Security Information and Event Management Solutions Directory

Below is a SIEM Solutions Directory of the Top 24 Security Information and Event Management Solutions and SIEM software vendors including a solutions overview, More Details supported and links to social media. If you would like an easy to reference printed version of this SIEM Solutions Directory page including complete solutions profiles and a list of the top questions to ask in an RFP – Request for Proposal, click here for a Free PDF.

Link to SIEM Buyer's Guide

Link to Alert Logic
Solutions Overview

Houston-based Alert Logic provides Security-as-a-Service (SaaS) for on-premises, cloud, and hybrid infrastructures, delivering security insight and protection with an emphasis on cloud security. The company partners with cloud platforms and hosting providers, protecting 3,000+ organizations.

Download this Directory and get our Free Security Information and Event Management Buyer’s Guide.

More Detail

Alert Logic is well-suited for small to mid-sized companies, especially those operating primarily or those to migrate to the cloud via digital transformation. Their expertise can be a boon to overworked IT departments, especially important during the current cybersecurity staffing crisis.

Contact

1776 Yorktown
Houston, TX
United States
+1 (877) 960-3383
www.alertlogic.com

AT&T Cybersecurity SIEM
Solutions Overview

The AT&T Cybersecurity solution—the AlienVault® Unified Security Management® (USM) solution—combines SIEM and log management capabilities with other essential security tools—including asset discovery, vulnerability assessment, and intrusion detection (NIDS and HIDS)—to provide centralized security monitoring of networks and endpoints across cloud and on-premises environments– from a single pane of glass.

Download this Directory and get our Free Security Information and Event Management Buyer’s Guide.

More Detail

The ease-of-use and speed-to-deployment of the AlienVault Unified Security Management (USM) platform provided by AT&T Cybersecurity makes it a good fit for enterprises with a smaller staff and limited security budget. Many of their enterprise-level features are also competitively priced.

Contact

AT&T Cybersecurity
1100 Park Place
Suite 300
San Mateo, CA 94403
+1 650 713-3333
www.alienvault.com

Link to BlackStratus
Solutions Overview

BlackStratus, a SIEM technology and service-focused solution provider headquartered in New Jersey, provides reliable and innovative security event correlation and log management capabilities. They also offer security and compliance management.

Download this Directory and get our Free Security Information and Event Management Buyer’s Guide.

More Detail

BlackStratus has been expanding its features and its integration, and aims to fit businesses of all sizes. It is a good fit for service providers requiring a customizable SIEM platform, and for service-centric end-user organizations looking for well-formed multi-tenancy support.

Contact

1151 S Washington Ave
Piscataway, NJ
United States
+1 (732) 393-6000
www.blackstratus.com

Link to CorreLog
Solutions Overview

CorreLog, Inc. supplies software-based solutions needed to implement or enhance SIEM and enterprise system management services. These standards-based components are easy to deploy and get started with. CorreLog has the capability to work either independently of, or alongside, other SIEM technology to improve threat management and incident response capabilities.

Download this Directory and get our Free Security Information and Event Management Buyer’s Guide.

More Detail

An affordable and easy to implement SIEM and email security solution, CorreLog is a good option for smaller to mid-sized businesses. Their solution is also of interest to enterprises of all sizes worried about phishing attacks, the most common attack tactic of external hackers.

Contact

1004 Collier Center
Naples, FL
United States
+1 (877) 267-7356
www.correlog.com

Link to Cygliant
Solutions Overview

Originally EiQ NetWorks’, Cygilant’s origins lie in the analysis of enterprise log files across web servers, file servers, firewalls, and other network devices. Having moved into the SIEM market only recently, Cygilant seeks to reduce cyber risk and enable enterprises to implement comprehensive strategies to combat cyber risk by combining security programs with insurance coverage.

Download this Directory and get our Free Security Information and Event Management Buyer’s Guide.

More Detail

Cygilant is a good option for small and mid-sized enterprises who need to protect themselves against cyberattacks but lack IT or cybersecurity resources or on-staff expertise. Their solutions help enterprises manage their IT infrastructure costs while improving their IT security, deliberately designing their solutions to help lean IT staff with limited budgets.

