Introducing G2.ai, the future of software buying.Try now

Best Security Information and Event Management (SIEM) Software Solutions

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Security information and event management (SIEM) software combines a variety of security software components into one platform. Companies use SIEM solutions to centralize security operations into a single location. IT and security operations teams can gain access to the same information and alerts for more effective communication and planning. These products provide capabilities to identify and alert IT operations teams of anomalies detected in their systems. The anomalies may be new malware, unapproved access, or newly discovered vulnerabilities. SIEM tools provide live analysis of functionality and security, storing logs and records for retrospective reporting. They also have products for identity and access management to ensure only approved parties have access to sensitive systems. Forensic analysis tools help teams navigate historical logs, identify trends, and better fortify their networks.

SIEM systems may be confused with incident response software, but SIEM products provide a larger scope of security and IT management features. Most also do not have the ability to automate security remediation practices.

To qualify for inclusion in the SIEM category, a product must:

Aggregate and store IT security data
Assist in user provisioning and governance
Identify vulnerabilities in systems and endpoints
Monitor for anomalies within an IT system

Best Security Information and Event Management (SIEM) Software At A Glance

Highest Performer:
Easiest to Use:
Best Free Software:
Show LessShow More
Easiest to Use:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
101 Listings in Security Information and Event Management (SIEM) Available
(289)4.4 out of 5
7th Easiest To Use in Security Information and Event Management (SIEM) software
View top Consulting Services for Microsoft Sentinel
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Microsoft Sentinel lets you see and stop threats before they cause harm, with SIEM reinvented for a modern world. Microsoft Sentinel is your birds-eye view across the enterprise. Put the cloud and lar

    Users
    • Cyber Security Analyst
    • Senior Software Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 40% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Sentinel Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    29
    Ease of Use
    23
    Security
    23
    Threat Detection
    23
    Integration Support
    21
    Cons
    Expensive
    21
    Complexity
    12
    Difficult Learning
    12
    Integration Issues
    10
    Complex Setup
    8
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Sentinel features and usability ratings that predict user satisfaction
    8.9
    Activity Monitoring
    Average: 9.0
    8.5
    Data Examination
    Average: 8.5
    8.5
    Ease of Use
    Average: 8.6
    8.8
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Microsoft Sentinel lets you see and stop threats before they cause harm, with SIEM reinvented for a modern world. Microsoft Sentinel is your birds-eye view across the enterprise. Put the cloud and lar

Users
  • Cyber Security Analyst
  • Senior Software Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 40% Enterprise
  • 31% Mid-Market
Microsoft Sentinel Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
29
Ease of Use
23
Security
23
Threat Detection
23
Integration Support
21
Cons
Expensive
21
Complexity
12
Difficult Learning
12
Integration Issues
10
Complex Setup
8
Microsoft Sentinel features and usability ratings that predict user satisfaction
8.9
Activity Monitoring
Average: 9.0
8.5
Data Examination
Average: 8.5
8.5
Ease of Use
Average: 8.6
8.8
Log Management
Average: 9.0
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT
(297)4.7 out of 5
3rd Easiest To Use in Security Information and Event Management (SIEM) software
View top Consulting Services for CrowdStrike Falcon Endpoint Protection Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdStrike’s leading cloud-based Falcon platform protects your systems through a single lightweight sensor — there is no on-premises equipment to be maintained, managed or updated, and no need for fr

    Users
    • Security Analyst
    • Cyber Security Analyst
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CrowdStrike Falcon Endpoint Protection Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    54
    Ease of Use
    43
    Security
    43
    Threat Detection
    38
    Detection
    36
    Cons
    Missing Features
    14
    Expensive
    11
    Limited Features
    11
    Complexity
    10
    Difficult Navigation
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
    10.0
    Activity Monitoring
    Average: 9.0
    9.7
    Data Examination
    Average: 8.5
    9.0
    Ease of Use
    Average: 8.6
    8.3
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    107,168 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,101 employees on LinkedIn®
    Ownership
    NASDAQ: CRWD
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdStrike’s leading cloud-based Falcon platform protects your systems through a single lightweight sensor — there is no on-premises equipment to be maintained, managed or updated, and no need for fr

Users
  • Security Analyst
  • Cyber Security Analyst
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 40% Mid-Market
CrowdStrike Falcon Endpoint Protection Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
54
Ease of Use
43
Security
43
Threat Detection
38
Detection
36
Cons
Missing Features
14
Expensive
11
Limited Features
11
Complexity
10
Difficult Navigation
10
CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
10.0
Activity Monitoring
Average: 9.0
9.7
Data Examination
Average: 8.5
9.0
Ease of Use
Average: 8.6
8.3
Log Management
Average: 9.0
Seller Details
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
107,168 Twitter followers
LinkedIn® Page
www.linkedin.com
10,101 employees on LinkedIn®
Ownership
NASDAQ: CRWD

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(474)4.3 out of 5
15th Easiest To Use in Security Information and Event Management (SIEM) software
View top Consulting Services for Palo Alto Cortex XSIAM
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Cortex XSIAM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    49
    Threat Detection
    38
    Integrations
    29
    Cybersecurity
    26
    Easy Integrations
    25
    Cons
    Expensive
    27
    Difficult Learning
    17
    Integration Issues
    16
    Complexity
    13
    UX Improvement
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Cortex XSIAM features and usability ratings that predict user satisfaction
    8.8
    Activity Monitoring
    Average: 9.0
    8.3
    Data Examination
    Average: 8.5
    8.3
    Ease of Use
    Average: 8.6
    8.8
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
    Ownership
    NYSE: PANW
Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 29% Mid-Market
Palo Alto Cortex XSIAM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
49
Threat Detection
38
Integrations
29
Cybersecurity
26
Easy Integrations
25
Cons
Expensive
27
Difficult Learning
17
Integration Issues
16
Complexity
13
UX Improvement
12
Palo Alto Cortex XSIAM features and usability ratings that predict user satisfaction
8.8
Activity Monitoring
Average: 9.0
8.3
Data Examination
Average: 8.5
8.3
Ease of Use
Average: 8.6
8.8
Log Management
Average: 9.0
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®
Ownership
NYSE: PANW
(205)4.6 out of 5
1st Easiest To Use in Security Information and Event Management (SIEM) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With more than 50,000 customer installations across the five continents, Pandora FMS is an out-of-the-box monitoring solution. Pandora FMS gives you the agility to find and solve problems quickly,

    Users
    • Data Analyst
    Industries
    • Information Technology and Services
    • Telecommunications
    Market Segment
    • 48% Mid-Market
    • 37% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Pandora FMS Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring
    126
    Ease of Use
    109
    Real-time Monitoring
    83
    Flexibility
    61
    Platform Support
    54
    Cons
    Learning Curve
    41
    Learning Difficulty
    29
    Complex Configuration
    27
    Complex Setup
    27
    Difficult Configuration
    24
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pandora FMS features and usability ratings that predict user satisfaction
    10.0
    Activity Monitoring
    Average: 9.0
    8.3
    Data Examination
    Average: 8.5
    9.1
    Ease of Use
    Average: 8.6
    10.0
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2004
    HQ Location
    Madrid, Spain
    Twitter
    @pandorafms
    5,561 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

With more than 50,000 customer installations across the five continents, Pandora FMS is an out-of-the-box monitoring solution. Pandora FMS gives you the agility to find and solve problems quickly,

Users
  • Data Analyst
Industries
  • Information Technology and Services
  • Telecommunications
Market Segment
  • 48% Mid-Market
  • 37% Small-Business
Pandora FMS Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring
126
Ease of Use
109
Real-time Monitoring
83
Flexibility
61
Platform Support
54
Cons
Learning Curve
41
Learning Difficulty
29
Complex Configuration
27
Complex Setup
27
Difficult Configuration
24
Pandora FMS features and usability ratings that predict user satisfaction
10.0
Activity Monitoring
Average: 9.0
8.3
Data Examination
Average: 8.5
9.1
Ease of Use
Average: 8.6
10.0
Log Management
Average: 9.0
Seller Details
Company Website
Year Founded
2004
HQ Location
Madrid, Spain
Twitter
@pandorafms
5,561 Twitter followers
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®
(223)4.3 out of 5
9th Easiest To Use in Security Information and Event Management (SIEM) software
View top Consulting Services for Splunk Enterprise Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Splunk Enterprise Security (ES) is a data-centric, modern security information and event management (SIEM) solution that delivers data-driven insights for full breadth visibility into your security po

    Users
    • Software Engineer
    • Senior Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 59% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Splunk Enterprise Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Dashboard Usability
    5
    Easy Integrations
    5
    Alerting
    3
    Customer Support
    3
    Customization
    3
    Cons
    Expensive
    3
    Difficult Learning
    2
    Cost Management
    1
    Dashboard Issues
    1
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Splunk Enterprise Security features and usability ratings that predict user satisfaction
    8.8
    Activity Monitoring
    Average: 9.0
    8.5
    Data Examination
    Average: 8.5
    8.1
    Ease of Use
    Average: 8.6
    9.4
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Splunk Enterprise Security (ES) is a data-centric, modern security information and event management (SIEM) solution that delivers data-driven insights for full breadth visibility into your security po

Users
  • Software Engineer
  • Senior Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 59% Enterprise
  • 31% Mid-Market
Splunk Enterprise Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Dashboard Usability
5
Easy Integrations
5
Alerting
3
Customer Support
3
Customization
3
Cons
Expensive
3
Difficult Learning
2
Cost Management
1
Dashboard Issues
1
Integration Issues
1
Splunk Enterprise Security features and usability ratings that predict user satisfaction
8.8
Activity Monitoring
Average: 9.0
8.5
Data Examination
Average: 8.5
8.1
Ease of Use
Average: 8.6
9.4
Log Management
Average: 9.0
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
(630)4.4 out of 5
Optimized for quick response
13th Easiest To Use in Security Information and Event Management (SIEM) software
View top Consulting Services for Datadog
Save to My Lists
Entry Level Price:$0 Per host, per month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Datadog is the monitoring, security and analytics platform for developers, IT operations teams, security engineers and business users in the cloud age. The SaaS platform integrates and automates infra

    Users
    • Software Engineer
    • DevOps Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Mid-Market
    • 35% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Datadog Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    111
    Monitoring
    78
    Real-time Monitoring
    68
    Integrations
    62
    Easy Integrations
    61
    Cons
    Expensive
    61
    Pricing Issues
    50
    Learning Curve
    47
    Difficult Learning
    42
    Cost
    40
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Datadog features and usability ratings that predict user satisfaction
    9.2
    Activity Monitoring
    Average: 9.0
    8.8
    Data Examination
    Average: 8.5
    8.2
    Ease of Use
    Average: 8.6
    9.4
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Datadog
    Company Website
    Year Founded
    2010
    HQ Location
    New York
    Twitter
    @datadoghq
    50,036 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,820 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Datadog is the monitoring, security and analytics platform for developers, IT operations teams, security engineers and business users in the cloud age. The SaaS platform integrates and automates infra

Users
  • Software Engineer
  • DevOps Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Mid-Market
  • 35% Enterprise
Datadog Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
111
Monitoring
78
Real-time Monitoring
68
Integrations
62
Easy Integrations
61
Cons
Expensive
61
Pricing Issues
50
Learning Curve
47
Difficult Learning
42
Cost
40
Datadog features and usability ratings that predict user satisfaction
9.2
Activity Monitoring
Average: 9.0
8.8
Data Examination
Average: 8.5
8.2
Ease of Use
Average: 8.6
9.4
Log Management
Average: 9.0
Seller Details
Seller
Datadog
Company Website
Year Founded
2010
HQ Location
New York
Twitter
@datadoghq
50,036 Twitter followers
LinkedIn® Page
www.linkedin.com
8,820 employees on LinkedIn®
(216)4.7 out of 5
Optimized for quick response
8th Easiest To Use in Security Information and Event Management (SIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cynet is the ultimate All-in-One Managed Cybersecurity Platform that delivers robust and comprehensive protection for small to medium enterprises (SMEs) while maximizing operational efficiency for man

    Users
    • SOC Analyst
    • Technical Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 59% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cynet - All-in-One Cybersecurity Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    48
    Security
    39
    Features
    38
    Threat Detection
    38
    Cybersecurity
    28
    Cons
    UX Improvement
    14
    Missing Features
    13
    Slow Performance
    12
    Limited Features
    11
    Alert Issues
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cynet - All-in-One Cybersecurity Platform features and usability ratings that predict user satisfaction
    8.7
    Activity Monitoring
    Average: 9.0
    8.0
    Data Examination
    Average: 8.5
    9.0
    Ease of Use
    Average: 8.6
    7.7
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cynet
    Company Website
    Year Founded
    2014
    HQ Location
    Boston, MA
    Twitter
    @Cynet360
    1,106 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    287 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cynet is the ultimate All-in-One Managed Cybersecurity Platform that delivers robust and comprehensive protection for small to medium enterprises (SMEs) while maximizing operational efficiency for man

Users
  • SOC Analyst
  • Technical Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 59% Mid-Market
  • 33% Small-Business
Cynet - All-in-One Cybersecurity Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
48
Security
39
Features
38
Threat Detection
38
Cybersecurity
28
Cons
UX Improvement
14
Missing Features
13
Slow Performance
12
Limited Features
11
Alert Issues
10
Cynet - All-in-One Cybersecurity Platform features and usability ratings that predict user satisfaction
8.7
Activity Monitoring
Average: 9.0
8.0
Data Examination
Average: 8.5
9.0
Ease of Use
Average: 8.6
7.7
Log Management
Average: 9.0
Seller Details
Seller
Cynet
Company Website
Year Founded
2014
HQ Location
Boston, MA
Twitter
@Cynet360
1,106 Twitter followers
LinkedIn® Page
www.linkedin.com
287 employees on LinkedIn®
(32)4.6 out of 5
2nd Easiest To Use in Security Information and Event Management (SIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Panther Labs was founded by a team of veteran security practitioners who faced the challenges of security operations at scale and set out to build a platform to solve them. The result is Panther, a re

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 66% Mid-Market
    • 22% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Panther Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detection Efficiency
    7
    Customer Support
    6
    Features
    6
    Ease of Use
    5
    Product Improvement
    5
    Cons
    Complex Configuration
    2
    Missing Features
    2
    Poor Interface Design
    2
    Slow Scanning
    2
    Update Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Panther features and usability ratings that predict user satisfaction
    9.2
    Activity Monitoring
    Average: 9.0
    9.5
    Data Examination
    Average: 8.5
    8.9
    Ease of Use
    Average: 8.6
    9.7
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    San Francisco, CA
    Twitter
    @runpanther
    4,484 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    259 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Panther Labs was founded by a team of veteran security practitioners who faced the challenges of security operations at scale and set out to build a platform to solve them. The result is Panther, a re

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 66% Mid-Market
  • 22% Enterprise
Panther Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detection Efficiency
7
Customer Support
6
Features
6
Ease of Use
5
Product Improvement
5
Cons
Complex Configuration
2
Missing Features
2
Poor Interface Design
2
Slow Scanning
2
Update Issues
2
Panther features and usability ratings that predict user satisfaction
9.2
Activity Monitoring
Average: 9.0
9.5
Data Examination
Average: 8.5
8.9
Ease of Use
Average: 8.6
9.7
Log Management
Average: 9.0
Seller Details
Year Founded
2018
HQ Location
San Francisco, CA
Twitter
@runpanther
4,484 Twitter followers
LinkedIn® Page
www.linkedin.com
259 employees on LinkedIn®
(43)4.7 out of 5
10th Easiest To Use in Security Information and Event Management (SIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 88% Small-Business
    • 12% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Todyl Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    26
    Customer Support
    24
    Features
    19
    Security
    16
    Cybersecurity
    13
    Cons
    Technical Issues
    7
    Integration Issues
    6
    Limited Features
    6
    Lacking Features
    5
    Pricing Issues
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Todyl Security Platform features and usability ratings that predict user satisfaction
    9.3
    Activity Monitoring
    Average: 9.0
    8.7
    Data Examination
    Average: 8.5
    8.5
    Ease of Use
    Average: 8.6
    9.1
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Todyl
    Company Website
    Year Founded
    2015
    HQ Location
    Denver, CO
    LinkedIn® Page
    www.linkedin.com
    136 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 88% Small-Business
  • 12% Mid-Market
Todyl Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
26
Customer Support
24
Features
19
Security
16
Cybersecurity
13
Cons
Technical Issues
7
Integration Issues
6
Limited Features
6
Lacking Features
5
Pricing Issues
5
Todyl Security Platform features and usability ratings that predict user satisfaction
9.3
Activity Monitoring
Average: 9.0
8.7
Data Examination
Average: 8.5
8.5
Ease of Use
Average: 8.6
9.1
Log Management
Average: 9.0
Seller Details
Seller
Todyl
Company Website
Year Founded
2015
HQ Location
Denver, CO
LinkedIn® Page
www.linkedin.com
136 employees on LinkedIn®
(419)4.3 out of 5
20th Easiest To Use in Security Information and Event Management (SIEM) software
View top Consulting Services for Splunk Enterprise
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Find out what is happening in your business and take meaningful action quickly with Splunk Enterprise. Automate the collection, indexing and alerting of machine data that's critical to your operations

