SIEM Tools

SelectHub is real people helping you find the best SIEM Tools for your unique business needs while recognizing the true solution leaders who help make your decisions possible.
18 Products found for

SIEM Tools

Sort by:

EventTracker

User Sentiment:
86%

Netsurion’s EventTracker is a security management platform that provides its users with complete protection through an adaptive security architecture. It integrates prediction, prevention, detection and response to increase effectiveness and decrease costs. It lets users monitor and analyze the alerts and reports produced by SIEM technology. It supports event log monitoring and management to help enterprise networks with day-to-day administration. It unifies security orchestration, behavior analytics and machine learning to shield organizations against cybersecurity threats.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

ArcSight

User Sentiment:
n/a

A comprehensive Security Information Event Management (SIEM) solution that enables cost-effective compliance and provides advanced security analytics to identify threats and manage risk, so you can protect your business.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

ARCSIGHT LOGGER

User Sentiment:
n/a

HP ArcSight Logger delivers a cost-effective universal log management solution that unifies searching, reporting, alerting, and analysis across any type of enterprise machine data. This unified machine data can be used for compliance, regulations, security, IT operations, and log analytics

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

McAfee SIEM

User Sentiment:
n/a

High-performance, powerful security information and event management (SIEM) brings event, threat, and risk data together to provide strong security intelligence, rapid incident response, seamless log management, and extensible compliance reporting. At the core of SIEM offering, Enterprise Security Manager consolidates, correlates, assesses, and prioritizes security events for both third-party and McAfee solutions.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Splunk Enterprise Security

User Sentiment:
n/a

Splunk® offers the leading platform for Operational Intelligence. It enables the curious to look closely at what others ignore—machine data—and find what others never see: insights that can help make your company more productive, profitable, competitive and secure. Splunk Enterprise is the leading platform for realtime operational intelligence. It’s the easy, fast and secure way to search, analyze and visualize the massive streams of machine data generated by your IT systems and technology infrastructure—physical, virtual and in the cloud.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

QRadar

User Sentiment:
n/a

IBM® Security QRadar® SIEM consolidates log source event data from thousands of devices endpoints and applications distributed throughout a network. It performs immediate normalization and correlation activities on raw data to distinguish real threats from false positives. As an option, this software incorporates IBM Security X-Force® Threat Intelligence which supplies a list of potentially malicious IP addresses including malware hosts, spam sources and other threats.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

EventLog Analyzer

User Sentiment:
n/a

EventLog Analyzer is the most cost-effective Security Information and Event Management (SIEM) solution available in the market. EventLog Analyzer meets all critical SIEM capabilities such as log aggregation from heterogeneous sources, log analysis, compliance reporting, file integrity monitoring, user activity monitoring, object access auditing, event correlation, real-time alerting, log forensics, and log retention.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Trustwave Managed Security

User Sentiment:
n/a

Managed Security Testing from Trustwave SpiderLabs delivers on-demand, precision penetration testing with just a few clicks of a mouse. With a subscription, users can login to the portal and schedule web application and internal or external network testing on demand and with pre-defined pricing.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

LogRhythm SIEM

User Sentiment:
n/a

LogRhythm is an enterprise-class platform that seamlessly combines SIEM, Log Management, File Integrity Monitoring and Machine Analytics, with Host and Network Forensics, in a unified Security Intelligence Platform. It is designed to address an ever-changing landscape of threats and challenges, with a full suite of high-performance tools for security, compliance, and operations. LogRhythm delivers comprehensive, useful and actionable insight into what is really going on in and around an enterprise IT environment.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Log Management & SIEM

User Sentiment:
n/a

Tenable's security information and event management (SIEM) solution leverages the log management capabilities of the Log Correlation Engine (LCE) to collect all logs, software activity, user events, and network traffic. It analyzes all data for correlated events and impact on security and compliance posture. Event context and threat-list intelligence about any system is provided by Tenable Nessus vulnerability and configuration scans and real-time monitoring with the Tenable Passive Vulnerability Scanner (PVS).

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Sentinal

User Sentiment:
n/a

NetIQ Sentinel™ is a full-featured Security Information and Event Management (SIEM) solution that simplifies the deployment, management and day-to-day use of SIEM, readily adapts to dynamic enterprise environments and delivers the true "actionable intelligence" security professionals need to quickly understand their threat posture and prioritize response.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

SIEM and Log Management Software

User Sentiment:
n/a

AlienVault Unified Security Management™ (USM) provides full function Security Information and Event Management (SIEM) and log management software capabilities, with the added advantage of integrated host and network IDS, netflow analysis, and vulnerability assessment for complete security monitoring. SIEM solutions include log management, event management, correlation, and more sophisticated reporting than purpose-built log management products. Both have value in the worsening threat landscape.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

TIBCO LogLogic

User Sentiment:
n/a

Log data isn't just for security anymore. Log and machine data is being harnessed to provide insight into IT operational efficiencies – and TIBCO LogLogic® uses log and machine data as the fuel for improving Operational Intelligence. TIBCO LogLogic solution helps you gain control of log data, accelerates time to insight, and provides assurance that the data you need is always there.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

AlienVault Unified Security Management

User Sentiment:
n/a

AlienVault’s Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. With all of the essential security controls built-in, and continuous threat intelligence updates from AlienVault Labs, USM provides unparalleled security visibility.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Mike Simonton

User Sentiment:
n/a

Tuliva is a Managed Services provider, provdiging hybrid IT Security Services and Cloud Hosting.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

SolarWinds SIEM

User Sentiment:
n/a

SolarWinds Security Information Event Management (SIEM) software is designed to provide automation, relief and strong situational awareness without the complexity of competing solutions.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Quatrix

User Sentiment:
n/a

Quatrix by Maytech provides simple one step web based file sharing for end users with enterprise-level controls, empowering IT to enforce compliance, data protection and information security policies through granular administrative controls and a full audit trial.Quatrix is also white labelled to fully integrate with your brand and corporate identity.Files are securely shared over HTTPS and protected at rest using AES-256 encryption which is suitable for most business workflows.Free trial is available for 14 days.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

NetIQ Security Management

User Sentiment:
n/a

NetIQ Identity-Powered Security Solutions work by integrating identity information with security monitoring, giving you the security intelligence you need, when you need it, to detect and respond to abnormal activity that signals a data breach or compliance gap. Our Security Management solutions provide visibility and control of user activities, security events, and critical systems across your organization to help you quickly address evolving threats.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Real People... with Data

We know selecting software can be overwhelming. You have a lot on the line and we want you to make your project a success, avoiding the pitfalls we see far too often.

As you get started with us, whether it be with Software Requirements templates, Comparing, Shortlisting Vendors or obtaining that elusive Pricing you need; know that we are here for you.

Our Market Research Analysts will take calls, and in 10 minutes, take your basic requirements and recommend you a shortlist to start with.