Introducing G2.ai, the future of software buying.Try now

Best Security Information and Event Management (SIEM) Software Solutions - Page 4

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Security information and event management (SIEM) software combines a variety of security software components into one platform. Companies use SIEM solutions to centralize security operations into a single location. IT and security operations teams can gain access to the same information and alerts for more effective communication and planning. These products provide capabilities to identify and alert IT operations teams of anomalies detected in their systems. The anomalies may be new malware, unapproved access, or newly discovered vulnerabilities. SIEM tools provide live analysis of functionality and security, storing logs and records for retrospective reporting. They also have products for identity and access management to ensure only approved parties have access to sensitive systems. Forensic analysis tools help teams navigate historical logs, identify trends, and better fortify their networks.

SIEM systems may be confused with incident response software, but SIEM products provide a larger scope of security and IT management features. Most also do not have the ability to automate security remediation practices.

To qualify for inclusion in the SIEM category, a product must:

Aggregate and store IT security data
Assist in user provisioning and governance
Identify vulnerabilities in systems and endpoints
Monitor for anomalies within an IT system
Show More
Show Less

Featured Security Information and Event Management (SIEM) Software At A Glance

Free Plan Available:
EventSentry
Sponsored
Highest Performer:
Easiest to Use:
Show LessShow More
Highest Performer:
Easiest to Use:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Security Information and Event Management (SIEM) Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
107 Listings in Security Information and Event Management (SIEM) Available
(10)4.4 out of 5
View top Consulting Services for Elastic Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Process Any Data, From Any Source. Centralize data processing of all types. Normalize varying schema and formats. Quickly extend to custom log formats. Easily add plugins for custom data sources

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 90% Small-Business
    • 70% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Elastic Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    8.8
    Ease of Use
    Average: 8.6
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Elastic
    Year Founded
    2012
    HQ Location
    San Francisco, CA
    Twitter
    @elastic
    64,203 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,788 employees on LinkedIn®
    Ownership
    NYSE: ESTC
Product Description
How are these determined?Information
This description is provided by the seller.

Process Any Data, From Any Source. Centralize data processing of all types. Normalize varying schema and formats. Quickly extend to custom log formats. Easily add plugins for custom data sources

Users
No information available
Industries
No information available
Market Segment
  • 90% Small-Business
  • 70% Enterprise
Elastic Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
8.8
Ease of Use
Average: 8.6
0.0
No information available
Seller Details
Seller
Elastic
Year Founded
2012
HQ Location
San Francisco, CA
Twitter
@elastic
64,203 Twitter followers
LinkedIn® Page
www.linkedin.com
4,788 employees on LinkedIn®
Ownership
NYSE: ESTC
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Netwatch OPS, Secure OPS, and AI Ops are three flagship products from netwatch.ai, designed to provide a unified and intelligent platform for managing and securing your entire IT environment. Each pro

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 40% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Netwatch,ai is a security monitoring solution that provides customizable dashboards for network and equipment monitoring, and integrates with various tools for proactive threat detection.
    • Reviewers like the ease of use, exceptional customer support, and the ability to view their entire network from one display, including servers, firewalls, switches, and firmware updates.
    • Reviewers mentioned issues with logging onto servers using RDP, lack of templates for some devices, and the need for support to make changes due to the skill set of their team.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NetWatch OPS features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    9.2
    Ease of Use
    Average: 8.6
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2023
    HQ Location
    Charlotte, North Carolina, United States
    Twitter
    @netwatchai
    306 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Netwatch OPS, Secure OPS, and AI Ops are three flagship products from netwatch.ai, designed to provide a unified and intelligent platform for managing and securing your entire IT environment. Each pro

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 40% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Netwatch,ai is a security monitoring solution that provides customizable dashboards for network and equipment monitoring, and integrates with various tools for proactive threat detection.
  • Reviewers like the ease of use, exceptional customer support, and the ability to view their entire network from one display, including servers, firewalls, switches, and firmware updates.
  • Reviewers mentioned issues with logging onto servers using RDP, lack of templates for some devices, and the need for support to make changes due to the skill set of their team.
NetWatch OPS features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
9.2
Ease of Use
Average: 8.6
0.0
No information available
Seller Details
Company Website
Year Founded
2023
HQ Location
Charlotte, North Carolina, United States
Twitter
@netwatchai
306 Twitter followers
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Stellar Cyber Open XDR platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill to successfully secure their environments. With Stellar Cyb

