2024-03-19T08:48:00Z

Top SIEM Solutions & Success Stories: Strengthening Cybersecurity in Diverse Industries

Julia Miller - PeerSpot reviewer
  • 11
Published:
Product comparison that may be of interest to you
PeerSpot user
0
PeerSpot user
Find out what your peers are saying about Splunk, Microsoft, Wazuh and others in Security Information and Event Management (SIEM). Updated: June 2024.
789,577 professionals have used our research since 2012.
Related Questions
Ammar Jibarah - PeerSpot reviewer
Jun 14, 2023
Jun 14, 2023
Why not try Logpoint instead?;)
See 1 answer
AS
Jun 14, 2023
Why not try Logpoint instead?;) 
Liam Brandt - PeerSpot reviewer
Mar 22, 2023
Mar 22, 2023
I´m not sure about this affirmation. There are a lot of other tools used.
See 2 answers
VS
Mar 14, 2023
Hi, in my opinion, because it is still the best at giving you visibility of what's happening in your IT infrastructure, and at detecting threats. Visibility and detection may seem simple tasks. but actually, they require a lot of capabilities in understanding, integrating, logging, and alarms from a huge multitude of devices. Such tasks go under the line of log ingestion, normalization, etc., and that is far from easy. QRadar has done a lot of work in that direction. Another aspect is event correlation. And here, either you write the correlation rules yourself, spending $$$$ of professional services, and by the way, it'll take forever to test, implement and maintain up to date, or your access to a very long list of preset correlation rules, that are already available and waiting to be activated. Finally, visibility and threat detection is just the beginning of a journey pointed at becoming aware of what's happening in your IT and taking relevant and effective action. There are several other technologies that have to be used to minimize exposure, and contain, and remediate relations to an attack. I believe IBM has a few of those, that can be integrated. But whichever you use at the end of this journey, if the original feed is not correct, not relevant, or not complete, you missed your goal in the first place.My 5 cents :)VS
Jairo Willian Pereira - PeerSpot reviewer
Mar 22, 2023
I´m not sure about this affirmation. There are a lot of other tools used.
Related Articles
Ertugrul Akbas - PeerSpot reviewer
Jan 24, 2023
Jan 24, 2023
It is important to retain logs for a significant amount of time in order to be able to investigate and analyze past attacks. This allows security teams to identify patterns and trends that can aid in the detection and prevention of future attacks. The retention period will vary depending on the organization's specific requirements and regulations, but it is generally recommended to keep logs f...
Navcharan Singh - PeerSpot reviewer
Oct 7, 2022
Oct 7, 2022
Security Information and Event Management (SIEM) solutions differ significantly from firewalls. While both security solutions are integral components of cybersecurity infrastructure, they have different capabilities, functions, and roles. Do you need SIEM if you already have a firewall? If you have questions about the difference between SIEM and firewall, you have come to the right place. T...
EB
Jul 5, 2022
Jul 5, 2022
Dear PeerSpot community members, This is our latest Community Spotlight for YOU. Here we've summarized and selected the latest posts (professional questions, articles and discussions) contributed by PeerSpot community members.  Check them out! Trending See what your peers are discussing at the moment! What were your main pain points during the SIEM product purchase process? What probl...
Product Comparisons
Related Articles
Ertugrul Akbas - PeerSpot reviewer
Jan 24, 2023
Features of Today's SIEMs – Requirements for Today’s Attacks and Breaches
It is important to retain logs for a significant amount of time in order to be able to investiga...
Navcharan Singh - PeerSpot reviewer
Oct 7, 2022
SIEM vs. Firewall
Security Information and Event Management (SIEM) solutions differ significantly from firewalls. W...
Download Free Report
Download our free Security Information and Event Management (SIEM) Report and find out what your peers are saying about Microsoft, Amazon Web Services (AWS), Splunk, and more! Updated: June 2024.
DOWNLOAD NOW
789,577 professionals have used our research since 2012.