SRnewspaperTop SIEM Resources: Analyst Reports, Buyer’s Guides and Whitepapers

The editors at Solutions Review have compiled this collection of complimentary resources on the subject of Security Information and Event Management (SIEM). Below are whitepapers, Buyer’s Guides, vendor reviews and market reports from leading enterprise technology analysts like Gartner and Forrester.

And be sure to visit our other Cybersecurity sites: Identity Management and Endpoint Security.


2016 Security Information and Event Management Buyer’s Guide

This document includes a category overview, 10 questions to ask when considering SIEM initiatives, and a capabilities reference of the top 24 solution providers.

Gartner SIEM Magic Quadrant

Gartner Magic Quadrant for Security Information and Event Management

Gartner identifies, scores and compares the most significant solution providers in the SIEM category.



Gartner Critical Capabilities for Security Information and Event Management

Gartner evaluates how top SIEM solutions perform across three use cases: compliance, threat management, and SIEM



Changing the Security Monitoring Status Quo

Logs are inherently limited in the level security visibility that they provide. Consider a new way of looking at SIEM.


SIEM For Beginners

Need a crash course on SIEM? No problem. Our security gurus will explain what SIEM is (and isn’t) and how to get up and running with it quickly and painlessly.


SIEMplifying SMB Security Monitoring

Read this analyst report to learn more about the changing SIEM market and AlienVault’s SMB-focused approach to SIEM.




Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

Covers everything from basic network administration security skills through advanced command line scripting, tool customization, and log analysis skills.



ArcSight: Addressing Red Flag Requirements

Learn how to use SIEM to implement compliance monitoring, enable quick and easy forensic investigations into violations, and extend to broader security and compliance initiatives.



The Complete Guide to Log and Event Management

Learn about SIEM and Log Management use cases, differences, best practices and common mistakes.



Splunk, Big Data and the Future of Security

In order to seek out and detect today’s complex advanced persistent threats you need to monitor network, host and application behavior across your organization’s IT data.