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 43% Mid-Market
    • 29% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Open XDR Security Operations Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Integrations
    6
    Easy Integrations
    5
    Visibility
    5
    Threat Detection
    4
    AI Automation
    3
    Cons
    Integration Issues
    4
    Alerting Issues
    2
    Alert Management
    2
    False Positives
    2
    Inefficient Alert System
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Open XDR Security Operations Platform features and usability ratings that predict user satisfaction
    9.7
    Activity Monitoring
    Average: 9.0
    9.7
    Data Examination
    Average: 8.5
    9.7
    Ease of Use
    Average: 8.6
    9.7
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    San Jose, California, United States
    LinkedIn® Page
    www.linkedin.com
    150 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Stellar Cyber Open XDR platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill to successfully secure their environments. With Stellar Cyb

Users
No information available
Industries
No information available
Market Segment
  • 43% Mid-Market
  • 29% Enterprise
Open XDR Security Operations Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Integrations
6
Easy Integrations
5
Visibility
5
Threat Detection
4
AI Automation
3
Cons
Integration Issues
4
Alerting Issues
2
Alert Management
2
False Positives
2
Inefficient Alert System
2
Open XDR Security Operations Platform features and usability ratings that predict user satisfaction
9.7
Activity Monitoring
Average: 9.0
9.7
Data Examination
Average: 8.5
9.7
Ease of Use
Average: 8.6
9.7
Log Management
Average: 9.0
Seller Details
Year Founded
2017
HQ Location
San Jose, California, United States
LinkedIn® Page
www.linkedin.com
150 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Splunk UBA provides advanced and insider threat detection using unsupervised machine learning helping organizations find unknown threats and anomalous user behavior across devices and applications. Sp

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Splunk User Behavior Analytics Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    User Behavior Analytics
    4
    AI Technology
    3
    Detection Efficiency
    3
    Integrations
    3
    Machine Learning
    3
    Cons
    Complexity
    3
    Setup Difficulties
    3
    Complex Implementation
    2
    Complex Setup
    2
    High Resource Usage
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Splunk User Behavior Analytics features and usability ratings that predict user satisfaction
    8.7
    Activity Monitoring
    Average: 9.0
    8.7
    Data Examination
    Average: 8.5
    8.5
    Ease of Use
    Average: 8.6
    8.3
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    721,900 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,148 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Splunk UBA provides advanced and insider threat detection using unsupervised machine learning helping organizations find unknown threats and anomalous user behavior across devices and applications. Sp

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 40% Mid-Market
Splunk User Behavior Analytics Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
User Behavior Analytics
4
AI Technology
3
Detection Efficiency
3
Integrations
3
Machine Learning
3
Cons
Complexity
3
Setup Difficulties
3
Complex Implementation
2
Complex Setup
2
High Resource Usage
2
Splunk User Behavior Analytics features and usability ratings that predict user satisfaction
8.7
Activity Monitoring
Average: 9.0
8.7
Data Examination
Average: 8.5
8.5
Ease of Use
Average: 8.6
8.3
Log Management
Average: 9.0
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
721,900 Twitter followers
LinkedIn® Page
www.linkedin.com
95,148 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Devo unlocks the full value of machine data for the world’s most instrumented enterprises by putting more data to work now. With Devo, IT executives finally realize the transformational promise of mac

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Mid-Market
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Devo features and usability ratings that predict user satisfaction
    3.3
    Activity Monitoring
    Average: 9.0
    5.0
    Data Examination
    Average: 8.5
    9.2
    Ease of Use
    Average: 8.6
    5.0
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Devo
    Year Founded
    2011
    HQ Location
    Boston, Massachusetts, United States
    Twitter
    @devo_Inc
    6,206 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    614 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Devo unlocks the full value of machine data for the world’s most instrumented enterprises by putting more data to work now. With Devo, IT executives finally realize the transformational promise of mac

