Software Category

Security Incident and Event Management

Software Reviews covers 41 products in the Security Incident and Event Management market. Fast track your research by exploring our Data Quadrant, sorting the software, purchasing our Security Incident and Event Management Category Report, or diving deeper into an individual product. Arm yourself with real data so you can make better decisions with more confidence.

Write Review

Software Category

Security Incident and Event Management

Software Reviews covers 41 products in the Security Incident and Event Management market. Fast track your research by exploring our Data Quadrant, sorting the software, purchasing our Security Incident and Event Management Category Report, or diving deeper into an individual product. Arm yourself with real data so you can make better decisions with more confidence.

Write Review
Trial lock

This content is not available with your current subscription.

Your current Info-Tech Research Group subscription does not include access to this content. Contact your account representative to learn more about gaining access to Premium SoftwareReviews.

Contact Your Representative or Call: 1-888-670-8889 (US) or 1-844-618-3192 (CAN)
Category Features
  • Analytics and Reporting
  • |
  • Big Data Analytics
  • |
  • CAN
  • |
  • Correlation
  • |
  • Data Enrichment
  • |
  • Data Security and Retention
  • |
  • Forensic Analysis Support
  • |
  • Incident Management and Remediation
  • |
  • Scalability and Network Performance
  • |
  • Security Threat Visibility
  • |
  • Threat Intelligence

Data Quadrant

The software experience is shaped by both the software and the relationship with the vendor. By comparing vendors across both we provide a comprehensive understanding of the product and help identify vendors that can deliver on both.

Quad web

Sample Report

Category Report

A thorough evaluation and ranking of all software in an individual category to compare software across every dimension.

  • User Satisfaction Rankings
  • Business Value Scores
  • Vendor Capability Comparisons
  • Individual Feature Evaluations
  • Emotional Connection to Products
Explore Report

Splunk

Splunk Enterprise

Splunk Enterprise makes it simple to collect, analyze and act upon the untapped value of the big data generated by your technology infrastructure, security systems and business applications—giving you the insights to drive operational performance and business results.

8.4

Composite Score

Composite
Score

+81

Emotional Footprint

Emotional
Footprint

80%

Likeliness to Recommend

Likeliness
to Recommend

17Reviews

Intel Corporation

McAfee Enterprise Security Manager

As the foundation of our security information and event management (SIEM) solution, McAfee Enterprise Security Manager delivers the performance, actionable intelligence, and real-time situational awareness required for organizations to identify, understand, and respond to stealthy threats, while the embedded compliance framework simplifies compliance.

8.0

Composite Score

Composite
Score

+76

Emotional Footprint

Emotional
Footprint

82%

Likeliness to Recommend

Likeliness
to Recommend

30Reviews

IBM

IBM QRadar SIEM

IBM® Security QRadar® SIEM consolidates log source event data from thousands of devices endpoints and applications distributed throughout a network. It performs immediate normalization and correlation activities on raw data to distinguish real threats from false positives.

7.9

Composite Score

Composite
Score

+71

Emotional Footprint

Emotional
Footprint

85%

Likeliness to Recommend

Likeliness
to Recommend

15Reviews

Hewlett-Packard Enterprise

HP ArcSight ESM

ArcSight ESM is an enterprise security management software that combines event correlation and security analytics to identify and prioritize threats in real time and remediate incidents early.

6.4

Composite Score

Composite
Score

+38

Emotional Footprint

Emotional
Footprint

65%

Likeliness to Recommend

Likeliness
to Recommend

14Reviews

Graylog

Graylog

Graylog is an open source log management that actually works. Centralize and aggregate all your log files for 100% visibility. Use our powerful query language to search through terabytes of log data to discover and analyze important information.

--

Composite Score

Composite
Score

+86

Emotional Footprint

Emotional
Footprint

88%

Likeliness to Recommend

Likeliness
to Recommend

9Reviews

SolarWinds

SolarWinds SIEM: Log and Event Manager

Find attacks and demonstrate compliance immediately. Receive actionable data in less time with a turnkey SIEM. Log & Event Manager is an all-in-one solution deployed as a hardened virtual appliance with built-in rules, filters, and reports.

--

Composite Score

Composite
Score

+46

Emotional Footprint

Emotional
Footprint

75%

Likeliness to Recommend

Likeliness
to Recommend

6Reviews

AlienVault

AlienVault SIEM Solutions

We founded AlienVault to help organizations of all shapes and sizes achieve world-class security without the headaches and huge expense of other solutions. And we are passionate about our mission.

--

Composite Score

Composite
Score

+80

Emotional Footprint

Emotional
Footprint

82%

Likeliness to Recommend

Likeliness
to Recommend

6Reviews

Tenable Network Security

Tenable SecurityCenter

SecurityCenter™ is a comprehensive vulnerability analytics solution that provides complete visibility into the security posture of your distributed and complex IT infrastructure. SecurityCenter™ consolidates and evaluates all of your vulnerability data from across your entire IT infrastructure, illustrates vulnerability trends over time, and assesses risk with actionable context for effective remediation prioritization.

--

Composite Score

Composite
Score

+83

Emotional Footprint

Emotional
Footprint

84%

Likeliness to Recommend

Likeliness
to Recommend

5Reviews