    Users
    • Software Engineer
    • Senior Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 63% Enterprise
    • 26% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Splunk Enterprise Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    14
    Easy Integrations
    8
    Dashboard Usability
    6
    Data Visualization
    6
    Features
    6
    Cons
    Expensive
    10
    Pricing Issues
    9
    Complexity
    8
    Difficult Learning
    5
    Learning Curve
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Splunk Enterprise features and usability ratings that predict user satisfaction
    9.1
    Activity Monitoring
    Average: 9.0
    8.3
    Data Examination
    Average: 8.5
    8.1
    Ease of Use
    Average: 8.6
    9.2
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Find out what is happening in your business and take meaningful action quickly with Splunk Enterprise. Automate the collection, indexing and alerting of machine data that's critical to your operations

Users
  • Software Engineer
  • Senior Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 63% Enterprise
  • 26% Mid-Market
Splunk Enterprise Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
14
Easy Integrations
8
Dashboard Usability
6
Data Visualization
6
Features
6
Cons
Expensive
10
Pricing Issues
9
Complexity
8
Difficult Learning
5
Learning Curve
5
Splunk Enterprise features and usability ratings that predict user satisfaction
9.1
Activity Monitoring
Average: 9.0
8.3
Data Examination
Average: 8.5
8.1
Ease of Use
Average: 8.6
9.2
Log Management
Average: 9.0
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
(113)4.4 out of 5
14th Easiest To Use in Security Information and Event Management (SIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 62% Mid-Market
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AlienVault USM (from AT&T Cybersecurity) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Asset Management
    1
    Automation
    1
    Dashboard Usability
    1
    Integration Capabilities
    1
    Integrations
    1
    Cons
    Expensive
    1
    Licensing Cost
    1
    Licensing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AlienVault USM (from AT&T Cybersecurity) features and usability ratings that predict user satisfaction
    8.9
    Activity Monitoring
    Average: 9.0
    8.4
    Data Examination
    Average: 8.5
    8.3
    Ease of Use
    Average: 8.6
    8.9
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AT&T
    Year Founded
    1876
    HQ Location
    Dallas, TX
    Twitter
    @ATT
    890,284 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    178,523 employees on LinkedIn®
    Ownership
    NYSE: T
Product Description
How are these determined?Information
This description is provided by the seller.

AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 62% Mid-Market
  • 20% Small-Business
AlienVault USM (from AT&T Cybersecurity) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Asset Management
1
Automation
1
Dashboard Usability
1
Integration Capabilities
1
Integrations
1
Cons
Expensive
1
Licensing Cost
1
Licensing Issues
1
AlienVault USM (from AT&T Cybersecurity) features and usability ratings that predict user satisfaction
8.9
Activity Monitoring
Average: 9.0
8.4
Data Examination
Average: 8.5
8.3
Ease of Use
Average: 8.6
8.9
Log Management
Average: 9.0
Seller Details
Seller
AT&T
Year Founded
1876
HQ Location
Dallas, TX
Twitter
@ATT
890,284 Twitter followers
LinkedIn® Page
www.linkedin.com
178,523 employees on LinkedIn®
Ownership
NYSE: T
(342)4.3 out of 5
Optimized for quick response
21st Easiest To Use in Security Information and Event Management (SIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sumo Logic, Inc. unifies and analyzes enterprise data, translating it into actionable insights through one AI-powered cloud-native log analytics platform. This single source of truth enables Dev, Sec

    Users
    • Software Engineer
    • Senior Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 49% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sumo Logic Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    40
    Log Management
    23
    Monitoring
    23
    Real-time Monitoring
    21
    Easy Integrations
    19
    Cons
    Difficult Learning
    13
    Learning Curve
    10
    Learning Difficulty
    10
    UX Improvement
    9
    Expensive
    8
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sumo Logic features and usability ratings that predict user satisfaction
    9.2
    Activity Monitoring
    Average: 9.0
    8.8
    Data Examination
    Average: 8.5
    8.2
    Ease of Use
    Average: 8.6
    9.3
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2010
    HQ Location
    Redwood City, CA
    Twitter
    @SumoLogic
    6,569 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    935 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sumo Logic, Inc. unifies and analyzes enterprise data, translating it into actionable insights through one AI-powered cloud-native log analytics platform. This single source of truth enables Dev, Sec

Users
  • Software Engineer
  • Senior Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 49% Mid-Market
  • 40% Enterprise
Sumo Logic Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
40
Log Management
23
Monitoring
23
Real-time Monitoring
21
Easy Integrations
19
Cons
Difficult Learning
13
Learning Curve
10
Learning Difficulty
10
UX Improvement
9
Expensive
8
Sumo Logic features and usability ratings that predict user satisfaction
9.2
Activity Monitoring
Average: 9.0
8.8
Data Examination
Average: 8.5
8.2
Ease of Use
Average: 8.6
9.3
Log Management
Average: 9.0
Seller Details
Company Website
Year Founded
2010
HQ Location
Redwood City, CA
Twitter
@SumoLogic
6,569 Twitter followers
LinkedIn® Page
www.linkedin.com
935 employees on LinkedIn®
(13)4.7 out of 5
4th Easiest To Use in Security Information and Event Management (SIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Exabeam is SIEM that helps security operations and insider threat teams work smarter, allowing them to detect, investigate and respond to cyberattacks in 51 percent less time. Security organizations n

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 54% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Exabeam New-Scale Fusion Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Easy Integrations
    2
    Features
    2
    Integration Capabilities
    1
    Integrations
    1
    Cons
    Information Deficiency
    1
    Insufficient Detail
    1
    Not User-Friendly
    1
    Parsing Issues
    1
    Poor Interface Design
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Exabeam New-Scale Fusion features and usability ratings that predict user satisfaction
    9.0
    Activity Monitoring
    Average: 9.0
    9.2
    Data Examination
    Average: 8.5
    9.2
    Ease of Use
    Average: 8.6
    9.2
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Exabeam
    Year Founded
    2013
    HQ Location
    Foster City, US
    Twitter
    @exabeam
    5,344 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    943 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Exabeam is SIEM that helps security operations and insider threat teams work smarter, allowing them to detect, investigate and respond to cyberattacks in 51 percent less time. Security organizations n

Users
No information available
Industries
No information available
Market Segment
  • 54% Enterprise
  • 31% Mid-Market
Exabeam New-Scale Fusion Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Easy Integrations
2
Features
2
Integration Capabilities
1
Integrations
1
Cons
Information Deficiency
1
Insufficient Detail
1
Not User-Friendly
1
Parsing Issues
1
Poor Interface Design
1
Exabeam New-Scale Fusion features and usability ratings that predict user satisfaction
9.0
Activity Monitoring
Average: 9.0
9.2
Data Examination
Average: 8.5
9.2
Ease of Use
Average: 8.6
9.2
Log Management
Average: 9.0
Seller Details
Seller
Exabeam
Year Founded
2013
HQ Location
Foster City, US
Twitter
@exabeam
5,344 Twitter followers
LinkedIn® Page
www.linkedin.com
943 employees on LinkedIn®
(117)4.6 out of 5
Optimized for quick response
6th Easiest To Use in Security Information and Event Management (SIEM) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Blumira provides the only cybersecurity platform that can help SMBs prevent a breach. We help lean IT teams protect their organizations against ransomware and breaches with an open SIEM+XDR platfor

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 51% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Blumira Automated Detection & Response Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    20
    Customer Support
    17
    Setup Ease
    15
    Deployment Ease
    13
    Easy Setup
    12
    Cons
    Limited Customization
    7
    Expensive
    4
    Lack of Customization
    4
    Limited Reporting
    4
    Alert System
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Blumira Automated Detection & Response features and usability ratings that predict user satisfaction
    8.8
    Activity Monitoring
    Average: 9.0
    8.4
    Data Examination
    Average: 8.5
    9.0
    Ease of Use
    Average: 8.6
    8.8
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Blumira
    Company Website
    Year Founded
    2018
    HQ Location
    Ann Arbor, Michigan
    Twitter
    @blumira
    1 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    67 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Blumira provides the only cybersecurity platform that can help SMBs prevent a breach. We help lean IT teams protect their organizations against ransomware and breaches with an open SIEM+XDR platfor

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 51% Mid-Market
  • 38% Small-Business
Blumira Automated Detection & Response Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
20
Customer Support
17
Setup Ease
15
Deployment Ease
13
Easy Setup
12
Cons
Limited Customization
7
Expensive
4
Lack of Customization
4
Limited Reporting
4
Alert System
3
Blumira Automated Detection & Response features and usability ratings that predict user satisfaction
8.8
Activity Monitoring
Average: 9.0
8.4
Data Examination
Average: 8.5
9.0
Ease of Use
Average: 8.6
8.8
Log Management
Average: 9.0
Seller Details
Seller
Blumira
Company Website
Year Founded
2018
HQ Location
Ann Arbor, Michigan
Twitter
@blumira
1 Twitter followers
LinkedIn® Page
www.linkedin.com
67 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Securonix is working to radically transform all areas of data security with actionable security intelligence.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 54% Enterprise
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Securonix Security Operations and Analytics Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Dashboard Customization
    1
    Dashboard Design
    1
    Dashboard Usability
    1
    Detection Accuracy
    1
    Ease of Understanding
    1
    Cons
    Alerting Issues
    1
    Complex Querying
    1
    Inefficient Alerting
    1
    Logging Issues
    1
    Log Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Securonix Security Operations and Analytics Platform features and usability ratings that predict user satisfaction
    9.4
    Activity Monitoring
    Average: 9.0
    9.7
    Data Examination
    Average: 8.5
    8.5
    Ease of Use
    Average: 8.6
    9.2
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Securonix
    Year Founded
    2008
    HQ Location
    Addison, US
    Twitter
    @Securonix
    4,228 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    708 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Securonix is working to radically transform all areas of data security with actionable security intelligence.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 54% Enterprise
  • 31% Small-Business
Securonix Security Operations and Analytics Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Dashboard Customization
1
Dashboard Design
1
Dashboard Usability
1
Detection Accuracy
1
Ease of Understanding
1
Cons
Alerting Issues
1
Complex Querying
1
Inefficient Alerting
1
Logging Issues
1
Log Management
1
Securonix Security Operations and Analytics Platform features and usability ratings that predict user satisfaction
9.4
Activity Monitoring
Average: 9.0
9.7
Data Examination
Average: 8.5
8.5
Ease of Use
Average: 8.6
9.2
Log Management
Average: 9.0
Seller Details
Seller
Securonix
Year Founded
2008
HQ Location
Addison, US
Twitter
@Securonix
4,228 Twitter followers
LinkedIn® Page
www.linkedin.com
708 employees on LinkedIn®
(299)4.6 out of 5
Optimized for quick response
18th Easiest To Use in Security Information and Event Management (SIEM) software
Save to My Lists
Entry Level Price:$1.50
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Coralogix is a modern, full-stack observability platform transforming how businesses process and understand their data. Our unique architecture powers in-stream analytics without reliance on indexing

    Users
    • Software Engineer
    • DevOps Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 53% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Coralogix Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    82
    Log Management
    76
    Customer Support
    73
    User Interface
    57
    Features
    54
    Cons
    Missing Features
    30
    Difficult Learning
    22
    Learning Curve
    22
    Learning Difficulty
    22
    Poor UI
    22
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Coralogix features and usability ratings that predict user satisfaction
    8.6
    Activity Monitoring
    Average: 9.0
    8.5
    Data Examination
    Average: 8.5
    8.8
    Ease of Use
    Average: 8.6
    9.0
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Coralogix
    Company Website
    Year Founded
    2014
    HQ Location
    San Francisco, CA
    Twitter
    @Coralogix
    4,081 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    472 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Coralogix is a modern, full-stack observability platform transforming how businesses process and understand their data. Our unique architecture powers in-stream analytics without reliance on indexing

Users
  • Software Engineer
  • DevOps Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 53% Mid-Market
  • 33% Enterprise
Coralogix Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
82
Log Management
76
Customer Support
73
User Interface
57
Features
54
Cons
Missing Features
30
Difficult Learning
22
Learning Curve
22
Learning Difficulty
22
Poor UI
22
Coralogix features and usability ratings that predict user satisfaction
8.6
Activity Monitoring
Average: 9.0
8.5
Data Examination
Average: 8.5
8.8
Ease of Use
Average: 8.6
9.0
Log Management
Average: 9.0
Seller Details
Seller
Coralogix
Company Website
Year Founded
2014
HQ Location
San Francisco, CA
Twitter
@Coralogix
4,081 Twitter followers
LinkedIn® Page
www.linkedin.com
472 employees on LinkedIn®
(39)4.3 out of 5
25th Easiest To Use in Security Information and Event Management (SIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The complexity of managing network and security operations is resulting in increases in breaches worldwide. Discovery, isolation, and remediation of these incidents are measured in hundreds of days.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 46% Mid-Market
    • 31% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FortiSIEM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    4
    Features
    4
    Reporting
    4
    Threat Detection
    4
    Cybersecurity
    3
    Cons
    Expensive
    4
    Compatibility Issues
    2
    Poor Customer Support
    2
    UX Improvement
    2
    Complex Configuration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiSIEM features and usability ratings that predict user satisfaction
    8.6
    Activity Monitoring
    Average: 9.0
    7.9
    Data Examination
    Average: 8.5
    8.6
    Ease of Use
    Average: 8.6
    8.6
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,611 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,832 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

The complexity of managing network and security operations is resulting in increases in breaches worldwide. Discovery, isolation, and remediation of these incidents are measured in hundreds of days.

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 46% Mid-Market
  • 31% Enterprise
FortiSIEM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
4
Features
4
Reporting
4
Threat Detection
4
Cybersecurity
3
Cons
Expensive
4
Compatibility Issues
2
Poor Customer Support
2
UX Improvement
2
Complex Configuration
1
FortiSIEM features and usability ratings that predict user satisfaction
8.6
Activity Monitoring
Average: 9.0
7.9
Data Examination
Average: 8.5
8.6
Ease of Use
Average: 8.6
8.6
Log Management
Average: 9.0
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,611 Twitter followers
LinkedIn® Page
www.linkedin.com
14,832 employees on LinkedIn®
Ownership
NASDAQ: FTNT
(69)4.4 out of 5
11th Easiest To Use in Security Information and Event Management (SIEM) software
Save to My Lists
Entry Level Price:$2,156 Per Month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Rapid7 InsightIDR is a SaaS SIEM for modern threat detection and response. InsightIDR enables security analysts to work more efficiently and effectively, by unifying diverse data sources, providing ea

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 67% Mid-Market
    • 30% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • InsightIDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Centralized Management
    1
    Dashboard Customization
    1
    Dashboard Design
    1
    Dashboard Usability
    1
    Easy Integrations
    1
    Cons
    Cloud Dependency
    1
    Cost
    1
    Expensive
    1
    High Resource Usage
    1
    Inadequate Monitoring
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • InsightIDR features and usability ratings that predict user satisfaction
    9.2
    Activity Monitoring
    Average: 9.0
    8.5
    Data Examination
    Average: 8.5
    9.0
    Ease of Use
    Average: 8.6
    9.1
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rapid7
    Year Founded
    2000
    HQ Location
    Boston, MA
    Twitter
    @rapid7
    122,406 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,075 employees on LinkedIn®
    Ownership
    NASDAQ:RPD
Product Description
How are these determined?Information
This description is provided by the seller.