Users
No information available
Industries
No information available
Market Segment
  • 40% Mid-Market
  • 40% Small-Business
Devo features and usability ratings that predict user satisfaction
3.3
Activity Monitoring
Average: 9.0
5.0
Data Examination
Average: 8.5
9.2
Ease of Use
Average: 8.6
5.0
Log Management
Average: 9.0
Seller Details
Seller
Devo
Year Founded
2011
HQ Location
Boston, Massachusetts, United States
Twitter
@devo_Inc
6,206 Twitter followers
LinkedIn® Page
www.linkedin.com
614 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LogLogic SIEM, developed by LogLogic , is a comprehensive Security Information and Event Management solution designed to centralize and analyze IT data across an organization's infrastructure. It enab

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Enterprise
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • LogLogic SIEM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Analysis
    1
    Log Management
    1
    Search Efficiency
    1
    Threat Detection
    1
    Cons
    Alert Management
    1
    Lack of Automation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LogLogic SIEM features and usability ratings that predict user satisfaction
    10.0
    Activity Monitoring
    Average: 9.0
    8.3
    Data Examination
    Average: 8.5
    7.5
    Ease of Use
    Average: 8.6
    9.2
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LogLogic
    Year Founded
    1994
    HQ Location
    Horley, GB
    Twitter
    @quallimited
    471 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    34 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LogLogic SIEM, developed by LogLogic , is a comprehensive Security Information and Event Management solution designed to centralize and analyze IT data across an organization's infrastructure. It enab

Users
No information available
Industries
No information available
Market Segment
  • 60% Enterprise
  • 20% Small-Business
LogLogic SIEM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Analysis
1
Log Management
1
Search Efficiency
1
Threat Detection
1
Cons
Alert Management
1
Lack of Automation
1
LogLogic SIEM features and usability ratings that predict user satisfaction
10.0
Activity Monitoring
Average: 9.0
8.3
Data Examination
Average: 8.5
7.5
Ease of Use
Average: 8.6
9.2
Log Management
Average: 9.0
Seller Details
Seller
LogLogic
Year Founded
1994
HQ Location
Horley, GB
Twitter
@quallimited
471 Twitter followers
LinkedIn® Page
www.linkedin.com
34 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    When it comes to solving log collection and management challenges, Snare helps you save time, save money and reduce your risk. Snare Central ingests logs from Snare Agents and syslog feeds and you sel

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 44% Enterprise
    • 44% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Snare Central Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerting System
    1
    Analytics
    1
    Automation
    1
    Cloud Services
    1
    Customizability
    1
    Cons
    Expensive
    1
    Overwhelming Cost
    1
    Pricing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Snare Central features and usability ratings that predict user satisfaction
    9.4
    Activity Monitoring
    Average: 9.0
    10.0
    Data Examination
    Average: 8.5
    8.3
    Ease of Use
    Average: 8.6
    10.0
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Latham, ACT
    Twitter
    @ia_snare
    184 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

When it comes to solving log collection and management challenges, Snare helps you save time, save money and reduce your risk. Snare Central ingests logs from Snare Agents and syslog feeds and you sel

Users
No information available
Industries
No information available
Market Segment
  • 44% Enterprise
  • 44% Mid-Market
Snare Central Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerting System
1
Analytics
1
Automation
1
Cloud Services
1
Customizability
1
Cons
Expensive
1
Overwhelming Cost
1
Pricing Issues
1
Snare Central features and usability ratings that predict user satisfaction
9.4
Activity Monitoring
Average: 9.0
10.0
Data Examination
Average: 8.5
8.3
Ease of Use
Average: 8.6
10.0
Log Management
Average: 9.0
Seller Details
HQ Location
Latham, ACT
Twitter
@ia_snare
184 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BMC AMI Command Center for Security is an affordable Security Information and Event Management (SIEM) system for z/OS

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BMC AMI Command Center for Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    8.3
    Ease of Use
    Average: 8.6
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1980
    HQ Location
    Houston, TX
    Twitter
    @BMCSoftware
    48,231 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,064 employees on LinkedIn®
    Phone
    713 918 8800
Product Description
How are these determined?Information
This description is provided by the seller.