Contact

60 State St
Boston, MA
United States
+1 (617) 337-4880
www.cygliant.com

Link to Exabeam
Solutions Overview

Exabeam offers their Security Intelligence Platform as a collection of components—built on several big data platforms—that be selected and deployed separately. Their Log Manager component handles the data management, including collection and storage, and can collect from both local endpoints and cloud-based applications.

Download this Directory and get our Free Security Information and Event Management Buyer’s Guide.

More Detail

Exabeam was named to Gartner’s 2018 SIEM Magic Quadrant as a Leader, which singled out their granular role-based data and workflow capabilities. Their licensing approach—based on the number of users in an enterprise—and their customization options due to their deployment-based model have also received praise.

Contact

2 Waters Park Dr
San Mateo, CA
United States
+1 (844) 392-2326
www.exabeam.com

Link to Fortinet
Solutions Overview

Also based out of California, Fortinet offers their platform FortiSIEM. FortiSIEM provides SIEM, file integrity monitoring (FIM), configuration management database (CMDB), and availability and performance capabilities. Analytics-driven IT operations and cloud management are provided, helping companies manage and monitor network performance, security, and compliance requirements.

Download this Directory and get our Free Security Information and Event Management Buyer’s Guide.

More Detail

Fortinet provides top-rated network and content security, as well as secure access products that share intelligence and work together to form a cooperative fabric. Our unique security fabric combines Security Processors, an intuitive operating system, and applied threat intelligence to give you proven security, exceptional performance, and better visibility and control–while providing easier administration.

Contact

899 Kifer Rd
Sunnyvale, CA
United States
+1 (408) 235 7700
https://www.fortinet.com/

Link to IBM
Solutions Overview

IBM Security’s QRadar Platform offers log and risk management that can be deployed as an appliance, a virtual appliance, or a SaaS infrastructure as a service (IaaS); this makes them well-suited to different IT environments. They also deliver a hybrid option, with on-premises QRadar deployment combined with a SaaS solution hosted on their IBM Cloud.

Download this Directory and get our Free Security Information and Event Management Buyer’s Guide.

More Detail

IBM’s QRadar is best suited for midsize to large enterprises with general SIEM requirements, and those whose use cases require behavior analysis, network flow, and packet analysis; IBM has worked to expand over these capabilities over past few years. Its unified platform covers a wide range of security monitoring tools, and has native threat detection.

Contact

1 New Orchard Rd
Armonk, NY
United States
+1 (800) 426-4968
www.ibm.com

Link to Lacework
Solutions Overview

Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks across cloud workloads and containers. Lacework’s unified cloud security platform provides unprecedented visibility, automates intrusion detection, delivers one-click investigation, and simplifies cloud compliance.

Download this Directory and get our Free Security Information and Event Management Buyer’s Guide.

More Detail

Lacework works to bring automation, speed, and scale to cloud security by enabling enterprises to securely innovate in the cloud. Lacework is designed to self-adapt to the cloud’s ever-changing configuration and workloads. The Lacework team focuses on giving customers visibility and control over their cloud operations at cloud scale to the monitoring of all activities across all cloud components.

Contact

700 E El Camino Real
Mountain View, CA
United States
+1 (888) 292-5027
www.lacework.com

Link to Logentries
Solutions Overview

Boston-based Logentries offers a real-time log management and analytics service built for the cloud. These SIEM solutions securely collect log data while preventing unencrypted sensitive data from leaving your IT environment without consent from the security team.

Download this Directory and get our Free Security Information and Event Management Buyer’s Guide.

More Detail

Logentries is a good solution for companies that want aggregated log management and security event correlation across their entire IT infrastructure. Because it is easy to use, LogEntries can appeal to small, large, and mid-sized enterprises interested in behavioral analytics.

Contact

100 Summer St
Boston, MA
United States
+1 (617) 366-2850
www.logentries.com

Link to LogPoint
Solutions Overview

Danish LogPoint’s full enterprise SIEM solution extracts security events and incidents from logs existing in IT infrastructures and environments of any size. Filtered and correlated real-time results are displayed in dashboards that can be configured based on the specific roles and responsibilities of each user.