Rapid7 InsightIDR is a SaaS SIEM for modern threat detection and response. InsightIDR enables security analysts to work more efficiently and effectively, by unifying diverse data sources, providing ea

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 67% Mid-Market
  • 30% Enterprise
InsightIDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Centralized Management
1
Dashboard Customization
1
Dashboard Design
1
Dashboard Usability
1
Easy Integrations
1
Cons
Cloud Dependency
1
Cost
1
Expensive
1
High Resource Usage
1
Inadequate Monitoring
1
InsightIDR features and usability ratings that predict user satisfaction
9.2
Activity Monitoring
Average: 9.0
8.5
Data Examination
Average: 8.5
9.0
Ease of Use
Average: 8.6
9.1
Log Management
Average: 9.0
Seller Details
Seller
Rapid7
Year Founded
2000
HQ Location
Boston, MA
Twitter
@rapid7
122,406 Twitter followers
LinkedIn® Page
www.linkedin.com
3,075 employees on LinkedIn®
Ownership
NASDAQ:RPD
(151)4.2 out of 5
23rd Easiest To Use in Security Information and Event Management (SIEM) software
View top Consulting Services for LogRhythm SIEM
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LogRhythm empowers more than 4,000 customers across the globe to measurably mature their security operations program. LogRhythm's award-winning LogRhythm SIEM platform delivers comprehensive security

    Users
    • Information Security Analyst
    • Cyber Security Analyst
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 40% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • LogRhythm SIEM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    This product has not yet received any positive sentiments.
    Cons
    Confusing Documentation
    1
    Insufficient Information
    1
    Limited Information
    1
    Log Management
    1
    Software Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LogRhythm SIEM features and usability ratings that predict user satisfaction
    8.9
    Activity Monitoring
    Average: 9.0
    8.4
    Data Examination
    Average: 8.5
    8.3
    Ease of Use
    Average: 8.6
    9.0
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Exabeam
    Year Founded
    2013
    HQ Location
    Foster City, US
    Twitter
    @exabeam
    5,344 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    943 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LogRhythm empowers more than 4,000 customers across the globe to measurably mature their security operations program. LogRhythm's award-winning LogRhythm SIEM platform delivers comprehensive security

Users
  • Information Security Analyst
  • Cyber Security Analyst
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 40% Enterprise
  • 40% Mid-Market
LogRhythm SIEM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
This product has not yet received any positive sentiments.
Cons
Confusing Documentation
1
Insufficient Information
1
Limited Information
1
Log Management
1
Software Performance
1
LogRhythm SIEM features and usability ratings that predict user satisfaction
8.9
Activity Monitoring
Average: 9.0
8.4
Data Examination
Average: 8.5
8.3
Ease of Use
Average: 8.6
9.0
Log Management
Average: 9.0
Seller Details
Seller
Exabeam
Year Founded
2013
HQ Location
Foster City, US
Twitter
@exabeam
5,344 Twitter followers
LinkedIn® Page
www.linkedin.com
943 employees on LinkedIn®
(54)4.7 out of 5
5th Easiest To Use in Security Information and Event Management (SIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Logsign Unified SO Platform integrates next-gen SIEM, threat intelligence, UEBA, and SOAR and empowers organizations to optimize and streamline their cybersecurity operations. In addition to that, the

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 50% Mid-Market
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Logsign Unified SO Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    2
    Customer Support
    1
    Dashboard Usability
    1
    Data Management
    1
    Ease of Use
    1
    Cons
    Log Management
    2
    Alert Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Logsign Unified SO Platform features and usability ratings that predict user satisfaction
    9.1
    Activity Monitoring
    Average: 9.0
    8.7
    Data Examination
    Average: 8.5
    9.6
    Ease of Use
    Average: 8.6
    9.6
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Logsign
    Year Founded
    2010
    HQ Location
    Hague, Netherlands, NL
    Twitter
    @logsign
    379 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    47 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Logsign Unified SO Platform integrates next-gen SIEM, threat intelligence, UEBA, and SOAR and empowers organizations to optimize and streamline their cybersecurity operations. In addition to that, the

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 50% Mid-Market
  • 31% Small-Business
Logsign Unified SO Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
2
Customer Support
1
Dashboard Usability
1
Data Management
1
Ease of Use
1
Cons
Log Management
2
Alert Management
1
Logsign Unified SO Platform features and usability ratings that predict user satisfaction
9.1
Activity Monitoring
Average: 9.0
8.7
Data Examination
Average: 8.5
9.6
Ease of Use
Average: 8.6
9.6
Log Management
Average: 9.0
Seller Details
Seller
Logsign
Year Founded
2010
HQ Location
Hague, Netherlands, NL
Twitter
@logsign
379 Twitter followers
LinkedIn® Page
www.linkedin.com
47 employees on LinkedIn®
(13)4.2 out of 5
19th Easiest To Use in Security Information and Event Management (SIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Juniper Secure Analytics monitors security information and events in near real time.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 46% Enterprise
    • 31% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Juniper Secure Analytics features and usability ratings that predict user satisfaction
    9.6
    Activity Monitoring
    Average: 9.0
    10.0
    Data Examination
    Average: 8.5
    9.1
    Ease of Use
    Average: 8.6
    9.2
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1996
    HQ Location
    Sunnyvale, CA
    Twitter
    @JuniperNetworks
    105,379 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11,845 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Juniper Secure Analytics monitors security information and events in near real time.

Users
No information available
Industries
No information available
Market Segment
  • 46% Enterprise
  • 31% Mid-Market
Juniper Secure Analytics features and usability ratings that predict user satisfaction
9.6
Activity Monitoring
Average: 9.0
10.0
Data Examination
Average: 8.5
9.1
Ease of Use
Average: 8.6
9.2
Log Management
Average: 9.0
Seller Details
Year Founded
1996
HQ Location
Sunnyvale, CA
Twitter
@JuniperNetworks
105,379 Twitter followers
LinkedIn® Page
www.linkedin.com
11,845 employees on LinkedIn®
(89)4.3 out of 5
24th Easiest To Use in Security Information and Event Management (SIEM) software
Save to My Lists
Entry Level Price:Starting at €1.67
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Logpoint is a comprehensive cybersecurity solution designed specifically for Managed Security Service Providers (MSSPs) and Critical National Infrastructure Providers (CNI). This platform enables orga

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 29% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Logpoint Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Learning
    1
    Ease of Management
    1
    Ease of Use
    1
    Easy Integrations
    1
    Implementation Ease
    1
    Cons
    Expensive
    1
    Information Deficiency
    1
    Lack of Features
    1
    Limited Accessibility
    1
    Limited Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Logpoint features and usability ratings that predict user satisfaction
    8.2
    Activity Monitoring
    Average: 9.0
    8.0
    Data Examination
    Average: 8.5
    8.1
    Ease of Use
    Average: 8.6
    8.7
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Logpoint
    Company Website
    Year Founded
    2001
    HQ Location
    Copenhagen, Capital Region
    Twitter
    @LogPointSIEM
    996 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    266 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Logpoint is a comprehensive cybersecurity solution designed specifically for Managed Security Service Providers (MSSPs) and Critical National Infrastructure Providers (CNI). This platform enables orga

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 29% Small-Business
Logpoint Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Learning
1
Ease of Management
1
Ease of Use
1
Easy Integrations
1
Implementation Ease
1
Cons
Expensive
1
Information Deficiency
1
Lack of Features
1
Limited Accessibility
1
Limited Features
1
Logpoint features and usability ratings that predict user satisfaction
8.2
Activity Monitoring
Average: 9.0
8.0
Data Examination
Average: 8.5
8.1
Ease of Use
Average: 8.6
8.7
Log Management
Average: 9.0
Seller Details
Seller
Logpoint
Company Website
Year Founded
2001
HQ Location
Copenhagen, Capital Region
Twitter
@LogPointSIEM
996 Twitter followers
LinkedIn® Page
www.linkedin.com
266 employees on LinkedIn®
(33)3.8 out of 5
31st Easiest To Use in Security Information and Event Management (SIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Alienvault OSSIM is an open source SIEM tool that contribute and receive real-time information about malicious hosts to help user increase security visibility and control in network.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 39% Enterprise
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OSSIM (Open Source) features and usability ratings that predict user satisfaction
    8.6
    Activity Monitoring
    Average: 9.0
    7.3
    Data Examination
    Average: 8.5
    7.7
    Ease of Use
    Average: 8.6
    8.3
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AT&T
    Year Founded
    1876
    HQ Location
    Dallas, TX
    Twitter
    @ATT
    890,284 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    178,523 employees on LinkedIn®
    Ownership
    NYSE: T
Product Description
How are these determined?Information
This description is provided by the seller.

Alienvault OSSIM is an open source SIEM tool that contribute and receive real-time information about malicious hosts to help user increase security visibility and control in network.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 39% Enterprise
  • 33% Small-Business
OSSIM (Open Source) features and usability ratings that predict user satisfaction
8.6
Activity Monitoring
Average: 9.0
7.3
Data Examination
Average: 8.5
7.7
Ease of Use
Average: 8.6
8.3
Log Management
Average: 9.0
Seller Details
Seller
AT&T
Year Founded
1876
HQ Location
Dallas, TX
Twitter
@ATT
890,284 Twitter followers
LinkedIn® Page
www.linkedin.com
178,523 employees on LinkedIn®
Ownership
NYSE: T
(18)4.3 out of 5
22nd Easiest To Use in Security Information and Event Management (SIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Designed for MPS, ConnectWise SIEM is a cutting-edge platform that harnesses the power of advanced security information and event management (SIEM) to provide unparalleled visibility and protection fo

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Mid-Market
    • 39% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ConnectWise SIEM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    2
    Features
    2
    Detection Efficiency
    1
    Implementation Ease
    1
    Integrations
    1
    Cons
    Poor Customer Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ConnectWise SIEM features and usability ratings that predict user satisfaction
    8.8
    Activity Monitoring
    Average: 9.0
    8.3
    Data Examination
    Average: 8.5
    8.2
    Ease of Use
    Average: 8.6
    8.8
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1982
    HQ Location
    Tampa, FL
    Twitter
    @ConnectWise
    14,998 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,224 employees on LinkedIn®
    Phone
    800-671-6898
Product Description
How are these determined?Information
This description is provided by the seller.

Designed for MPS, ConnectWise SIEM is a cutting-edge platform that harnesses the power of advanced security information and event management (SIEM) to provide unparalleled visibility and protection fo

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Mid-Market
  • 39% Small-Business
ConnectWise SIEM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
2
Features
2
Detection Efficiency
1
Implementation Ease
1
Integrations
1
Cons
Poor Customer Support
1
ConnectWise SIEM features and usability ratings that predict user satisfaction
8.8
Activity Monitoring
Average: 9.0
8.3
Data Examination
Average: 8.5
8.2
Ease of Use
Average: 8.6
8.8
Log Management
Average: 9.0
Seller Details
Year Founded
1982
HQ Location
Tampa, FL
Twitter
@ConnectWise
14,998 Twitter followers
LinkedIn® Page
www.linkedin.com
3,224 employees on LinkedIn®
Phone
800-671-6898
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Advanced Security Manager is a computer security software that secures information from unwanted intruders in a computer.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 52% Enterprise
    • 43% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Security Manager features and usability ratings that predict user satisfaction
    8.5
    Activity Monitoring
    Average: 9.0
    8.0
    Data Examination
    Average: 8.5
    8.8
    Ease of Use
    Average: 8.6
    8.6
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Advanced Security Manager is a computer security software that secures information from unwanted intruders in a computer.

Users
No information available
Industries
No information available
Market Segment
  • 52% Enterprise
  • 43% Mid-Market
Cisco Security Manager features and usability ratings that predict user satisfaction
8.5
Activity Monitoring
Average: 9.0
8.0
Data Examination
Average: 8.5
8.8
Ease of Use
Average: 8.6
8.6
Log Management
Average: 9.0
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BluSapphire is a comprehensive cyber defense platform crafted meticulously from the ground up by BluSapphire Labs. Each aspect of our platform embodies innovation without reliance on third-party tools

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BluSapphire XDR Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Detection
    9
    Easy Integrations
    7
    Customer Support
    6
    Features
    6
    Ease of Use
    5
    Cons
    Difficult Learning
    3
    Learning Curve
    3
    Difficult Navigation
    2
    Pricing Issues
    2
    Communication Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BluSapphire XDR Platform features and usability ratings that predict user satisfaction
    9.0
    Activity Monitoring
    Average: 9.0
    8.8
    Data Examination
    Average: 8.5
    8.8
    Ease of Use
    Average: 8.6
    9.0
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Hyderabad, Telegana
    Twitter
    @BluSapphire_net
    124 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    94 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BluSapphire is a comprehensive cyber defense platform crafted meticulously from the ground up by BluSapphire Labs. Each aspect of our platform embodies innovation without reliance on third-party tools

Users
No information available
Industries
No information available
Market Segment
  • 40% Mid-Market
  • 33% Enterprise
BluSapphire XDR Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Detection
9
Easy Integrations
7
Customer Support
6
Features
6
Ease of Use
5
Cons
Difficult Learning
3
Learning Curve
3
Difficult Navigation
2
Pricing Issues
2
Communication Issues
1
BluSapphire XDR Platform features and usability ratings that predict user satisfaction
9.0
Activity Monitoring
Average: 9.0
8.8
Data Examination
Average: 8.5
8.8
Ease of Use
Average: 8.6
9.0
Log Management
Average: 9.0
Seller Details
Year Founded
2017
HQ Location
Hyderabad, Telegana
Twitter
@BluSapphire_net
124 Twitter followers
LinkedIn® Page
www.linkedin.com
94 employees on LinkedIn®
(54)4.7 out of 5
Optimized for quick response
17th Easiest To Use in Security Information and Event Management (SIEM) software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Adlumin, an N-able Company, provides enterprise-grade cybersecurity for organizations of all sizes through its innovative Security Operations as a Service platform. With an agnostic approach, the Adlu

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 63% Mid-Market
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Adlumin Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    14
    Ease of Use
    14
    Features
    14
    Visibility
    10
    Cybersecurity
    9
    Cons
    False Positives
    4
    Inefficient Alerting
    3
    Inefficient Alert System
    3
    Information Management
    3
    Insufficient Detail
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Adlumin features and usability ratings that predict user satisfaction
    9.4
    Activity Monitoring
    Average: 9.0
    8.8
    Data Examination
    Average: 8.5
    9.2
    Ease of Use
    Average: 8.6
    9.2
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    N-able
    Company Website
    HQ Location
    Morrisville, North Carolina
    Twitter
    @Nable
    16,217 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,892 employees on LinkedIn®
    Ownership
    NYSE: NABL
Product Description
How are these determined?Information
This description is provided by the seller.

Adlumin, an N-able Company, provides enterprise-grade cybersecurity for organizations of all sizes through its innovative Security Operations as a Service platform. With an agnostic approach, the Adlu

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 63% Mid-Market
  • 20% Small-Business
Adlumin Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
14
Ease of Use
14
Features
14
Visibility
10
Cybersecurity
9
Cons
False Positives
4
Inefficient Alerting
3
Inefficient Alert System
3
Information Management
3
Insufficient Detail
3
Adlumin features and usability ratings that predict user satisfaction
9.4
Activity Monitoring
Average: 9.0
8.8
Data Examination
Average: 8.5
9.2
Ease of Use
Average: 8.6
9.2
Log Management
Average: 9.0
Seller Details
Seller
N-able
Company Website
HQ Location
Morrisville, North Carolina
Twitter
@Nable
16,217 Twitter followers
LinkedIn® Page
www.linkedin.com
1,892 employees on LinkedIn®
Ownership
NYSE: NABL
(41)4.7 out of 5
12th Easiest To Use in Security Information and Event Management (SIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    EventSentry is a hybrid Security Information and Event Management (SIEM) solution designed to assist users in monitoring and managing their IT infrastructure effectively. By combining real-time event

    Users
    No information available
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 49% Mid-Market
    • 32% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • EventSentry Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerting System
    2
    Ease of Use
    2
    Insights
    2
    User Interface
    2
    Visibility
    2
    Cons
    Complex Configuration
    2
    Alert Management
    1
    Complexity
    1
    Dashboard Issues
    1
    Inefficient Alert System
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • EventSentry features and usability ratings that predict user satisfaction
    9.0
    Activity Monitoring
    Average: 9.0
    8.8
    Data Examination
    Average: 8.5
    9.1
    Ease of Use
    Average: 8.6
    9.3
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2002
    HQ Location
    Chicago, Illinois
    Twitter
    @netikus
    978 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

EventSentry is a hybrid Security Information and Event Management (SIEM) solution designed to assist users in monitoring and managing their IT infrastructure effectively. By combining real-time event

Users
No information available
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 49% Mid-Market
  • 32% Small-Business
EventSentry Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerting System
2
Ease of Use
2
Insights
2
User Interface
2
Visibility
2
Cons
Complex Configuration
2
Alert Management
1
Complexity
1
Dashboard Issues
1
Inefficient Alert System
1
EventSentry features and usability ratings that predict user satisfaction
9.0
Activity Monitoring
Average: 9.0
8.8
Data Examination
Average: 8.5
9.1
Ease of Use
Average: 8.6
9.3
Log Management
Average: 9.0
Seller Details
Company Website
Year Founded
2002
HQ Location
Chicago, Illinois
Twitter
@netikus
978 Twitter followers
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
(26)4.5 out of 5
16th Easiest To Use in Security Information and Event Management (SIEM) software
Save to My Lists
Entry Level Price:Starting at $595.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ADAudit Plus is a UBA-driven auditor that helps keep your AD, Azure AD, file systems (including Windows, NetApp, EMC, Synology, Hitachi, and Huawei), Windows servers, and workstations secure and compl

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 54% Enterprise
    • 38% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManageEngine ADAudit Plus features and usability ratings that predict user satisfaction
    8.3
    Activity Monitoring
    Average: 9.0
    7.8
    Data Examination
    Average: 8.5
    8.5
    Ease of Use
    Average: 8.6
    7.8
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Del Valle, Texas
    Twitter
    @manageengine
    7,677 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    464 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ADAudit Plus is a UBA-driven auditor that helps keep your AD, Azure AD, file systems (including Windows, NetApp, EMC, Synology, Hitachi, and Huawei), Windows servers, and workstations secure and compl

Users
No information available
Industries
No information available
Market Segment
  • 54% Enterprise
  • 38% Mid-Market
ManageEngine ADAudit Plus features and usability ratings that predict user satisfaction
8.3
Activity Monitoring
Average: 9.0
7.8
Data Examination
Average: 8.5
8.5
Ease of Use
Average: 8.6
7.8
Log Management
Average: 9.0
Seller Details
Year Founded
2002
HQ Location
Del Valle, Texas
Twitter
@manageengine
7,677 Twitter followers
LinkedIn® Page
www.linkedin.com
464 employees on LinkedIn®
(75)4.0 out of 5
26th Easiest To Use in Security Information and Event Management (SIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Security Event Manager (SEM) is an ACTIVE monitoring SIEM solution that automatically detects, alerts and responds to suspicious behavior on multi-vendor network devices, servers, workstations and app

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 52% Enterprise
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SolarWinds Security Observability Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    1
    Detection Efficiency
    1
    Ease of Use
    1
    Cons
    Licensing Cost
    1
    Poor Customer Support
    1
    Poor UI
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SolarWinds Security Observability features and usability ratings that predict user satisfaction
    9.2
    Activity Monitoring
    Average: 9.0
    8.5
    Data Examination
    Average: 8.5
    8.2
    Ease of Use
    Average: 8.6
    8.9
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1999
    HQ Location
    Austin, TX
    Twitter
    @solarwinds
    19,827 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,713 employees on LinkedIn®
    Ownership
    NYSE: SWI
Product Description
How are these determined?Information
This description is provided by the seller.

