SEM) to form a single SIEM software solution. In this way, SIEM blends the best of event management tools with security event and incident management technologies.

There are multiple SIEM vendors competing in the market today. IT Central Station members offer a number of recommendations for those considering SIEM solutions.

One phrase that comes up repeatedly in IT Central Station dialogues about SIEM products is “real time.” According to reviewers, SIEM technology should possess real-time threat analysis and reporting capabilities. Solutions should offer real time security related logs and incident reporting. Reports need to specify possible risks and damage to infrastructure. A SIEM tool should ideally provide real time gathering of logs and Log Correlation. Notification event Triggering and the availability special Event Collectors with different environment is viewed as a most important criterion.

Some IT Central Station members stress the importance of SIEM being able to combine information from multiple sources. The solution has to be capable of intelligent queries on these combined sources. Put another way, SIEM must offer compatibility with diverse security data sources and be able to adapt to new or unknown sources. Then, the SIEM solution should perform multilevel correlation on those sources of data.

Efficient use is important. A SIEM tool must be easy to deploy, configure and use. SIEM can be more effective if it integrates with Identity and Access Management.  Alerting and workflow integration adds to administrative efficiency.

Specific features recommended include packet analysis, audit trail creation, threat intelligence and search. Users encourage potential buyers to have confidence in the power of a SIEM solution’s search performance and the performance of its threat intelligence engine.  The solution should be capable of parsing any log format.


Security Information and Event Management (SIEM) Reviews

Read reviews of Security Information and Event Management (SIEM) that are trending in the IT Central Station community:
Your trust is our top concern, so companies can't alter or remove reviews.

Security Information and Event Management (SIEM) Questions

Anonymous avatar x60
Jock Fowlie
Real User
Security Solution Architect at a comms service provider with 100-1000 employees
Ddp 8144 %281%29
Avigail Sugarman
Community Mgr
Community Manager
IT Central Station
Picture 1135 1356968943
ctsanders→ What are the must-haves for a SIEM solution? I think to the point of Vikas,... more »
Vkas
Vikas RainaWell from solution perspective one can have as many ... I wanted to draw... more »
Vkas
Vikas RainaBefore the start of a SIEM , it is very important to set a scope. The scope... more »
Ddp 8148
Ariel Lindenfeld
Community Mgr
Sr. Director of Community
IT Central Station
Carel cramer li?1424462239
Carel CramerWorking with Identity and Acces Management, is at the first place a... more »
9e223545 7a7f 404d b59a d11569013a8a avatar?1438002727
Mikael TakeoIt all depends on the purpose of the purchase. Security Information and... more »
Kevin boddrell li?1430645442
Kevin BoddrellFrom bitter recent experience, gaining easy access to evaluation software.... more »
Anonymous avatar x60
FA
Vendor
Senior Information Assurance Specialist at a tech services company with 1-100 employees
Anonymous avatar x30
Peter Limbuhan, CISA, CEH, CHFINessus is a remote security scanning tool, which scans a computer and raises... more »
Ahcene oubagha avatar 1432253983?1432253981
Ahcene OubaghaHi, Both are important piece of complete security infrastructure solution,... more »
Eric pinkerton avatar 1432597413?1432597411
Eric PinkertonNessus is a Vulnerability Scanner (Made by Tenable who also make SIEM... more »
Ddp 8144 %281%29
Avigail Sugarman
Community Mgr
Community Manager
IT Central Station
Picture 1135 1356968943
ctsandersI asked this question in a previous discussion, what is your experience with... more »
Rajendra kumar nag li?1414335398
Rajendra Kumar NagI cannot respond to the query as I have worked with solutions based on NetIQ... more »
Lilet tandoc gan li?1414333412
Lilet Tandoc GanHi, I disgree for SME installation since Q1 is usually on a large... more »
Anonymous avatar x60
Santha Kumar
Real User
Developer at a tech vendor with 1000+ employees
Alex adler li?1414335009
Alex AdlerArcSight and McAfee(Intel) Nitro are really strong SIEM solutions, but the... more »
Jean luc labbe li?1414333227
Jean-Luc LabbéHi Kumar, I strongly believe that before anyone makes any attempt to compare... more »
Krishnaraj raveendran nair li?1414338209
Krishnaraj Raveendran NairHi Kumar, We are using RSA envsion and we are having a tough time with the... more »
9e223545 7a7f 404d b59a d11569013a8a avatar?1438002727
2,864

2
TOP REVIEWERTOP 5
IT Consultant
My title is technical project manager consultant and have the last twelve years been doing everything from manager to consultant and both. 2014-2015 i worked mostly within IT-Security and with SIEM Solutions and now i am Configuration Manager and Customer Security Office for a large... more>>
Reviewed Intel Security ePolicy Orchestrator: With it, I was able to make an MSS (Managed Security...
Omar sanchez mr tech avatar 1434666108?1434666106
5,613

2
TOP 5POPULAR
Information Security Advisor, CISO & CIO, Docutek Services
About my business: Docutek is a leading business and technology consulting company specializing in the development and implementation of healthcare technology since 2008. We deliver Consulting, Integration, Support and Training. We also provide clients with security assessment. network... more>>
Giacomo rosapepe li?1414337700
953

2
Senior IT Security Consultant
Anonymous avatar x100
263
TOP 20
Senior Network and Security Consultant SI
Vinod shankar li?1414336887
20,559

40
Manager, Enterprise Risk Consulting
Dynamic 9 years of IT career, reflecting progressive experience and performance in the computer and Internet industries. Specialized in providing cutting-edge solutions to traditional Security issues; establishing strategic ideas in various domains and demonstrating self-motivation, creativity,... more>>
Reviewed IBM Security QRadar SIEM: Qradar vs. ArcSight
24d140de 80d1 448c 8ece 95c2daa22510 avatar?1441887405
679
Cyber Security Advisor / CISO / Healthcare Security Pro
Mr. Christly is a seasoned Technology and Cybersecurity Executive and Consultant. He has demonstrated success aligning technology investments to streamline operations, secure corporate assets, reduce operating costs, grow sales, and develop the business in healthcare, education, telecom, and... more>>
Anonymous avatar x100
191
Senior IT Security Consultant, Cybersecurity Technology Services
Anonymous avatar x100
34
Senior Security Consultant & Solution Architect
Anonymous avatar x100
168
Security Consultant, Presale and System Engineer
Reviewed McAfee Enterprise Security Manager: If you provide it with the Advanced Correlation...
Picture hassen trabelsi
258
IT Security Consultant
IT Security Consultant , PCI and PA DSS Compliance Manager , ISO 27001 Lead auditor , OWASP Co-Leader , Cyber Seceurity Expert, IT management Consultant.
Reviewed IBM Security QRadar SIEM: It captures and processes large volumes of event...

Sign Up with Email