Download this Directory and get our Free Security Information and Event Management Buyer’s Guide.

More Detail

LogPoint offers SIEM solutions to smaller companies with limited budgets and operational capabilities, as well as large, complex multinational enterprises. While they mostly operate in Europe, they also have partnerships across the globe and continue to grow their footprint.

Contact

Jagtvej 169B 2100
Københaven Ø
Denmark
+45 70 60 61 00
www.logpoint.com

Link to LogRhythm
Solutions Overview

LogRhythm, the Colorado-based solution provider, combines SIEM, Security Analytics (including UEBA), Log Management, and Network and Endpoint Monitoring with Machine Analytics and Host and Network Forensics in a unified Security Intelligence Platform. Their SIEM solution consists of several unified components: the Event Manager, Log Manager, Advanced Intelligence Engine (AI Engine), and Console.

Download this Directory and get our Free Security Information and Event Management Buyer’s Guide.

More Detail

LogRhythm primarily caters to companies that desire an end-to-end workflow that sorts through security alert noise and quickly discovers, investigates, and responds to cyber threats via SIEM, security analytics and network/endpoint monitoring solutions. LogRhythm’s well-regarded innovations in usability facilitates their solutions’ deployment and performance.

Contact

4780 Pearl East Circle
Boulder, CO
United States
+1 (303) 413-8475
www.logrhythm.com

Link to LogSign
Solutions Overview

Logsign is an Istanbul, Turkey-based company focused on next-gen SIEM (Security Information and Event Management) solutions.

Download this Directory and get our Free Security Information and Event Management Buyer’s Guide.

More Detail

Logsign offers a security driven logging solution that can integrate with hundreds of vendors over tens of protocols. As a vendor agnostic company, they supply vast support to new/custom logging formats. Logsign installations can scale from a single server installation to tens of servers both vertically and horizontally in an almost linear fashion.

Contact

İçerenköy mah. Erkut Sok.
Üner Plaza B Blok No:4
Istanbul, Turkey
+90 (216) 688-8001
www.logsign.com/

Link to ManageEngine
Solutions Overview

A division of Zoho, ManageEngine’s Log360 solution simplifies IT management with an affordable software solution that offers the ease-of-use smaller enterprises need and the powerful features the largest enterprises demand. Log360 features the ManageEngine EventLog Analyzer: a web-based, agentless syslog and windows event log management solution for security information management that collects, analyses, archives, and reports on event logs from distributed Windows host and syslogs from myriad data sources including UNIX hosts, Routers & Switches.

Download this Directory and get our Free Security Information and Event Management Buyer’s Guide.

More Detail

ManageEngine is a cost-effective solution that is a good option for small and mid-sized businesses and enterprises. They also offer a pay-as-you-go pricing model coupled with the ability to scale services up or down as needed, ideal for enterprises looking to expand their footprint.

Contact

4141 Hacienda Dr
Pleasanton, CA
United States
+1 (925) 924-9500
www.manageengine.com/

Link to McAfee
Solutions Overview

2017 witnessed Intel Security separating from McAfee, who has returned to the market as an independent entity. Since then they have served as a key player in SIEM and threat intelligence research. Their Enterprise Security Manager (ESM) consolidates, correlates, assesses, and prioritizes security events for both third-party and Intel Security solutions.

Download this Directory and get our #Free Security Information and Event Management Buyer’s Guide.

More Detail

McAfee Enterprise Security Manager is a good option for enterprises looking for an integrated security framework that includes advanced threat defense or monitoring of industrial control systems. The Forrester Wave report for Security Analytics named McAfee a Strong Performer, and the Gartner 2018 SIEM Magic Quadrant named them a leader for their UEBA/analytics offerings and its leveraging of big data technologies.

Contact

2821 Mission College Blvd
Santa Clara, CA
United States
+1 (888) 847-8766
www.mcafee.com

Link to Micro Focus
Solutions Overview

Micro Focus’ acquisition of HPE also meant the acquisition of their extensive SIEM platform ArcSight. ArcSight’s portfolio includes Enterprise Security Manager (ESM) software for large-scale, SEM-focused deployments. They also offer ArcSight Express, which is an appliance-based solution for the SIEM midmarket with pre-configured monitoring and reporting.

