Software Reviews covers 42 products in the Security Incident and Event Management market. Fast track your research by exploring our Data Quadrant,
sorting the software, purchasing our Security Incident and Event Management Category Report, or diving deeper into an individual product.
Arm yourself with real data so you can make better decisions with more confidence.
This content is not available with your current subscription.
Your current Info-Tech Research Group subscription does not include access to this content. Contact your account representative to learn more about gaining access to Premium SoftwareReviews.
The software experience is shaped by both the software and the relationship with the vendor. By comparing
vendors across both we provide a comprehensive understanding of the product and help identify vendors that
can deliver on both.
A thorough evaluation and ranking of all software in an individual category to compare software
across every dimension.
Search our library of thousands of software offerings to find your product, explore the data, or start a review.
Splunk Enterprise makes it simple to collect, analyze and act upon the untapped value of the big data generated by your technology infrastructure, security systems and business applications—giving you the insights to drive operational performance and business results.
Likeliness to Recommend
As the foundation of our security information and event management (SIEM) solution, McAfee Enterprise Security Manager delivers the performance, actionable intelligence, and real-time situational awareness required for organizations to identify, understand, and respond to stealthy threats, while the embedded compliance framework simplifies compliance.
ArcSight ESM is an enterprise security management software that combines event correlation and security analytics to identify and prioritize threats in real time and remediate incidents early.
CyberArk Enterprise Password Vault is designed to discover, secure, rotate and control access to privileged account passwords used to access systems throughout the enterprise IT environment.
IBM® Security QRadar® SIEM consolidates log source event data from thousands of devices endpoints and applications distributed throughout a network. It performs immediate normalization and correlation activities on raw data to distinguish real threats from false positives.
We founded AlienVault to help organizations of all shapes and sizes achieve world-class security without the headaches and huge expense of other solutions. And we are passionate about our mission.
SecurityCenter™ is a comprehensive vulnerability analytics solution that provides complete visibility into the security posture of your distributed and complex IT infrastructure. SecurityCenter™ consolidates and evaluates all of your vulnerability data from across your entire IT infrastructure, illustrates vulnerability trends over time, and assesses risk with actionable context for effective remediation prioritization.
You need deep, real-time visibility into your entire IT environment to defend your organization from today’s threats. LogRhythm analyzes all of your forensic data. It fills gaps with endpoint and network sensors. With LogRhythm, you get the intelligence and tools you need to protect your network.