Security Event Manager (SEM) is an ACTIVE monitoring SIEM solution that automatically detects, alerts and responds to suspicious behavior on multi-vendor network devices, servers, workstations and app

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 52% Enterprise
  • 39% Mid-Market
SolarWinds Security Observability Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
1
Detection Efficiency
1
Ease of Use
1
Cons
Licensing Cost
1
Poor Customer Support
1
Poor UI
1
SolarWinds Security Observability features and usability ratings that predict user satisfaction
9.2
Activity Monitoring
Average: 9.0
8.5
Data Examination
Average: 8.5
8.2
Ease of Use
Average: 8.6
8.9
Log Management
Average: 9.0
Seller Details
Year Founded
1999
HQ Location
Austin, TX
Twitter
@solarwinds
19,827 Twitter followers
LinkedIn® Page
www.linkedin.com
2,713 employees on LinkedIn®
Ownership
NYSE: SWI
(171)4.5 out of 5
29th Easiest To Use in Security Information and Event Management (SIEM) software
Save to My Lists
Entry Level Price:Starting at $0.10
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Logz.io is an AI-powered observability platform designed to help teams solve critical log management, monitoring, and troubleshooting challenges. Built for modern environments, Logz.io unifies log man

    Users
    • Software Engineer
    • Software Developer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 53% Mid-Market
    • 30% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Logz.io Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Log Management
    15
    User Interface
    12
    Easy Integrations
    10
    Customer Support
    8
    Cons
    Expensive
    8
    Log Management
    6
    Log Management Issues
    6
    Pricing Issues
    5
    Billing Issues
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Logz.io features and usability ratings that predict user satisfaction
    8.8
    Activity Monitoring
    Average: 9.0
    8.5
    Data Examination
    Average: 8.5
    8.8
    Ease of Use
    Average: 8.6
    8.7
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Logz.io
    Year Founded
    2014
    HQ Location
    Boston, MA
    Twitter
    @logzio
    3,222 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    158 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Logz.io is an AI-powered observability platform designed to help teams solve critical log management, monitoring, and troubleshooting challenges. Built for modern environments, Logz.io unifies log man

Users
  • Software Engineer
  • Software Developer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 53% Mid-Market
  • 30% Small-Business
Logz.io Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Log Management
15
User Interface
12
Easy Integrations
10
Customer Support
8
Cons
Expensive
8
Log Management
6
Log Management Issues
6
Pricing Issues
5
Billing Issues
4
Logz.io features and usability ratings that predict user satisfaction
8.8
Activity Monitoring
Average: 9.0
8.5
Data Examination
Average: 8.5
8.8
Ease of Use
Average: 8.6
8.7
Log Management
Average: 9.0
Seller Details
Seller
Logz.io
Year Founded
2014
HQ Location
Boston, MA
Twitter
@logzio
3,222 Twitter followers
LinkedIn® Page
www.linkedin.com
158 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fluency is a next-generation Security Information and Event Management (SIEM) solution designed to help organizations enhance their cybersecurity posture through real-time threat detection and respons

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 53% Mid-Market
    • 27% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Fluency SIEM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Cybersecurity
    1
    Machine Learning
    1
    Robust Support
    1
    Search Efficiency
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fluency SIEM features and usability ratings that predict user satisfaction
    10.0
    Activity Monitoring
    Average: 9.0
    9.5
    Data Examination
    Average: 8.5
    8.0
    Ease of Use
    Average: 8.6
    10.0
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Greenbelt, Maryland
    Twitter
    @fluencysecurity
    200 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Fluency is a next-generation Security Information and Event Management (SIEM) solution designed to help organizations enhance their cybersecurity posture through real-time threat detection and respons

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 53% Mid-Market
  • 27% Small-Business
Fluency SIEM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Cybersecurity
1
Machine Learning
1
Robust Support
1
Search Efficiency
1
Cons
This product has not yet received any negative sentiments.
Fluency SIEM features and usability ratings that predict user satisfaction
10.0
Activity Monitoring
Average: 9.0
9.5
Data Examination
Average: 8.5
8.0
Ease of Use
Average: 8.6
10.0
Log Management
Average: 9.0
Seller Details
Company Website
Year Founded
2013
HQ Location
Greenbelt, Maryland
Twitter
@fluencysecurity
200 Twitter followers
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®
(116)4.4 out of 5
27th Easiest To Use in Security Information and Event Management (SIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Graylog elevates cybersecurity and IT operations through its comprehensive SIEM, Centralized Log Management, and API Security solutions. Graylog provides the edge in Threat Detection & Incident Re

    Users
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 44% Mid-Market
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Graylog Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Deployment Ease
    1
    Ease of Use
    1
    Installation Ease
    1
    Log Management
    1
    Cons
    Dashboard Issues
    1
    Difficult Navigation
    1
    Filtering Issues
    1
    Search Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Graylog features and usability ratings that predict user satisfaction
    8.7
    Activity Monitoring
    Average: 9.0
    8.3
    Data Examination
    Average: 8.5
    8.5
    Ease of Use
    Average: 8.6
    9.1
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Graylog
    Year Founded
    2009
    HQ Location
    Houston, US
    Twitter
    @graylog2
    9,222 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    131 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Graylog elevates cybersecurity and IT operations through its comprehensive SIEM, Centralized Log Management, and API Security solutions. Graylog provides the edge in Threat Detection & Incident Re

Users
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 44% Mid-Market
  • 31% Small-Business
Graylog Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Deployment Ease
1
Ease of Use
1
Installation Ease
1
Log Management
1
Cons
Dashboard Issues
1
Difficult Navigation
1
Filtering Issues
1
Search Issues
1
Graylog features and usability ratings that predict user satisfaction
8.7
Activity Monitoring
Average: 9.0
8.3
Data Examination
Average: 8.5
8.5
Ease of Use
Average: 8.6
9.1
Log Management
Average: 9.0
Seller Details
Seller
Graylog
Year Founded
2009
HQ Location
Houston, US
Twitter
@graylog2
9,222 Twitter followers
LinkedIn® Page
www.linkedin.com
131 employees on LinkedIn®
(17)3.7 out of 5
30th Easiest To Use in Security Information and Event Management (SIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ArcSight Enterprise Security Manager (ESM) is a comprehensive threat detection, analysis, triage, and compliance management SIEM platform that dramatically reduces the time to mitigate cyber-security

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 53% Mid-Market
    • 29% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OpenText ArcSight Enterprise Security Manager (ESM) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Customization
    1
    Easy Integrations
    1
    Implementation Ease
    1
    User Interface
    1
    Cons
    Complex Implementation
    1
    Expensive
    1
    Training Required
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenText ArcSight Enterprise Security Manager (ESM) features and usability ratings that predict user satisfaction
    9.0
    Activity Monitoring
    Average: 9.0
    8.8
    Data Examination
    Average: 8.5
    7.9
    Ease of Use
    Average: 8.6
    8.5
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenText
    Year Founded
    1991
    HQ Location
    Waterloo, ON
    Twitter
    @OpenText
    21,716 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22,403 employees on LinkedIn®
    Ownership
    NASDAQ:OTEX
Product Description
How are these determined?Information
This description is provided by the seller.

ArcSight Enterprise Security Manager (ESM) is a comprehensive threat detection, analysis, triage, and compliance management SIEM platform that dramatically reduces the time to mitigate cyber-security

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 53% Mid-Market
  • 29% Enterprise
OpenText ArcSight Enterprise Security Manager (ESM) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Customization
1
Easy Integrations
1
Implementation Ease
1
User Interface
1
Cons
Complex Implementation
1
Expensive
1
Training Required
1
OpenText ArcSight Enterprise Security Manager (ESM) features and usability ratings that predict user satisfaction
9.0
Activity Monitoring
Average: 9.0
8.8
Data Examination
Average: 8.5
7.9
Ease of Use
Average: 8.6
8.5
Log Management
Average: 9.0
Seller Details
Seller
OpenText
Year Founded
1991
HQ Location
Waterloo, ON
Twitter
@OpenText
21,716 Twitter followers
LinkedIn® Page
www.linkedin.com
22,403 employees on LinkedIn®
Ownership
NASDAQ:OTEX
(22)3.9 out of 5
28th Easiest To Use in Security Information and Event Management (SIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NetWitness is a comprehensive threat detection, investigation and response platform that combines visibility, analytics, insight, and automation into a single solution. It collects and analyzes data a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Enterprise
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • NetWitness Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Investigation
    1
    Threat Detection
    1
    Cons
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NetWitness Platform features and usability ratings that predict user satisfaction
    8.3
    Activity Monitoring
    Average: 9.0
    8.3
    Data Examination
    Average: 8.5
    7.5
    Ease of Use
    Average: 8.6
    8.6
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1997
    HQ Location
    Bedford, MA
    Twitter
    @Netwitness
    1,639 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    230 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NetWitness is a comprehensive threat detection, investigation and response platform that combines visibility, analytics, insight, and automation into a single solution. It collects and analyzes data a

Users
No information available
Industries
No information available
Market Segment
  • 55% Enterprise
  • 32% Mid-Market
NetWitness Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Investigation
1
Threat Detection
1
Cons
Integration Issues
1
NetWitness Platform features and usability ratings that predict user satisfaction
8.3
Activity Monitoring
Average: 9.0
8.3
Data Examination
Average: 8.5
7.5
Ease of Use
Average: 8.6
8.6
Log Management
Average: 9.0
Seller Details
Year Founded
1997
HQ Location
Bedford, MA
Twitter
@Netwitness
1,639 Twitter followers
LinkedIn® Page
www.linkedin.com
230 employees on LinkedIn®
(38)4.1 out of 5
32nd Easiest To Use in Security Information and Event Management (SIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trellix Enterprise Security Manager, a core Trellix SIEM solution, delivers performance, actionable intelligence, and solution integration at the speed and scale required for your security organizatio

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 42% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Trellix Enterprise Security Manager Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Log Management
    3
    Response Time
    2
    Dashboard Customization
    1
    Dashboard Usability
    1
    Debugging
    1
    Cons
    Expensive
    2
    Complex Configuration
    1
    Difficult Customization
    1
    Difficult Navigation
    1
    Faulty Detection
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trellix Enterprise Security Manager features and usability ratings that predict user satisfaction
    7.9
    Activity Monitoring
    Average: 9.0
    8.1
    Data Examination
    Average: 8.5
    8.1
    Ease of Use
    Average: 8.6
    8.1
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trellix
    Year Founded
    2004
    HQ Location
    Milpitas, CA
    Twitter
    @Trellix
    250,269 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    826 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trellix Enterprise Security Manager, a core Trellix SIEM solution, delivers performance, actionable intelligence, and solution integration at the speed and scale required for your security organizatio

Users
No information available
Industries
No information available
Market Segment
  • 42% Enterprise
  • 29% Mid-Market
Trellix Enterprise Security Manager Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Log Management
3
Response Time
2
Dashboard Customization
1
Dashboard Usability
1
Debugging
1
Cons
Expensive
2
Complex Configuration
1
Difficult Customization
1
Difficult Navigation
1
Faulty Detection
1
Trellix Enterprise Security Manager features and usability ratings that predict user satisfaction
7.9
Activity Monitoring
Average: 9.0
8.1
Data Examination
Average: 8.5
8.1
Ease of Use
Average: 8.6
8.1
Log Management
Average: 9.0
Seller Details
Seller
Trellix
Year Founded
2004
HQ Location
Milpitas, CA
Twitter
@Trellix
250,269 Twitter followers
LinkedIn® Page
www.linkedin.com
826 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SmartEvent event management provides full threat visibility with a single view into security risks. Take control and command the security event through real-time forensic and event investigation, comp

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 17% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SmartEvent Event Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Reporting
    2
    Reporting Ease
    2
    Threat Detection
    2
    Customization
    1
    Features
    1
    Cons
    Difficult Learning
    2
    Deployment Difficulties
    1
    Learning Curve
    1
    Licensing Cost
    1
    Licensing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SmartEvent Event Management features and usability ratings that predict user satisfaction
    8.0
    Activity Monitoring
    Average: 9.0
    7.9
    Data Examination
    Average: 8.5
    8.9
    Ease of Use
    Average: 8.6
    8.3
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

SmartEvent event management provides full threat visibility with a single view into security risks. Take control and command the security event through real-time forensic and event investigation, comp

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 17% Mid-Market
SmartEvent Event Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Reporting
2
Reporting Ease
2
Threat Detection
2
Customization
1
Features
1
Cons
Difficult Learning
2
Deployment Difficulties
1
Learning Curve
1
Licensing Cost
1
Licensing Issues
1
SmartEvent Event Management features and usability ratings that predict user satisfaction
8.0
Activity Monitoring
Average: 9.0
7.9
Data Examination
Average: 8.5
8.9
Ease of Use
Average: 8.6
8.3
Log Management
Average: 9.0
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ridiculously easy log management is just the beginning

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 73% Small-Business
    • 27% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • InsightOps features and usability ratings that predict user satisfaction
    10.0
    Activity Monitoring
    Average: 9.0
    10.0
    Data Examination
    Average: 8.5
    6.5
    Ease of Use
    Average: 8.6
    10.0
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rapid7
    Year Founded
    2000
    HQ Location
    Boston, MA
    Twitter
    @rapid7
    122,406 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,075 employees on LinkedIn®
    Ownership
    NASDAQ:RPD
Product Description
How are these determined?Information
This description is provided by the seller.