BMC AMI Command Center for Security is an affordable Security Information and Event Management (SIEM) system for z/OS

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
BMC AMI Command Center for Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
8.3
Ease of Use
Average: 8.6
0.0
No information available
Seller Details
Year Founded
1980
HQ Location
Houston, TX
Twitter
@BMCSoftware
48,231 Twitter followers
LinkedIn® Page
www.linkedin.com
9,064 employees on LinkedIn®
Phone
713 918 8800
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Chronicle Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    2
    Security
    2
    Cloud Security
    1
    Cloud Services
    1
    Cons
    Not User-Friendly
    1
    Slow Performance
    1
    UX Improvement
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Chronicle Security features and usability ratings that predict user satisfaction
    10.0
    Activity Monitoring
    Average: 9.0
    10.0
    Data Examination
    Average: 8.5
    9.2
    Ease of Use
    Average: 8.6
    10.0
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Mountain View, US
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
Chronicle Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
2
Security
2
Cloud Security
1
Cloud Services
1
Cons
Not User-Friendly
1
Slow Performance
1
UX Improvement
1
Chronicle Security features and usability ratings that predict user satisfaction
10.0
Activity Monitoring
Average: 9.0
10.0
Data Examination
Average: 8.5
9.2
Ease of Use
Average: 8.6
10.0
Log Management
Average: 9.0
Seller Details
HQ Location
Mountain View, US
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Security QRadar Log Insights is a cloud-based security information and event management (SIEM solution designed to provide organizations with intelligent security analytics and actionable insights

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM Security QRadar Log Insights Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    2
    Threat Detection
    2
    User Interface
    2
    Alerting
    1
    Customer Support
    1
    Cons
    Complex Setup
    1
    Parsing Issues
    1
    Pricing Issues
    1
    Resource Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Security QRadar Log Insights features and usability ratings that predict user satisfaction
    9.2
    Activity Monitoring
    Average: 9.0
    9.2
    Data Examination
    Average: 8.5
    9.2
    Ease of Use
    Average: 8.6
    9.2
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,117 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    339,241 employees on LinkedIn®
    Ownership
    SWX:IBM
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Security QRadar Log Insights is a cloud-based security information and event management (SIEM solution designed to provide organizations with intelligent security analytics and actionable insights

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
IBM Security QRadar Log Insights Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
2
Threat Detection
2
User Interface
2
Alerting
1
Customer Support
1
Cons
Complex Setup
1
Parsing Issues
1
Pricing Issues
1
Resource Management
1
IBM Security QRadar Log Insights features and usability ratings that predict user satisfaction
9.2
Activity Monitoring
Average: 9.0
9.2
Data Examination
Average: 8.5
9.2
Ease of Use
Average: 8.6
9.2
Log Management
Average: 9.0
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,117 Twitter followers
LinkedIn® Page
www.linkedin.com
339,241 employees on LinkedIn®
Ownership
SWX:IBM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Recon is a comprehensive SIEM log management security analytics solution that eases compliance burdens and accelerates forensic investigation.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenText ArcSight Recon features and usability ratings that predict user satisfaction
    10.0
    Activity Monitoring
    Average: 9.0
    8.3
    Data Examination
    Average: 8.5
    8.3
    Ease of Use
    Average: 8.6
    10.0
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenText
    Year Founded
    1991
    HQ Location
    Waterloo, ON
    Twitter
    @OpenText
    21,628 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    23,200 employees on LinkedIn®
    Ownership
    NASDAQ:OTEX
Product Description
How are these determined?Information
This description is provided by the seller.

Recon is a comprehensive SIEM log management security analytics solution that eases compliance burdens and accelerates forensic investigation.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
OpenText ArcSight Recon features and usability ratings that predict user satisfaction
10.0
Activity Monitoring
Average: 9.0
8.3
Data Examination
Average: 8.5
8.3
Ease of Use
Average: 8.6
10.0
Log Management
Average: 9.0
Seller Details
Seller
OpenText
Year Founded
1991
HQ Location
Waterloo, ON
Twitter
@OpenText
21,628 Twitter followers
LinkedIn® Page
www.linkedin.com
23,200 employees on LinkedIn®
Ownership
NASDAQ:OTEX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Upfort Shield is an AI-powered multi-layer cyber defense platform trusted by tens of thousands of small businesses to provide them with enterprise-grade security. Shield can be implemented and manag