Download this Directory and get our Free Security Information and Event Management Buyer’s Guide.

More Detail

ArcSight ESM is best for large-scale deployments with comprehensive in-house security support. ArcSight Express is a good fit for midsize deployments and businesses. A year after its acquisition, it appears Micro Focus is investing in and focusing on their ArcSight Solution—consequently, they appear to be diverting fewer resources to their NetIQ solution.

Contact

700 King Farm Blvd
Rockville, MD
United States
+1 (301) 838-5000
www.microfocus.com

Link to RSA
Solutions Overview

A giant in the sphere, RSA’s NetWitness suite provides visibility from logs, full network packet, NetFlow, and endpoint data capture. The NetWitness Logs facilitates the automated collection, analysis, alerting, auditing, reporting, and secure storage of all logs. Organizations can simplify compliance by using regulation specific, out-of-the-box reports, alerts, and correlations rules. Reports can be scheduled to be delivered at a specific time or run on an adhoc basis.

Download this Directory and get our Free Security Information and Event Management Buyer’s Guide.

More Detail

RSA is best-suited for security-conscious companies that need log-based and network-level monitoring for threat detection and investigation, and have an incident response team. Their logging and documentation capabilities are solid. RSA works best for companies that have a good deal of technical knowhow on hand, as the interface and the numerous moving parts can be overwhelming without it.

Contact

174 Middlesex Tpke
Bedford, MA
United States
+ 1 (781) 515-5000
www.rsa.com

Link to Seceon
Solutions Overview

Seceon seeks to empower enterprises and MSSPs to provide comprehensive cybersecurity. Seceon’s threat models, machine learning, and artificial intelligence coalesce to provide actionable contextual awareness; this enables the proactive surfacing of threats and the automatic containment and elimination of them in real-time. Seceon’s Open Threat Management (OTM) platform scales to collect raw data such as streaming logs, network flows and identities from all apps, devices, networks and cloud infrastructures. This can include SaaS, PaaS, IaaS, IoTs and IIoTs. aiSIEM and aiMSSP solutions are built on the OTM platform to support enterprise cybersecurity and MSSPs offering aiMDR, aiSOC and aiSIEM services with flexible deployment models.

Download this Directory and get our Free Security Information and Event Management Buyer’s Guide.

More Detail

Seceon aiSIEM solution can assist enterprises interested in building an AI-assisted SOC to protect their on-premise and/or cloud assets while working to improve the effectiveness of their security analysts and significantly reducing their TCO. aiSIEM can be deployed as a standalone solution in cloud, on-premise, or hybrid environments and can scale horizontally to surface prioritized alerts and automatically contain/eliminate those threats. Seceon aiMSSP solution helps MSSPs to offer Managed Security Services (MSS) which includes Managed Detection and Response (MDR), Managed SIEM and Managed SoC services..

Contact

238 Littleton Rd
Westford, MA
United States
+1 (978) 923-0040
www.seceon.com

Link to Securonix
Solutions Overview

Running off a Hadoop big data platform, Securonix offers the Snypr Security Analytics solution as their SIEM platform. Among their capabilities includes a library of threat signatures, UEBA functionality, and event and data collection. Other functions include configuration, indexing via Search Service, data parsing and normalization via enrichment services, and correlation services.

Download this Directory and get our Free Security Information and Event Management Buyer’s Guide.

More Detail

In Gartner’s 2018 SIEM Magic Quadrant, they praised Securonix’s flexible delivery models and its data management capabilities.Their use cases can extensively support out-of-the-box content, and they can ingest a wide set of data sources. Customers praise its ease of implementation and give it positive feedback overall.