Ridiculously easy log management is just the beginning

Users
No information available
Industries
  • Computer Software
Market Segment
  • 73% Small-Business
  • 27% Mid-Market
InsightOps features and usability ratings that predict user satisfaction
10.0
Activity Monitoring
Average: 9.0
10.0
Data Examination
Average: 8.5
6.5
Ease of Use
Average: 8.6
10.0
Log Management
Average: 9.0
Seller Details
Seller
Rapid7
Year Founded
2000
HQ Location
Boston, MA
Twitter
@rapid7
122,406 Twitter followers
LinkedIn® Page
www.linkedin.com
3,075 employees on LinkedIn®
Ownership
NASDAQ:RPD
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DNIF HYPERCLOUD is a cloud native platform that brings the functionality of SIEM, UEBA and SOAR into a single continuous workflow to solve cybersecurity challenges at scale. DNIF HYPERCLOUD is the fla

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 45% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DNIF HYPERCLOUD Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Services
    1
    Ease of Use
    1
    Easy Implementation
    1
    Features
    1
    Implementation Ease
    1
    Cons
    Expensive
    1
    Integration Issues
    1
    Limited Compatibility
    1
    Limited Integration
    1
    Limited Third-Party Integration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DNIF HYPERCLOUD features and usability ratings that predict user satisfaction
    8.9
    Activity Monitoring
    Average: 9.0
    7.8
    Data Examination
    Average: 8.5
    8.8
    Ease of Use
    Average: 8.6
    8.9
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    DNIF
    Year Founded
    2002
    HQ Location
    Mountain View, California
    LinkedIn® Page
    www.linkedin.com
    73 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DNIF HYPERCLOUD is a cloud native platform that brings the functionality of SIEM, UEBA and SOAR into a single continuous workflow to solve cybersecurity challenges at scale. DNIF HYPERCLOUD is the fla

Users
No information available
Industries
No information available
Market Segment
  • 45% Mid-Market
  • 36% Enterprise
DNIF HYPERCLOUD Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Services
1
Ease of Use
1
Easy Implementation
1
Features
1
Implementation Ease
1
Cons
Expensive
1
Integration Issues
1
Limited Compatibility
1
Limited Integration
1
Limited Third-Party Integration
1
DNIF HYPERCLOUD features and usability ratings that predict user satisfaction
8.9
Activity Monitoring
Average: 9.0
7.8
Data Examination
Average: 8.5
8.8
Ease of Use
Average: 8.6
8.9
Log Management
Average: 9.0
Seller Details
Seller
DNIF
Year Founded
2002
HQ Location
Mountain View, California
LinkedIn® Page
www.linkedin.com
73 employees on LinkedIn®
(12)4.3 out of 5
View top Consulting Services for Microsoft Security Copilot
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Empower your defenders to detect hidden patterns, harden defenses, and respond to incidents faster with generative AI

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 75% Enterprise
    • 17% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Security Copilot Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Security
    5
    Security Protection
    5
    Threat Detection
    5
    Automation
    4
    Cons
    Complexity
    3
    Expensive
    3
    Difficult Learning Curve
    2
    False Positives
    2
    Access Control
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Security Copilot features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    8.9
    Ease of Use
    Average: 8.6
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Empower your defenders to detect hidden patterns, harden defenses, and respond to incidents faster with generative AI

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 75% Enterprise
  • 17% Mid-Market
Microsoft Security Copilot Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Security
5
Security Protection
5
Threat Detection
5
Automation
4
Cons
Complexity
3
Expensive
3
Difficult Learning Curve
2
False Positives
2
Access Control
1
Microsoft Security Copilot features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
8.9
Ease of Use
Average: 8.6
0.0
No information available
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Corelight's Open Network Detection and Response (NDR) Platform improves network detection coverage, accelerates incident response, and reduces operational costs by consolidating NDR, intrusion detecti

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 52% Mid-Market
    • 48% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Corelight Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Threat Detection
    3
    Cybersecurity
    2
    Data Analytics
    2
    Detection
    2
    Cons
    Complexity
    3
    Complex Coding
    2
    Learning Curve
    2
    Training Deficiency
    2
    Complex Configuration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Corelight features and usability ratings that predict user satisfaction
    9.0
    Activity Monitoring
    Average: 9.0
    8.9
    Data Examination
    Average: 8.5
    8.3
    Ease of Use
    Average: 8.6
    8.9
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Corelight
    Company Website
    Year Founded
    2013
    HQ Location
    San Francisco, CA
    Twitter
    @corelight_inc
    4,205 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    344 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Corelight's Open Network Detection and Response (NDR) Platform improves network detection coverage, accelerates incident response, and reduces operational costs by consolidating NDR, intrusion detecti

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 52% Mid-Market
  • 48% Enterprise
Corelight Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Threat Detection
3
Cybersecurity
2
Data Analytics
2
Detection
2
Cons
Complexity
3
Complex Coding
2
Learning Curve
2
Training Deficiency
2
Complex Configuration
1
Corelight features and usability ratings that predict user satisfaction
9.0
Activity Monitoring
Average: 9.0
8.9
Data Examination
Average: 8.5
8.3
Ease of Use
Average: 8.6
8.9
Log Management
Average: 9.0
Seller Details
Seller
Corelight
Company Website
Year Founded
2013
HQ Location
San Francisco, CA
Twitter
@corelight_inc
4,205 Twitter followers
LinkedIn® Page
www.linkedin.com
344 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ManageEngine Log360 is a unified solution that offers holistic organizational security by bringing together crucial security capabilities like UEBA, DLP, CASB to improve visibility into your organizat

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 46% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ManageEngine Log360 Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Log Management
    3
    All-in-One Solution
    2
    Cloud Services
    2
    Easy Integrations
    2
    Cons
    Complex Configuration
    2
    Configuration Difficulties
    2
    Data Limitations
    2
    Technical Issues
    2
    Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManageEngine Log360 features and usability ratings that predict user satisfaction
    8.8
    Activity Monitoring
    Average: 9.0
    7.2
    Data Examination
    Average: 8.5
    9.4
    Ease of Use
    Average: 8.6
    8.8
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Del Valle, Texas
    Twitter
    @manageengine
    7,677 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    464 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ManageEngine Log360 is a unified solution that offers holistic organizational security by bringing together crucial security capabilities like UEBA, DLP, CASB to improve visibility into your organizat

Users
No information available
Industries
No information available
Market Segment
  • 46% Enterprise
  • 38% Mid-Market
ManageEngine Log360 Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Log Management
3
All-in-One Solution
2
Cloud Services
2
Easy Integrations
2
Cons
Complex Configuration
2
Configuration Difficulties
2
Data Limitations
2
Technical Issues
2
Complexity
1
ManageEngine Log360 features and usability ratings that predict user satisfaction
8.8
Activity Monitoring
Average: 9.0
7.2
Data Examination
Average: 8.5
9.4
Ease of Use
Average: 8.6
8.8
Log Management
Average: 9.0
Seller Details
Year Founded
2002
HQ Location
Del Valle, Texas
Twitter
@manageengine
7,677 Twitter followers
LinkedIn® Page
www.linkedin.com
464 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DICE Central Station is built to reduce central station activity and data entry, providing a seamless interface for operators.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 86% Mid-Market
    • 14% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DICE Central Station features and usability ratings that predict user satisfaction
    7.9
    Activity Monitoring
    Average: 9.0
    8.1
    Data Examination
    Average: 8.5
    7.1
    Ease of Use
    Average: 8.6
    7.8
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    DICE
    Year Founded
    1985
    HQ Location
    Bay City, MI
    Twitter
    @DICECorp
    1,535 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    44 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DICE Central Station is built to reduce central station activity and data entry, providing a seamless interface for operators.

Users
No information available
Industries
No information available
Market Segment
  • 86% Mid-Market
  • 14% Small-Business
DICE Central Station features and usability ratings that predict user satisfaction
7.9
Activity Monitoring
Average: 9.0
8.1
Data Examination
Average: 8.5
7.1
Ease of Use
Average: 8.6
7.8
Log Management
Average: 9.0
Seller Details
Seller
DICE
Year Founded
1985
HQ Location
Bay City, MI
Twitter
@DICECorp
1,535 Twitter followers
LinkedIn® Page
www.linkedin.com
44 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trellix Helix integrates your security tools and augments them with next-generation security information and event management (SIEM), orchestration, and threat intelligence capabilities to capture the

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Enterprise
    • 18% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Trellix Helix Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Easy Integrations
    2
    Features
    2
    Integration Support
    2
    Log Management
    2
    Cons
    Information Deficiency
    1
    Information Overload
    1
    Insufficient Information
    1
    Limited Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trellix Helix features and usability ratings that predict user satisfaction
    9.2
    Activity Monitoring
    Average: 9.0
    9.2
    Data Examination
    Average: 8.5
    9.1
    Ease of Use
    Average: 8.6
    9.2
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trellix
    Year Founded
    2004
    HQ Location
    Milpitas, CA
    Twitter
    @Trellix
    250,269 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    826 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trellix Helix integrates your security tools and augments them with next-generation security information and event management (SIEM), orchestration, and threat intelligence capabilities to capture the

Users
No information available
Industries
No information available
Market Segment
  • 64% Enterprise
  • 18% Mid-Market
Trellix Helix Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Easy Integrations
2
Features
2
Integration Support
2
Log Management
2
Cons
Information Deficiency
1
Information Overload
1
Insufficient Information
1
Limited Information
1
Trellix Helix features and usability ratings that predict user satisfaction
9.2
Activity Monitoring
Average: 9.0
9.2
Data Examination
Average: 8.5
9.1
Ease of Use
Average: 8.6
9.2
Log Management
Average: 9.0
Seller Details
Seller
Trellix
Year Founded
2004
HQ Location
Milpitas, CA
Twitter
@Trellix
250,269 Twitter followers
LinkedIn® Page
www.linkedin.com
826 employees on LinkedIn®
(10)4.4 out of 5
View top Consulting Services for Elastic Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Process Any Data, From Any Source. Centralize data processing of all types. Normalize varying schema and formats. Quickly extend to custom log formats. Easily add plugins for custom data sources

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 90% Small-Business
    • 70% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Elastic Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    8.8
    Ease of Use
    Average: 8.6
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Elastic
    Year Founded
    2012
    HQ Location
    Mountain View, CA
    Twitter
    @elastic
    63,875 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,436 employees on LinkedIn®
    Ownership
    NYSE: ESTC
Product Description
How are these determined?Information
This description is provided by the seller.

Process Any Data, From Any Source. Centralize data processing of all types. Normalize varying schema and formats. Quickly extend to custom log formats. Easily add plugins for custom data sources

Users
No information available
Industries
No information available
Market Segment
  • 90% Small-Business
  • 70% Enterprise
Elastic Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
8.8
Ease of Use
Average: 8.6
0.0
No information available
Seller Details
Seller
Elastic
Year Founded
2012
HQ Location
Mountain View, CA
Twitter
@elastic
63,875 Twitter followers
LinkedIn® Page
www.linkedin.com
4,436 employees on LinkedIn®
Ownership
NYSE: ESTC
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Splunk UBA provides advanced and insider threat detection using unsupervised machine learning helping organizations find unknown threats and anomalous user behavior across devices and applications. Sp

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Splunk User Behavior Analytics Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Machine Learning
    4
    User Behavior Analytics
    4
    AI Technology
    3
    Detection Efficiency
    3
    Ease of Use
    3
    Cons
    Complex Implementation
    3
    Complexity
    3
    Setup Difficulties
    3
    Complex Setup
    2
    High Resource Usage
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Splunk User Behavior Analytics features and usability ratings that predict user satisfaction
    8.7
    Activity Monitoring
    Average: 9.0
    8.7
    Data Examination
    Average: 8.5
    8.5
    Ease of Use
    Average: 8.6
    8.3
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Splunk UBA provides advanced and insider threat detection using unsupervised machine learning helping organizations find unknown threats and anomalous user behavior across devices and applications. Sp

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 40% Mid-Market
Splunk User Behavior Analytics Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Machine Learning
4
User Behavior Analytics
4
AI Technology
3
Detection Efficiency
3
Ease of Use
3
Cons
Complex Implementation
3
Complexity
3
Setup Difficulties
3
Complex Setup
2
High Resource Usage
2
Splunk User Behavior Analytics features and usability ratings that predict user satisfaction
8.7
Activity Monitoring
Average: 9.0
8.7
Data Examination
Average: 8.5
8.5
Ease of Use
Average: 8.6
8.3
Log Management
Average: 9.0
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Devo unlocks the full value of machine data for the world’s most instrumented enterprises by putting more data to work now. With Devo, IT executives finally realize the transformational promise of mac

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Mid-Market
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Devo features and usability ratings that predict user satisfaction
    3.3
    Activity Monitoring
    Average: 9.0
    5.0
    Data Examination
    Average: 8.5
    9.2
    Ease of Use
    Average: 8.6
    5.0
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Devo
    Year Founded
    2011
    HQ Location
    Boston, US
    Twitter
    @devo_Inc
    6,240 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    604 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Devo unlocks the full value of machine data for the world’s most instrumented enterprises by putting more data to work now. With Devo, IT executives finally realize the transformational promise of mac

Users
No information available
Industries
No information available
Market Segment
  • 40% Mid-Market
  • 40% Small-Business
Devo features and usability ratings that predict user satisfaction
3.3
Activity Monitoring
Average: 9.0
5.0
Data Examination
Average: 8.5
9.2
Ease of Use
Average: 8.6
5.0
Log Management
Average: 9.0
Seller Details
Seller
Devo
Year Founded
2011
HQ Location
Boston, US
Twitter
@devo_Inc
6,240 Twitter followers
LinkedIn® Page
www.linkedin.com
604 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Enterprise
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • LogLogic SIEM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Analysis
    1
    Log Management
    1
    Search Efficiency
    1
    Threat Detection
    1
    Cons
    Alert Management
    1
    Lack of Automation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LogLogic SIEM features and usability ratings that predict user satisfaction
    10.0
    Activity Monitoring
    Average: 9.0
    8.3
    Data Examination
    Average: 8.5
    7.5
    Ease of Use
    Average: 8.6
    9.2
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LogLogic
    Year Founded
    1994
    HQ Location
    Horley, Surrey
    Twitter
    @quallimited
    475 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Users
No information available
Industries
No information available
Market Segment
  • 60% Enterprise
  • 20% Mid-Market
LogLogic SIEM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Analysis
1
Log Management
1
Search Efficiency
1
Threat Detection
1
Cons
Alert Management
1
Lack of Automation
1
LogLogic SIEM features and usability ratings that predict user satisfaction
10.0
Activity Monitoring
Average: 9.0
8.3
Data Examination
Average: 8.5
7.5
Ease of Use
Average: 8.6
9.2
Log Management
Average: 9.0
Seller Details
Seller
LogLogic
Year Founded
1994
HQ Location
Horley, Surrey
Twitter
@quallimited
475 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
Entry Level Price:$500.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Logmanager is a log management platform enhanced with SIEM capabilities that radically simplifies response to cyberthreats, legal compliance, and troubleshooting. By transforming diverse logs, events,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Small-Business
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Logmanager Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    Log Management
    12
    Dashboard Usability
    8
    Customization
    6
    Dashboard Customization
    6
    Cons
    Complex Setup
    2
    Difficult Customization
    2
    Difficult Learning
    2
    Difficult Setup
    2
    Limitations
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Logmanager features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    9.7
    Ease of Use
    Average: 8.6
    10.0
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Prague 5, CZ
    LinkedIn® Page
    www.linkedin.com
    19 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Logmanager is a log management platform enhanced with SIEM capabilities that radically simplifies response to cyberthreats, legal compliance, and troubleshooting. By transforming diverse logs, events,

Users
No information available
Industries
No information available
Market Segment
  • 53% Small-Business
  • 40% Mid-Market
Logmanager Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
Log Management
12
Dashboard Usability
8
Customization
6
Dashboard Customization
6
Cons
Complex Setup
2
Difficult Customization
2
Difficult Learning
2
Difficult Setup
2
Limitations
2
Logmanager features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
9.7
Ease of Use
Average: 8.6
10.0
Log Management
Average: 9.0
Seller Details
Year Founded
2014
HQ Location
Prague 5, CZ
LinkedIn® Page
www.linkedin.com
19 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    When it comes to solving log collection and management challenges, Snare helps you save time, save money and reduce your risk. Snare Central ingests logs from Snare Agents and syslog feeds and you sel

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 44% Enterprise
    • 44% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Snare Central Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerting System
    1
    Analytics
    1
    Automation
    1
    Cloud Services
    1
    Customizability
    1
    Cons
    Expensive
    1
    Overwhelming Cost
    1
    Pricing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Snare Central features and usability ratings that predict user satisfaction
    9.4
    Activity Monitoring
    Average: 9.0
    10.0
    Data Examination
    Average: 8.5
    8.3
    Ease of Use
    Average: 8.6
    10.0
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Latham, ACT
    Twitter
    @ia_snare
    181 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

When it comes to solving log collection and management challenges, Snare helps you save time, save money and reduce your risk. Snare Central ingests logs from Snare Agents and syslog feeds and you sel

Users
No information available
Industries
No information available
Market Segment
  • 44% Enterprise
  • 44% Mid-Market
Snare Central Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerting System
1
Analytics
1
Automation
1
Cloud Services
1
Customizability
1
Cons
Expensive
1
Overwhelming Cost
1
Pricing Issues
1
Snare Central features and usability ratings that predict user satisfaction
9.4
Activity Monitoring
Average: 9.0
10.0
Data Examination
Average: 8.5
8.3
Ease of Use
Average: 8.6
10.0
Log Management
Average: 9.0
Seller Details
HQ Location
Latham, ACT
Twitter
@ia_snare
181 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Stellar Cyber Open XDR platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill to successfully secure their environments. With Stellar Cyb

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Open XDR Security Operations Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    AI Automation
    1
    AI Technology
    1
    Continuous Monitoring
    1
    Customer Support
    1
    Cybersecurity
    1
    Cons
    Expertise Required
    1
    Implementation Challenges
    1
    Integration Issues
    1
    Time-Consuming
    1
    Time Consumption
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Open XDR Security Operations Platform features and usability ratings that predict user satisfaction
    9.2
    Activity Monitoring
    Average: 9.0
    10.0
    Data Examination
    Average: 8.5
    10.0
    Ease of Use
    Average: 8.6
    10.0
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    San Jose, US
    LinkedIn® Page
    www.linkedin.com
    133 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Stellar Cyber Open XDR platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill to successfully secure their environments. With Stellar Cyb

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 25% Mid-Market
Open XDR Security Operations Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
AI Automation
1
AI Technology
1
Continuous Monitoring
1
Customer Support
1
Cybersecurity
1
Cons
Expertise Required
1
Implementation Challenges
1
Integration Issues
1
Time-Consuming
1
Time Consumption
1
Open XDR Security Operations Platform features and usability ratings that predict user satisfaction
9.2
Activity Monitoring
Average: 9.0
10.0
Data Examination
Average: 8.5
10.0
Ease of Use
Average: 8.6
10.0
Log Management
Average: 9.0
Seller Details
Year Founded
2017
HQ Location
San Jose, US
LinkedIn® Page
www.linkedin.com
133 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A Machine Learning and AI Platform built on Big/Fast Data Architecture for Breach Avoidance/Detection and Automated Elimination/Containment. It is an integrated solution with comprehensive threat dete

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Mid-Market
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Seceon Open Threat Management Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Cons
    Lack of Automation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Seceon Open Threat Management Platform features and usability ratings that predict user satisfaction
    8.3
    Activity Monitoring
    Average: 9.0
    8.3
    Data Examination
    Average: 8.5
    7.8
    Ease of Use
    Average: 8.6
    8.3
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Seceon
    Year Founded
    2015
    HQ Location
    Westford, MA
    Twitter
    @Seceon_Inc
    1,187 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    111 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A Machine Learning and AI Platform built on Big/Fast Data Architecture for Breach Avoidance/Detection and Automated Elimination/Containment. It is an integrated solution with comprehensive threat dete

Users
No information available
Industries
No information available
Market Segment
  • 75% Mid-Market
  • 25% Enterprise
Seceon Open Threat Management Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Cons
Lack of Automation
1
Seceon Open Threat Management Platform features and usability ratings that predict user satisfaction
8.3
Activity Monitoring
Average: 9.0
8.3
Data Examination
Average: 8.5
7.8
Ease of Use
Average: 8.6
8.3
Log Management
Average: 9.0
Seller Details
Seller
Seceon
Year Founded
2015
HQ Location
Westford, MA
Twitter
@Seceon_Inc
1,187 Twitter followers
LinkedIn® Page
www.linkedin.com
111 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BMC AMI Command Center for Security is an affordable Security Information and Event Management (SIEM) system for z/OS

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BMC AMI Command Center for Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    8.3
    Ease of Use
    Average: 8.6
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1980
    HQ Location
    Houston, TX
    Twitter
    @BMCSoftware
    49,477 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,760 employees on LinkedIn®
    Phone
    713 918 8800
Product Description
How are these determined?Information
This description is provided by the seller.

BMC AMI Command Center for Security is an affordable Security Information and Event Management (SIEM) system for z/OS

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
BMC AMI Command Center for Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
8.3
Ease of Use
Average: 8.6
0.0
No information available
Seller Details
Year Founded
1980
HQ Location
Houston, TX
Twitter
@BMCSoftware
49,477 Twitter followers
LinkedIn® Page
www.linkedin.com
9,760 employees on LinkedIn®
Phone
713 918 8800
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Chronicle Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    2
    Security
    2
    Cloud Security
    1
    Cloud Services
    1
    Cons
    Not User-Friendly
    1
    Slow Performance
    1
    UX Improvement
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Chronicle Security features and usability ratings that predict user satisfaction
    10.0
    Activity Monitoring
    Average: 9.0
    10.0
    Data Examination
    Average: 8.5
    9.2
    Ease of Use
    Average: 8.6
    10.0
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Mountain View, US
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
Chronicle Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
2
Security
2
Cloud Security
1
Cloud Services
1
Cons
Not User-Friendly
1
Slow Performance
1
UX Improvement
1
Chronicle Security features and usability ratings that predict user satisfaction
10.0
Activity Monitoring
Average: 9.0
10.0
Data Examination
Average: 8.5
9.2
Ease of Use
Average: 8.6
10.0
Log Management
Average: 9.0
Seller Details
HQ Location
Mountain View, US
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Recon is a comprehensive SIEM log management security analytics solution that eases compliance burdens and accelerates forensic investigation.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenText ArcSight Recon features and usability ratings that predict user satisfaction
    10.0
    Activity Monitoring
    Average: 9.0
    8.3
    Data Examination
    Average: 8.5
    8.3
    Ease of Use
    Average: 8.6
    10.0
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenText
    Year Founded
    1991
    HQ Location
    Waterloo, ON
    Twitter
    @OpenText
    21,716 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22,403 employees on LinkedIn®
    Ownership
    NASDAQ:OTEX
Product Description
How are these determined?Information
This description is provided by the seller.

Recon is a comprehensive SIEM log management security analytics solution that eases compliance burdens and accelerates forensic investigation.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
OpenText ArcSight Recon features and usability ratings that predict user satisfaction
10.0
Activity Monitoring
Average: 9.0
8.3
Data Examination
Average: 8.5
8.3
Ease of Use
Average: 8.6
10.0
Log Management
Average: 9.0
Seller Details
Seller
OpenText
Year Founded
1991
HQ Location
Waterloo, ON
Twitter
@OpenText
21,716 Twitter followers
LinkedIn® Page
www.linkedin.com
22,403 employees on LinkedIn®
Ownership
NASDAQ:OTEX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Upfort Shield is an AI-powered multi-layer cyber defense platform trusted by tens of thousands of small businesses to provide them with enterprise-grade security. Shield can be implemented and manag

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Mid-Market
    • 25% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Upfort Shield Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    2
    Ease of Use
    2
    Threat Detection
    2
    Alerting
    1
    Detection Efficiency
    1
    Cons
    Lack of Automation
    1
    Lack of Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Upfort Shield features and usability ratings that predict user satisfaction
    9.2
    Activity Monitoring
    Average: 9.0
    0.0
    Data Examination
    Average: 8.5
    10.0
    Ease of Use
    Average: 8.6
    8.3
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Upfort
    Year Founded
    2017
    HQ Location
    San Francisco, US
    Twitter
    @upfort_cyber
    23 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    34 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Upfort Shield is an AI-powered multi-layer cyber defense platform trusted by tens of thousands of small businesses to provide them with enterprise-grade security. Shield can be implemented and manag

Users
No information available
Industries
No information available
Market Segment
  • 75% Mid-Market
  • 25% Small-Business
Upfort Shield Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
2
Ease of Use
2
Threat Detection
2
Alerting
1
Detection Efficiency
1
Cons
Lack of Automation
1
Lack of Features
1
Upfort Shield features and usability ratings that predict user satisfaction
9.2
Activity Monitoring
Average: 9.0
0.0
Data Examination
Average: 8.5
10.0
Ease of Use
Average: 8.6
8.3
Log Management
Average: 9.0
Seller Details
Seller
Upfort
Year Founded
2017
HQ Location
San Francisco, US
Twitter
@upfort_cyber
23 Twitter followers
LinkedIn® Page
www.linkedin.com
34 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Vijilan will deploy and implement its fully managed service in record time, and as part of the service, Vijilan will monitor and respond to any threat or suspicious behavior on the network through its

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Vijilan Threat Respond features and usability ratings that predict user satisfaction
    10.0
    Activity Monitoring
    Average: 9.0
    9.2
    Data Examination
    Average: 8.5
    10.0
    Ease of Use
    Average: 8.6
    10.0
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Vijilan
    Year Founded
    2014
    HQ Location
    Aventura, US
    Twitter
    @vijilansoc
    396 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    65 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Vijilan will deploy and implement its fully managed service in record time, and as part of the service, Vijilan will monitor and respond to any threat or suspicious behavior on the network through its

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
Vijilan Threat Respond features and usability ratings that predict user satisfaction
10.0
Activity Monitoring
Average: 9.0
9.2
Data Examination
Average: 8.5
10.0
Ease of Use
Average: 8.6
10.0
Log Management
Average: 9.0
Seller Details
Seller
Vijilan
Year Founded
2014
HQ Location
Aventura, US
Twitter
@vijilansoc
396 Twitter followers
LinkedIn® Page
www.linkedin.com
65 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Log Management suite for IT security and corporate compliance . More than 5000 organizations (small, medium and large companies) have already chosen Business LOG as Log Management Suite for IT securit

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Business LOG Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Deployment Ease
    1
    Setup Ease
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Business LOG features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Use
    Average: 8.6
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    LinkedIn® Page
    www.linkedin.com
    11 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Log Management suite for IT security and corporate compliance . More than 5000 organizations (small, medium and large companies) have already chosen Business LOG as Log Management Suite for IT securit

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Business LOG Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Deployment Ease
1
Setup Ease
1
Cons
This product has not yet received any negative sentiments.
Business LOG features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
10.0
Ease of Use
Average: 8.6
0.0
No information available
Seller Details
Year Founded
1994
LinkedIn® Page
www.linkedin.com
11 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IT solution providers are the first—and often only—line of defense for every kind of business in every part of the world. Whether managing mom-and-pop businesses or high-profile clients, providing pre

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ConnectWise Cybersecurity Management – Network features and usability ratings that predict user satisfaction
    8.3
    Activity Monitoring
    Average: 9.0
    8.3
    Data Examination
    Average: 8.5
    6.7
    Ease of Use
    Average: 8.6
    8.3
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1982
    HQ Location
    Tampa, FL
    Twitter
    @ConnectWise
    14,998 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,224 employees on LinkedIn®
    Phone
    800-671-6898
Product Description
How are these determined?Information
This description is provided by the seller.

IT solution providers are the first—and often only—line of defense for every kind of business in every part of the world. Whether managing mom-and-pop businesses or high-profile clients, providing pre

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
ConnectWise Cybersecurity Management – Network features and usability ratings that predict user satisfaction
8.3
Activity Monitoring
Average: 9.0
8.3
Data Examination
Average: 8.5
6.7
Ease of Use
Average: 8.6
8.3
Log Management
Average: 9.0
Seller Details
Year Founded
1982
HQ Location
Tampa, FL
Twitter
@ConnectWise
14,998 Twitter followers
LinkedIn® Page
www.linkedin.com
3,224 employees on LinkedIn®
Phone
800-671-6898
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Detect, investigate, and hunt for threats like never before Chronicle SIEM (Security Information and Event Management) delivers modern threat detection and investigation at unprecedented speed and sca

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Google Chronicle SIEM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Features
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Chronicle SIEM features and usability ratings that predict user satisfaction
    10.0
    Activity Monitoring
    Average: 9.0
    10.0
    Data Examination
    Average: 8.5
    10.0
    Ease of Use
    Average: 8.6
    10.0
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,750,646 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    310,061 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Detect, investigate, and hunt for threats like never before Chronicle SIEM (Security Information and Event Management) delivers modern threat detection and investigation at unprecedented speed and sca

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
Google Chronicle SIEM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Features
1
Cons
This product has not yet received any negative sentiments.
Google Chronicle SIEM features and usability ratings that predict user satisfaction
10.0
Activity Monitoring
Average: 9.0
10.0
Data Examination
Average: 8.5
10.0
Ease of Use
Average: 8.6
10.0
Log Management
Average: 9.0
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,750,646 Twitter followers
LinkedIn® Page
www.linkedin.com
310,061 employees on LinkedIn®
Ownership
NASDAQ:GOOG
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Gurucul is the only cost-optimized security analytics company founded in data science that delivers radical clarity about cyber risk. Our REVEAL security analytics platform analyzes enterprise data at

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Gurucul Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerting
    1
    Alerts
    1
    Dashboard Design
    1
    Dashboard Usability
    1
    Data Protection
    1
    Cons
    Alert Management
    1
    Cloud Dependency
    1
    Complex Parsing
    1
    Deployment Difficulties
    1
    Ineffective Alerts
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Gurucul features and usability ratings that predict user satisfaction
    8.3
    Activity Monitoring
    Average: 9.0
    10.0
    Data Examination
    Average: 8.5
    9.2
    Ease of Use
    Average: 8.6
    10.0
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Gurucul
    Year Founded
    2010
    HQ Location
    El Segundo, US
    Twitter
    @Gurucul
    1,314 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    288 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Gurucul is the only cost-optimized security analytics company founded in data science that delivers radical clarity about cyber risk. Our REVEAL security analytics platform analyzes enterprise data at

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Gurucul Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerting
1
Alerts
1
Dashboard Design
1
Dashboard Usability
1
Data Protection
1
Cons
Alert Management
1
Cloud Dependency
1
Complex Parsing
1
Deployment Difficulties
1
Ineffective Alerts
1
Gurucul features and usability ratings that predict user satisfaction
8.3
Activity Monitoring
Average: 9.0
10.0
Data Examination
Average: 8.5
9.2
Ease of Use
Average: 8.6
10.0
Log Management
Average: 9.0
Seller Details
Seller
Gurucul
Year Founded
2010
HQ Location
El Segundo, US
Twitter
@Gurucul
1,314 Twitter followers
LinkedIn® Page
www.linkedin.com
288 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Huntsman Security’s Next Gen SIEM is a cyber security analytics product with built-in threat intelligence and behaviour anomaly detection, designed to analyse high volume streams of data in real-time

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Huntsman Next Gen SIEM features and usability ratings that predict user satisfaction
    8.3
    Activity Monitoring
    Average: 9.0
    8.3
    Data Examination
    Average: 8.5
    8.3
    Ease of Use
    Average: 8.6
    8.3
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1999
    HQ Location
    Chatswood, AU
    LinkedIn® Page
    www.linkedin.com
    21 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Huntsman Security’s Next Gen SIEM is a cyber security analytics product with built-in threat intelligence and behaviour anomaly detection, designed to analyse high volume streams of data in real-time

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Huntsman Next Gen SIEM features and usability ratings that predict user satisfaction
8.3
Activity Monitoring
Average: 9.0
8.3
Data Examination
Average: 8.5
8.3
Ease of Use
Average: 8.6
8.3
Log Management
Average: 9.0
Seller Details
Year Founded
1999
HQ Location
Chatswood, AU
LinkedIn® Page
www.linkedin.com
21 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM Security QRadar Log Insights Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    1
    Threat Detection
    1
    User Interface
    1
    Cons
    Pricing Issues
    1
    Resource Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Security QRadar Log Insights features and usability ratings that predict user satisfaction
    8.3
    Activity Monitoring
    Average: 9.0
    8.3
    Data Examination
    Average: 8.5
    8.3
    Ease of Use
    Average: 8.6
    8.3
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,764 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    331,391 employees on LinkedIn®
    Ownership
    SWX:IBM
Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
IBM Security QRadar Log Insights Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
1
Threat Detection
1
User Interface
1
Cons
Pricing Issues
1
Resource Management
1
IBM Security QRadar Log Insights features and usability ratings that predict user satisfaction
8.3
Activity Monitoring
Average: 9.0
8.3
Data Examination
Average: 8.5
8.3
Ease of Use
Average: 8.6
8.3
Log Management
Average: 9.0
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,764 Twitter followers
LinkedIn® Page
www.linkedin.com
331,391 employees on LinkedIn®
Ownership
SWX:IBM
(1)5.0 out of 5
View top Consulting Services for MixMode
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    MixMode is a cybersecurity anomaly detection platform that combines the functionality of SIEM, NDR, NTA and UEBA in a single purpose built platform for the modern SOC. MixMode is focused on solving th

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • MixMode features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    MixMode
    Twitter
    @MixModeAI
    3,489 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

MixMode is a cybersecurity anomaly detection platform that combines the functionality of SIEM, NDR, NTA and UEBA in a single purpose built platform for the modern SOC. MixMode is focused on solving th

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
MixMode features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
MixMode
Twitter
@MixModeAI
3,489 Twitter followers
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Micro Focus Sentinel is a Security Information and Event Management (SIEM) solution that simplifies the deployment, management and day-to-day use of SIEM, readily adapts to dynamic enterprise environm

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenText NetIQ Sentinel features and usability ratings that predict user satisfaction
    10.0
    Activity Monitoring
    Average: 9.0
    10.0
    Data Examination
    Average: 8.5
    8.3
    Ease of Use
    Average: 8.6
    10.0
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenText
    Year Founded
    1991
    HQ Location
    Waterloo, ON
    Twitter
    @OpenText
    21,716 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22,403 employees on LinkedIn®
    Ownership
    NASDAQ:OTEX
Product Description
How are these determined?Information
This description is provided by the seller.