Contact

5777 W. Century Blvd
Los Angeles, CA
United States
+1 (310) 641-1000
www.securonix.com

Link to SolarWinds
Solutions Overview

A member of the SolarWinds family, SolarWinds MSP provides security software for MSPs, MSSPs, MDRs, and IT Pros. Their solution Threat Monitor works to reduce complexity in threat detection, response, and reporting; it also provides unified and scalable support for security operations centers. Further, the SolarWinds Threat Monitor solution offers threat intelligence and log correlation while working to reduce noise with centralized security monitoring. Other Threat Monitor capabilities include the alarm engine, automated responses, advanced log search, network and host intrusion detection systems, and log-event archiving.

Download this Directory and get our Free Security Information and Event Management Buyer’s Guide.

More Detail

SolarWinds MSP can provide MSSPs, MSPs, MDRs and IT Pros of all sizes—especially small-to-midsize providers—with a centralized command hub for threat monitoring, threat response, and threat intelligence. The Threat Monitor Platform allows for easy adoption and integration and offers a smooth compliance report generation and scheduling experience for MSSPs through report templates. SolarWinds MSP works to reduce MSPs’ and MSSPs’ overhead in cybersecurity while providing necessary tools.

Contact

7171 Southwest Pkwy
Austin, TX
United States
+1 (866) 530-8040
www.solarwinds.com

Link to Splunk
Solutions Overview

California’s Splunk provides pre-packaged dashboards, reports, incident response workflows, analytics, and correlations to identify, investigate, and respond to internal and external threats. Its security intelligence platform provides event and data collection with visualization options and use-case agnostic data analysis capabilities for IT operations.

Download this Directory and get our Free Security Information and Event Management Buyer’s Guide.

More Detail

Splunk continues to add machine learning-based user behavioral analytics to better detect threats, and has a full suite of solutions that allows for growth into the platform. Companies looking for a customizable SIEM platform in order to support analytic functions and third-party integration may find their solution here.

Contact

270 Brennan St
San Francisco, CA
United States
+1 (415) 848-8400
www.splunk.com

Link to Sumo Logic
Solutions Overview

California’s Sumo Logic principle focus as a solution provider is log aggregation. However this statement, while true, does not paint the full picture of Sumo Logic’s capabilities. It also enables enterprises to build analytical power that transforms daily operations into intelligent business decisions.

Download this Directory and get our Free Security Information and Event Management Buyer’s Guide.

More Detail

Sumo Logic offers a flexible and market dynamic payment options for their solution, which works well with companies of all sizes. Its price points are competitive for the market, and it’s entirely cloud-based and maintenance free. Enterprises interested in Sumo Logic should take note: they will need a solid underlying internet connection to take advantage of Sumo Logic’s SIEM and security analytics offerings.

Contact

305 Main St
Redwood City, CA
United States
+1 (855) 564-7866
www.sumologic.com

Link to Tenable
Solutions Overview

Hailing from Maryland, Tenable offers SIEM which leverages the log management capabilities of their Log Correlation Engine (LCE) to collect all logs, software activity, user events, and network traffic across the entire IT environment. Tenable analyzes data for correlated events and impact on security and compliance posture.

Download this Directory and get our Free Security Information and Event Management Buyer’s Guide.

More Detail

Tenable is a good option for organizations of all size, from small businesses to large enterprises. For the most part, Tenable is used by large enterprises, companies, and organizations, as it offers the capabilities suited for their large data volume demands.

Contact

7021 Columbia Gateway Dr
Columbia, MD
United States
+1 (410) 872-0555
www.tenable.com/

Link to Trustwave
Solutions Overview

Trustwave’s Managed SIEM services provide threat intelligence, efficiency, and automation to organizations of all sizes. Their service is ideal for consumer-facing businesses, as includes the Payment Card Industry Data Security Standard (PCI DSS)—a high standard and important compliance capability.

Download this Directory and get our Free Security Information and Event Management Buyer’s Guide.

More Detail

Trustwave would be a good choice for midsized organizations seeking SIEM that will offer a variety of technologies and service options to meet compliance and threat management requirements simultaneously. They’ve integrated with numerous telecommunications companies, indicating their effectiveness in high-speed environments.

Contact

70 W. Madison St
Chicago, IL
United States
+1 (312) 873-7500
www.trustwave.com