Micro Focus Sentinel is a Security Information and Event Management (SIEM) solution that simplifies the deployment, management and day-to-day use of SIEM, readily adapts to dynamic enterprise environm

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
OpenText NetIQ Sentinel features and usability ratings that predict user satisfaction
10.0
Activity Monitoring
Average: 9.0
10.0
Data Examination
Average: 8.5
8.3
Ease of Use
Average: 8.6
10.0
Log Management
Average: 9.0
Seller Details
Seller
OpenText
Year Founded
1991
HQ Location
Waterloo, ON
Twitter
@OpenText
21,716 Twitter followers
LinkedIn® Page
www.linkedin.com
22,403 employees on LinkedIn®
Ownership
NASDAQ:OTEX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Securing data with a wide range of unintegrated security solutions causes a large volume of security reports exclusive to each, a high volume of produced alerts, and inconsistent and incorrect reports

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Polar SIEM features and usability ratings that predict user satisfaction
    10.0
    Activity Monitoring
    Average: 9.0
    10.0
    Data Examination
    Average: 8.5
    10.0
    Ease of Use
    Average: 8.6
    10.0
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Markham, Ontario
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Securing data with a wide range of unintegrated security solutions causes a large volume of security reports exclusive to each, a high volume of produced alerts, and inconsistent and incorrect reports

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Polar SIEM features and usability ratings that predict user satisfaction
10.0
Activity Monitoring
Average: 9.0
10.0
Data Examination
Average: 8.5
10.0
Ease of Use
Average: 8.6
10.0
Log Management
Average: 9.0
Seller Details
Year Founded
2018
HQ Location
Markham, Ontario
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Defines organizational security posture. Determines type, level, volume of sources. Collects, collates, correlates and analyzes telemetry data. Overlays cyber threat intelligence. Derives actionable c

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sequretek MDR features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Use
    Average: 8.6
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Woodbridge, US
    LinkedIn® Page
    www.linkedin.com
    396 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Defines organizational security posture. Determines type, level, volume of sources. Collects, collates, correlates and analyzes telemetry data. Overlays cyber threat intelligence. Derives actionable c

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Sequretek MDR features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
10.0
Ease of Use
Average: 8.6
0.0
No information available
Seller Details
Year Founded
2013
HQ Location
Woodbridge, US
LinkedIn® Page
www.linkedin.com
396 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SOCVue Security Monitoring is a service that includes 24/7/365 threat detection, remediation guidance, compliance, and SIEM and log management.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SOCVue Security Monitoring features and usability ratings that predict user satisfaction
    10.0
    Activity Monitoring
    Average: 9.0
    8.3
    Data Examination
    Average: 8.5
    6.7
    Ease of Use
    Average: 8.6
    8.3
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2001
    HQ Location
    Boston, US
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SOCVue Security Monitoring is a service that includes 24/7/365 threat detection, remediation guidance, compliance, and SIEM and log management.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
SOCVue Security Monitoring features and usability ratings that predict user satisfaction
10.0
Activity Monitoring
Average: 9.0
8.3
Data Examination
Average: 8.5
6.7
Ease of Use
Average: 8.6
8.3
Log Management
Average: 9.0
Seller Details
Year Founded
2001
HQ Location
Boston, US
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®
(2)4.3 out of 5
View top Consulting Services for Splunk Cloud Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Search, analyze, visualize and act on your data with the flexible, secure and cost effective data platform service. Go live in as little as two days, and with your IT backend managed by Splunk experts

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Splunk Cloud Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    5.0
    Ease of Use
    Average: 8.6
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Search, analyze, visualize and act on your data with the flexible, secure and cost effective data platform service. Go live in as little as two days, and with your IT backend managed by Splunk experts

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Splunk Cloud Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
5.0
Ease of Use
Average: 8.6
0.0
No information available
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tailored to small and medium businesses who want a SIEM in order to comply with regulations and protect the ever-present danger of a cyber-attack. This is the perfect solution for those organizations

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatRespond features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Use
    Average: 8.6
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Vijilan
    Year Founded
    2014
    HQ Location
    Aventura, US
    Twitter
    @vijilansoc
    396 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    65 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Tailored to small and medium businesses who want a SIEM in order to comply with regulations and protect the ever-present danger of a cyber-attack. This is the perfect solution for those organizations

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
ThreatRespond features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
10.0
Ease of Use
Average: 8.6
0.0
No information available
Seller Details
Seller
Vijilan
Year Founded
2014
HQ Location
Aventura, US
Twitter
@vijilansoc
396 Twitter followers
LinkedIn® Page
www.linkedin.com
65 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With full compliance capabilities, threat detection, and 24/7 monitoring, complete security coverage is within your grasp. TSM is the first completely consolidated security device that allows organiza

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Total Security Management (TSM) features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

With full compliance capabilities, threat detection, and 24/7 monitoring, complete security coverage is within your grasp. TSM is the first completely consolidated security device that allows organiza

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Total Security Management (TSM) features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AlienVault® OSSIM™ is a feature-rich, open-source security information and event management (SIEM) that includes event collection, normalization, and correlation. AlienVault OSSIM was launched by engi

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AlienVault® OSSIM™ features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2007
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    53 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AlienVault® OSSIM™ is a feature-rich, open-source security information and event management (SIEM) that includes event collection, normalization, and correlation. AlienVault OSSIM was launched by engi

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
AlienVault® OSSIM™ features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2007
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
53 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Alpha log analysis in the field of IT management refers to the examination and interpretation of system logs generated by various IT infrastructure components, such as servers, applications, network d

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Alpha Log features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    Singapore
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Alpha log analysis in the field of IT management refers to the examination and interpretation of system logs generated by various IT infrastructure components, such as servers, applications, network d

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Alpha Log features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2009
HQ Location
Singapore
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BIMA by Perisai: Redefining Cybersecurity with a Symphony of EDR, NDR, XDR, and SIEM. Experience digital freedom like never before, where every click is safe, and every innovation is secure. Bima - wh

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BIMA features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Peris.ai
    Year Founded
    2022
    HQ Location
    Jakarta, ID
    Twitter
    @peris_ai
    140 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BIMA by Perisai: Redefining Cybersecurity with a Symphony of EDR, NDR, XDR, and SIEM. Experience digital freedom like never before, where every click is safe, and every innovation is secure. Bima - wh

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
BIMA features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Peris.ai
Year Founded
2022
HQ Location
Jakarta, ID
Twitter
@peris_ai
140 Twitter followers
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Clember is an AI-first platform that automates the entire cybersecurity insight process. Real-time reporting. Compliance validation. And threat intelligence. Clember replaces weeks of manual work to c

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Clember features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Clember
    HQ Location
    Utrecht, NL
    LinkedIn® Page
    www.linkedin.com
    2 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Clember is an AI-first platform that automates the entire cybersecurity insight process. Real-time reporting. Compliance validation. And threat intelligence. Clember replaces weeks of manual work to c

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Clember features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Clember
HQ Location
Utrecht, NL
LinkedIn® Page
www.linkedin.com
2 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CorreLog is a ISV for cross-platform IT security log management and event log correlation.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CorreLog Solution Suite features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CorreLog
    LinkedIn® Page
    www.linkedin.com
    14 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CorreLog is a ISV for cross-platform IT security log management and event log correlation.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
CorreLog Solution Suite features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
CorreLog
LinkedIn® Page
www.linkedin.com
14 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CalTech's CyberDefense Program is a carefully researched and curated suite of systems and services designed to improve the IT security standing of your organization.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CybderDefense Program features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CalTech
    Year Founded
    1997
    LinkedIn® Page
    www.linkedin.com
    543 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CalTech's CyberDefense Program is a carefully researched and curated suite of systems and services designed to improve the IT security standing of your organization.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
CybderDefense Program features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
CalTech
Year Founded
1997
LinkedIn® Page
www.linkedin.com
543 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Innovation is not just a motto for us but a mandate. We say that as information security domain experts who have worked in and with leading corporations. Over time, we have learnt that lack of proacti

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyberal features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Anlyz
    Year Founded
    2017
    HQ Location
    Benguluru, IN
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Innovation is not just a motto for us but a mandate. We say that as information security domain experts who have worked in and with leading corporations. Over time, we have learnt that lack of proacti

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Cyberal features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Anlyz
Year Founded
2017
HQ Location
Benguluru, IN
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Defense.com is an XDR platform that contains everything your organisation needs to detect and respond to cyber threats across all areas of your network, without the enterprise price tag or complexity.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Defense.com features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Stevenage, UK
    Twitter
    @defensedotcom
    179 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Defense.com is an XDR platform that contains everything your organisation needs to detect and respond to cyber threats across all areas of your network, without the enterprise price tag or complexity.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Defense.com features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2016
HQ Location
Stevenage, UK
Twitter
@defensedotcom
179 Twitter followers
LinkedIn® Page
www.linkedin.com
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    empow's security platform radically upends traditional approaches by integrating with your existing network infrastructure and breaking down your security tools into their individual components.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • empow features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    empow
    Year Founded
    2012
    HQ Location
    San Diego, US
    Twitter
    @empowcyber
    184 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    624 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

empow's security platform radically upends traditional approaches by integrating with your existing network infrastructure and breaking down your security tools into their individual components.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
empow features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
empow
Year Founded
2012
HQ Location
San Diego, US
Twitter
@empowcyber
184 Twitter followers
LinkedIn® Page
www.linkedin.com
624 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A Key Part of FoA Key Part of Fortra (the new face of HelpSystems) PowertechX is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity lan

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Event Manager features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,461 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,643 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A Key Part of FoA Key Part of Fortra (the new face of HelpSystems) PowertechX is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity lan

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Event Manager features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,461 Twitter followers
LinkedIn® Page
www.linkedin.com
1,643 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    eVigilPro offers direct analysis of security events generated by computer hardware, network, and applications. It detects anomalies and policy violations through real-time monitoring and stops them by

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • eVigilPro features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Moonshott
    Year Founded
    2017
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

eVigilPro offers direct analysis of security events generated by computer hardware, network, and applications. It detects anomalies and policy violations through real-time monitoring and stops them by

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
eVigilPro features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Moonshott
Year Founded
2017
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    While GoSecure Professional Security Services focuses on finding the problems, GoSecure Titan® Managed Security Services make sure to solve them – making GoSecure your ally to consolidate, evolve &

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GoSecure Titan Managed Security Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    3.3
    Ease of Use
    Average: 8.6
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2002
    HQ Location
    San Diego, CA
    Twitter
    @GoSecure_Inc
    2,780 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    102 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

While GoSecure Professional Security Services focuses on finding the problems, GoSecure Titan® Managed Security Services make sure to solve them – making GoSecure your ally to consolidate, evolve &

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
GoSecure Titan Managed Security Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
3.3
Ease of Use
Average: 8.6
0.0
No information available
Seller Details
Company Website
Year Founded
2002
HQ Location
San Diego, CA
Twitter
@GoSecure_Inc
2,780 Twitter followers
LinkedIn® Page
www.linkedin.com
102 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Gravwell is a log analysis and monitoring platform built on the principle that you need to be able to ask any question of your data and get answers quickly.  To achieve this goal the platform has bee

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Gravwell features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Gravwell
    Year Founded
    2017
    HQ Location
    Idaho
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Gravwell is a log analysis and monitoring platform built on the principle that you need to be able to ask any question of your data and get answers quickly.  To achieve this goal the platform has bee

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Gravwell features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Gravwell
Year Founded
2017
HQ Location
Idaho
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Companion provides Sales Force Automation and e-Detailing solutions for pharmaceutical companies. It solution empowers the systems not only in Technology but also produce insights to the businesses. C

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lognostic features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @Mavensi_Mi
    18 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Companion provides Sales Force Automation and e-Detailing solutions for pharmaceutical companies. It solution empowers the systems not only in Technology but also produce insights to the businesses. C

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Lognostic features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Twitter
@Mavensi_Mi
18 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Detect and Prevent Fraud, Data Leaks and Advanced Internal as well as External Attack for Cyber Infrastructure with Security Orchestration, Automation and Response

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LTS Secure SIEM features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Pune, IN
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Detect and Prevent Fraud, Data Leaks and Advanced Internal as well as External Attack for Cyber Infrastructure with Security Orchestration, Automation and Response

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
LTS Secure SIEM features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2012
HQ Location
Pune, IN
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ManageEngine Log360 Cloud, a unified cloud SIEM solution with integrated CASB capabilities, helps enterprises secure their network from cyberattacks. With its security analytics, threat intelligence,

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManageEngine Log360 Cloud features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Del Valle, Texas
    Twitter
    @manageengine
    7,677 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    464 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ManageEngine Log360 Cloud, a unified cloud SIEM solution with integrated CASB capabilities, helps enterprises secure their network from cyberattacks. With its security analytics, threat intelligence,

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
ManageEngine Log360 Cloud features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2002
HQ Location
Del Valle, Texas
Twitter
@manageengine
7,677 Twitter followers
LinkedIn® Page
www.linkedin.com
464 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Welcome to MOAT360, the cutting-edge cloud solution designed to evaluate and boost your cybersecurity resilience and compatibility. In our world where cyber threats are always changing, MOAT360 is you

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • MOAT360 features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Coolumba
    Year Founded
    2022
    HQ Location
    Calgary, CA
    LinkedIn® Page
    www.linkedin.com
    2 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Welcome to MOAT360, the cutting-edge cloud solution designed to evaluate and boost your cybersecurity resilience and compatibility. In our world where cyber threats are always changing, MOAT360 is you

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
MOAT360 features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Coolumba
Year Founded
2022
HQ Location
Calgary, CA
LinkedIn® Page
www.linkedin.com
2 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Monikal, the SIEM solution for SMEs, delivers visibility of and insight into ever-changing and fragmented networks, in a way that has never been possible for most organisations before. Not only can i

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Monikal features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Securious
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Monikal, the SIEM solution for SMEs, delivers visibility of and insight into ever-changing and fragmented networks, in a way that has never been possible for most organisations before. Not only can i

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Monikal features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Securious
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Observe – the AI-powered observability company – is reinventing how businesses detect anomalies, troubleshoot applications, and resolve incidents to deliver exceptional customer experiences. Only Obse

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Observe features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    9.2
    Ease of Use
    Average: 8.6
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Observe
    Year Founded
    2017
    HQ Location
    San Mateo, California
    Twitter
    @observe_inc
    604 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    138 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Observe – the AI-powered observability company – is reinventing how businesses detect anomalies, troubleshoot applications, and resolve incidents to deliver exceptional customer experiences. Only Obse

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Observe features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
9.2
Ease of Use
Average: 8.6
0.0
No information available
Seller Details
Seller
Observe
Year Founded
2017
HQ Location
San Mateo, California
Twitter
@observe_inc
604 Twitter followers
LinkedIn® Page
www.linkedin.com
138 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Micro Focus ArcSight Intelligence user and entity behavioral analytics (UEBA) empowers Security Operations Centers (SOCs) to detect, investigate, and respond to threats that may be hiding in your ente

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenText ArcSight Intelligence features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenText
    Year Founded
    1991
    HQ Location
    Waterloo, ON
    Twitter
    @OpenText
    21,716 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22,403 employees on LinkedIn®
    Ownership
    NASDAQ:OTEX
Product Description
How are these determined?Information
This description is provided by the seller.

Micro Focus ArcSight Intelligence user and entity behavioral analytics (UEBA) empowers Security Operations Centers (SOCs) to detect, investigate, and respond to threats that may be hiding in your ente

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
OpenText ArcSight Intelligence features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
OpenText
Year Founded
1991
HQ Location
Waterloo, ON
Twitter
@OpenText
21,716 Twitter followers
LinkedIn® Page
www.linkedin.com
22,403 employees on LinkedIn®
Ownership
NASDAQ:OTEX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Monitoring activity in a clients’ network and cross referencing it with clues from our real-world intelligence platform, our clients can take meaningful action

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • [redacted] features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    redacted
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Monitoring activity in a clients’ network and cross referencing it with clues from our real-world intelligence platform, our clients can take meaningful action

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
[redacted] features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
redacted
LinkedIn® Page
www.linkedin.com
0 ratings
View top Consulting Services for SAP Enterprise Threat Detection
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SAP Enterprise Threat Detection features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SAP
    Year Founded
    1972
    HQ Location
    Walldorf
    Twitter
    @SAP
    299,880 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    129,051 employees on LinkedIn®
    Ownership
    NYSE:SAP
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
SAP Enterprise Threat Detection features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
SAP
Year Founded
1972
HQ Location
Walldorf
Twitter
@SAP
299,880 Twitter followers
LinkedIn® Page
www.linkedin.com
129,051 employees on LinkedIn®
Ownership
NYSE:SAP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ScienceSoftSIEM is a SIEM platform enhanced with self-diagnostics and self-optimization features.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ScienceSoftSIEM features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1989
    HQ Location
    McKinney, Texas
    Twitter
    @ScienceSoft
    931 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    719 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ScienceSoftSIEM is a SIEM platform enhanced with self-diagnostics and self-optimization features.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
ScienceSoftSIEM features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1989
HQ Location
McKinney, Texas
Twitter
@ScienceSoft
931 Twitter followers
LinkedIn® Page
www.linkedin.com
719 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SearchInform SIEM is an out-of-the-box system for collecting and analyzing real-time security events, identifying information security incidents and responding to them. The solution accumulates inform

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SearchInform SIEM features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Dubai, AE
    Twitter
    @SearchinformI
    97 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    120 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SearchInform SIEM is an out-of-the-box system for collecting and analyzing real-time security events, identifying information security incidents and responding to them. The solution accumulates inform

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
SearchInform SIEM features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2005
HQ Location
Dubai, AE
Twitter
@SearchinformI
97 Twitter followers
LinkedIn® Page
www.linkedin.com
120 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Leo TechnoSoft's Intelligence Driven SOC is an integrated stack of security solutions and offers security incident and event management (SIEM), identity and access management (IDM), privilege identity

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • security operation center features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    RinTchen
    Year Founded
    2004
    HQ Location
    Sherman Oaks, US
    LinkedIn® Page
    www.linkedin.com
    165 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Leo TechnoSoft's Intelligence Driven SOC is an integrated stack of security solutions and offers security incident and event management (SIEM), identity and access management (IDM), privilege identity

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
security operation center features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
RinTchen
Year Founded
2004
HQ Location
Sherman Oaks, US
LinkedIn® Page
www.linkedin.com
165 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Data Lake features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    55,508 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,888 employees on LinkedIn®
    Ownership
    NASDAQ: S
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
SentinelOne Singularity Data Lake features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
55,508 Twitter followers
LinkedIn® Page
www.linkedin.com
2,888 employees on LinkedIn®
Ownership
NASDAQ: S
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SIMBUS is a complete privacy and security management software that is designed to help any size facility get and maintain compliance.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SIMBUS features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Simbus
    Year Founded
    2014
    HQ Location
    Lake Forest, US
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SIMBUS is a complete privacy and security management software that is designed to help any size facility get and maintain compliance.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
SIMBUS features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Simbus
Year Founded
2014
HQ Location
Lake Forest, US
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SOC Prime operates the world’s largest and most advanced platform for collective cyber defense that cultivates collaboration from a global cybersecurity community and curates the most up-to-date Sigma

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SOC Prime Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SOC Prime
    Year Founded
    2015
    HQ Location
    Boston, MA
    Twitter
    @SOC_Prime
    5,171 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

SOC Prime operates the world’s largest and most advanced platform for collective cyber defense that cultivates collaboration from a global cybersecurity community and curates the most up-to-date Sigma

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
SOC Prime Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
SOC Prime
Year Founded
2015
HQ Location
Boston, MA
Twitter
@SOC_Prime
5,171 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SPHERE is the leader in Identity Hygiene.  We help companies maintain real-time visibility, achieve least privilege, and automate identity risk mitigation. Organizations struggle with excessive, unmon

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SPHEREboard features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

SPHERE is the leader in Identity Hygiene.  We help companies maintain real-time visibility, achieve least privilege, and automate identity risk mitigation. Organizations struggle with excessive, unmon

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
SPHEREboard features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details

Learn More About Security Information and Event Management (SIEM) Software

What is security information and event management (SIEM) software?

Security Information and Event Management (SIEM) is a centralized system for threat detection that aggregates security alerts from multiple sources, simplifying threat response and compliance reporting. SIEM software is one of the most commonly used tools for security administrators and security incident response professionals. They provide a single platform capable of facilitating event and threat protection, log analysis and investigation, and threat remediation. Some cutting-edge tools provide additional functionality for creating response workflows, data normalization, and advanced threat protection.

SIEM platforms help security programs operate by collecting security data for future analysis, storing these data points, correlating them to security events, and facilitating analysis of those events.

Security teams can define rules for typical and suspicious activities with SIEM tools. Advanced Next-Gen SIEM solutions leverage machine learning and AI to refine behavior models continuously, enhancing User and Entity Behavior Analytics (UEBA) and reducing false positives. These systems analyze data against set rules and behavioral patterns, flagging notable events when anomalies are detected.

Companies using SIEM solutions deploy sensors across digital assets to automate data collection. Sensors relay information back to the SIEM’s log and event database. When additional security incidents arise, the SIEM platform detects anomalies. It correlates similar logs to provide context and threat information for security teams as they attempt to remediate any existing threats or vulnerabilities.

What does SIEM stand for?

SIEM stands for security information and event management (SIEM), which is a combination of two different acronyms for security technology: security information monitoring (SIM) and security event management (SEM).

SIM is the practice of collecting, aggregating, and analyzing security data, typically in the form of logs. SIM tools automate this process and document security information for other sources, such as intrusion detection systems, firewalls, or routers. Event logs and their associated informational components are recorded and stored for long periods for either retrospective analysis or compliance requirements.

SEM is a family of security software for discovering, analyzing, visualizing, and responding to threats as they arise. SEM is a core component of a security operations system. While SIM tools are designed for log collection and storage, SEM tools typically rely on SQL databases to store specific logs and other event data as they are generated in real time by security devices and IT systems. They usually also provide the functionality to correlate and analyze event data, monitor systems in real time, and alert security teams of abnormal activity.

SIEM combines the functionality of SIM and SEM to centralize control over log storage, event management, and real-time analysis. SIM and SEM have become defunct technologies, as SIEM’s rise has provided dual-purpose functionality. SIEM vendors offer a single tool capable of performing data aggregation, information correlation, and event management.

Types of SIEM solutions

Traditional SIEM

Traditional SIEM tools are deployed on-premises with sensors placed on IT assets to analyze events and collect system logs. The data is used to develop baseline references and identify indicators of compromise. The SIEM product alerts security teams for intervention when a system becomes compromised. 

Cloud or virtual SIEM

Cloud-based and virtualized SIEM software are tools typically used to secure cloud infrastructure and services a cloud provider delivers. These tools are often less expensive than on-premises solutions and more accessible to implement, as no physical labor is required. They are ideal for companies without local IT infrastructure.

Managed SIEM services

Companies that do not have a full-fledged security program may choose managed SIEM services to aid in management and reduce work for internal employees. These SIEM services are delivered by managed service providers who provide the customer data and dashboards with security information and activity, but the provider handles implementation and remediation. 

What are the common features of SIEM systems?

The following are some core features within SIEM software that can help users collect security data, analyze logs, and detect threats:

Activity monitoring: SIEM systems document the actions from endpoints within a network. The system alerts users of incidents and abnormal activities and documents the access point. Real-time tracking will document these for analysis as an event takes place.

Asset management: These SIEM features keep records of each network asset and its activity. The feature may also refer to the discovery of new assets accessing the network.

Log management: This functionality documents and stores event logs in a secure repository for reference, analysis, or compliance reasons.

Event management: As events occur in real time, the SIEM software alerts users of incidents. This allows security teams to intervene manually or trigger an automated response to resolve the issue.

Automated response: Response automation reduces the time spent diagnosing and resolving issues manually. The features are typically capable of quickly resolving common network security incidents.

Incident reporting: Incident reports document cases of abnormal activity and compromised systems. These can be used for forensic analysis or as a reference point for future incidents.

Threat intelligence: Threat intelligence feeds integrate information to train SIEM systems to detect emerging and existing threats. These threat feeds store information related to potential threats and vulnerabilities to ensure issues are discovered and teams are provided with the information necessary to resolve the problems as they occur.

Vulnerability assessment: Vulnerability assessment tools may scan networks for potential vulnerabilities or audit data to discover non-compliant practices. Mainly, they’re used to analyze an existing network and IT infrastructure to outline access points that can be easily compromised.

Advanced analytics: Advanced analytics features allow users to customize analysis with granular or individually specific metrics pertinent to the business’ resources.

Data examination: Data examination features typically facilitate the forensic analysis of incident data and event logs. These features allow users to search databases and incident logs to gain insights into vulnerabilities and incidents.

What are the benefits of using SIEM products?

Below are a few of the main reasons SIEM software is commonly used to protect businesses of all sizes:

Data aggregation and correlation: SIEM systems and companies collect vast amounts of information from an entire network environment. This information is gathered from virtually anything interacting with a network, from endpoints and servers to firewalls and antivirus tools. It is either given directly to the SIEM or using agents (decision-making programs designed to identify irregular information). The platform is set up to deploy agents and collect and store similar information together according to security policies set in place by administrators.

Incident alerting: As information comes in from a network’s various connected components, the SIEM system correlates it using rule-based policies. These policies inform agents of normal behavior and threats. If any action violates these policies or malware or intrusion is discovered. At the same time, the SIEM platform monitors network activity; it is labeled as suspicious, security controls restrict access, and administrators are alerted.

Security analysis: Retrospective analysis may be performed by searching log data during specific periods or based on specific criteria. Security teams may suspect a certain misconfiguration or kind of malware caused an event. They may also suspect an unapproved party went undetected at a specific time. Teams will analyze the logs and look for specific characteristics in the data to determine whether their suspicion was right. They may also discover vulnerabilities or misconfigurations that leave them susceptible to attack and remediate them.

Challenges with SIEM software

Staffing: There is an existing shortage of skilled security professionals. Managing SIEM products and maintaining a well-rounded security posture requires dedicated personnel with highly specialized skills. Some smaller or growing companies may not have the means to recruit, hire, and retain qualified security pros. In such cases, businesses can consider managed services to outsource the labor. 

Compliance: Some industries have specific compliance requirements determined by various governing bodies, but SIEM software can be used across several industries to maintain compliance standards. Many industry-specific compliance requirements exist, but most require security teams to protect sensitive data, restrict access to unapproved parties, and monitor changes made to identities, information, or privileges. For example, SIEM systems can maintain GDPR compliance by verifying security controls and data access, facilitating long-term storage of log data, and notifying security staff of security incidents, as GDPR requires.

Which companies should buy SIEM solutions?

Vertical industries: Vertical industries, such as healthcare and financial services, often have additional compliance requirements related to data protection and privacy. SIEM is an ideal solution for outlining requirements, mapping threats, and remediating vulnerabilities. 

SaaS business: SaaS businesses utilizing resources from a cloud service provider are still responsible for a significant portion of the security efforts required to protect a cloud-native business. These companies may jump for cloud-native SIEM tools but will benefit from any SIEM to prevent, detect, and respond to threats. 

How to choose the best SIEM software

Requirements Gathering (RFI/RFP) for Security Information and Event Management (SIEM) Software

The first step to purchasing a SIEM solution is to outline the options. Companies should be sure whether they need a cloud-based or on-premises solution. They should also outline the number of interconnected devices they need and whether they want physical or virtual sensors to secure them. Additional and possibly obvious requirements should include budgetary considerations, staffing limitations, and required integrations

Compare Security Information and Event Management (SIEM) Software Products

Create a long list

Once the requirements are outlined, buyers should prioritize the tools and identify the ones with as many features as possible that fit the budget window. It is recommended to restrict the list to products with desired features, pricing, and deployment methods to identify a dozen or so options. For example, if the business needs a cloud-native SIEM for less than $10k a year, half of the SIEM options will be eliminated. 

When choosing a SIEM provider, focus on the vendor’s experience, reputation, and specific functionality relevant to your security needs. Core capabilities ensure essential threat detection, while next-gen features add advanced intelligence and automation, allowing for a more proactive security posture. Here’s a breakdown to guide your selection:

Core SIEM capabilities

  • Threat detection: Look for SIEMs with robust threat detection, which uses rules and behavioral analytics, along with threat feed integration, to accurately identify potential threats.
  • Threat intelligence and security alerting: Leading SIEMs incorporate threat intelligence feeds, aggregate security data, and alert you when suspicious activities are detected, ensuring real-time updates on evolving threats.
  • Compliance reporting: Compliance support is crucial, especially for meeting standards like HIPAA, PCI, and FFIEC. SIEMs streamline compliance assessment and reporting, helping prevent costly non-compliance.
  • Real-time notifications: Swift alerts are vital; SIEMs that notify you of breaches immediately enable faster responses to potential threats.
  • Data aggregation: A centralized view of all network activities ensures no area is left unmonitored, which is crucial for comprehensive threat visibility as your organization scales.
  • Data normalization: SIEMs that normalize incoming data make it easier to analyze security events and extract actionable insights from disparate sources.

Next-gen SIEM capabilities

  • Data collection and management: Next-gen SIEMs pull data from the cloud, on-premises, and external devices, consolidating insights across the entire IT environment.
  • Cloud delivery: Cloud-based SIEMs use scalable storage, accommodating large data volumes without the limitations of on-premises hardware.
  • User and entity behavior analytics (UEBA): By establishing normal user behavior and identifying deviations, UEBA helps detect insider threats and new, unknown threats.
  • Security orchestration and automation response (SOAR): SOAR automates incident response, integrates with IT infrastructure, and enables coordinated responses across firewalls, email servers, and access controls.
  • Automated attack timelines: Next-gen SIEMs automatically create visual attack timelines, simplifying investigation and triage, even for less experienced analysts.

Selecting an SIEM vendor with both core and next-gen capabilities offers your organization a comprehensive and agile approach to security, meeting both current and future requirements.

Create a short list

Narrowing down a short list can be tricky, especially for the indecisive, but these decisions must be made. Once the long list is limited to affordable products with the desired features, it’s time to search for third-party validation. For each tool, the buyer must analyze end-user reviews, analyst reports, and empirical security evaluations. Combining these specified factors should help rank options and eliminate poorly performing products.  

Conduct demos

With the list narrowed down to three to five possible products, businesses can contact vendors and schedule demos. This will help them get first-hand experience with the product, ask targeted questions, and gauge the vendors' quality of service. 

Here are some essential questions to guide your decision:

  • Will the tool enhance log collection and management?:

Effective log collection is foundational. Look for compatible software across systems and devices, offering a user-friendly dashboard for streamlined monitoring.

  • Does the tool support compliance efforts?

Even if compliance isn't a priority, choosing an SIEM that facilitates auditing and reporting can future-proof your operations. Look for tools that simplify compliance processes and reporting.

  • Can the tool leverage past security events in threat response?

One of SIEM’s strengths is using historical data to inform future threat detection. Ensure the tool offers in-depth analytics and drill-down capabilities to analyze and act on past incidents.

  • Is the incident response fast and automated?

Timely, effective responses are critical. The tool should provide customizable alerts that notify your team immediately when needed so you can confidently leave the dashboard. 

Selection of Security Information and Event Management (SIEM) Software

Choose a selection team

Decision-makers need to involve subject matter experts from all teams that will use the system in choosing a selection team. For backup software, this primarily involves product managers, developers, IT, and security staff. Any manager or department-level leader should also include individuals managing any solution the backup product will be integrating with. 

Negotiation

The seniority of the negotiation team may vary depending on the maturity of the business. It is advisable to include relevant directors or managers from the security and IT departments as well as from any other cross-functional departments that may be impacted.

Final decision

If the company has a chief information security officer (CISO), that individual will likely decide. If not, companies must trust their security professionals’ ability to use and understand the product. 

How much does SIEM software cost?

Potential growth should be considered if the buyer chooses a cloud-based SIEM tool that offers pricing on the SaaS pay-as-you-use model. Some solutions are inexpensive at the start and offer affordable, low-tier pricing. Alternatively, some may rapidly increase pricing and fees as the company and storage need to scale. Some vendors provide permanently free backup products for individuals or small teams.

Cloud SIEM: SIEM as a service pricing may vary, but it traditionally scales as storage increases. Additional costs may come from increased features such as automated remediation, security orchestration, and integrated threat intelligence. 

On-premises SIEM: On-premises solutions are typically more expensive and require more effort and resources. They will also be more costly to maintain and require dedicated staff. Still, companies with high compliance requirements should adopt on-premises security regardless. 

Return on Investment (ROI)

Cloud-based SIEM solutions will provide a quicker ROI, similar to their lower average cost. The situation is pretty cut and dry since there is much lower initial investment and lower demand for dedicated staffing. 

However, for on-premises systems, the ROI will depend on the scale and scope of business IT systems. Hundreds of servers will require hundreds of sensors, potentially more, as time wears on computing equipment. Once implemented, they must be operated and maintained by (expensive) security professionals.