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 40% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Upfort Shield Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    3
    Ease of Use
    2
    Threat Detection
    2
    Alerting
    1
    Customer Support
    1
    Cons
    Lack of Automation
    1
    Lack of Features
    1
    Training Required
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Upfort Shield features and usability ratings that predict user satisfaction
    9.2
    Activity Monitoring
    Average: 9.0
    0.0
    Data Examination
    Average: 8.5
    9.7
    Ease of Use
    Average: 8.6
    8.3
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Upfort
    Year Founded
    2017
    HQ Location
    San Francisco, US
    Twitter
    @upfort_cyber
    23 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    34 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Upfort Shield is an AI-powered multi-layer cyber defense platform trusted by tens of thousands of small businesses to provide them with enterprise-grade security. Shield can be implemented and manag

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 40% Small-Business
Upfort Shield Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
3
Ease of Use
2
Threat Detection
2
Alerting
1
Customer Support
1
Cons
Lack of Automation
1
Lack of Features
1
Training Required
1
Upfort Shield features and usability ratings that predict user satisfaction
9.2
Activity Monitoring
Average: 9.0
0.0
Data Examination
Average: 8.5
9.7
Ease of Use
Average: 8.6
8.3
Log Management
Average: 9.0
Seller Details
Seller
Upfort
Year Founded
2017
HQ Location
San Francisco, US
Twitter
@upfort_cyber
23 Twitter followers
LinkedIn® Page
www.linkedin.com
34 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Vijilan will deploy and implement its fully managed service in record time, and as part of the service, Vijilan will monitor and respond to any threat or suspicious behavior on the network through its

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Vijilan Threat Respond features and usability ratings that predict user satisfaction
    10.0
    Activity Monitoring
    Average: 9.0
    9.2
    Data Examination
    Average: 8.5
    10.0
    Ease of Use
    Average: 8.6
    10.0
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Vijilan
    Year Founded
    2014
    HQ Location
    Aventura, US
    Twitter
    @vijilansoc
    408 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    67 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Vijilan will deploy and implement its fully managed service in record time, and as part of the service, Vijilan will monitor and respond to any threat or suspicious behavior on the network through its

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
Vijilan Threat Respond features and usability ratings that predict user satisfaction
10.0
Activity Monitoring
Average: 9.0
9.2
Data Examination
Average: 8.5
10.0
Ease of Use
Average: 8.6
10.0
Log Management
Average: 9.0
Seller Details
Seller
Vijilan
Year Founded
2014
HQ Location
Aventura, US
Twitter
@vijilansoc
408 Twitter followers
LinkedIn® Page
www.linkedin.com
67 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Log Management suite for IT security and corporate compliance . More than 5000 organizations (small, medium and large companies) have already chosen Business LOG as Log Management Suite for IT securit

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Business LOG Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Deployment Ease
    1
    Setup Ease
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Business LOG features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Use
    Average: 8.6
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Roè Volciano, IT
    LinkedIn® Page
    it.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Log Management suite for IT security and corporate compliance . More than 5000 organizations (small, medium and large companies) have already chosen Business LOG as Log Management Suite for IT securit

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Business LOG Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Deployment Ease
1
Setup Ease
1
Cons
This product has not yet received any negative sentiments.
Business LOG features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
10.0
Ease of Use
Average: 8.6
0.0
No information available
Seller Details
Year Founded
1994
HQ Location
Roè Volciano, IT
LinkedIn® Page
it.linkedin.com
17 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IT solution providers are the first—and often only—line of defense for every kind of business in every part of the world. Whether managing mom-and-pop businesses or high-profile clients, providing pre

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ConnectWise Cybersecurity Management – Network features and usability ratings that predict user satisfaction
    8.3
    Activity Monitoring
    Average: 9.0
    8.3
    Data Examination
    Average: 8.5
    6.7
    Ease of Use
    Average: 8.6
    8.3
    Log Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1982
    HQ Location
    Tampa, FL
    Twitter
    @ConnectWise
    14,938 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,473 employees on LinkedIn®
    Phone
    800-671-6898
Product Description
How are these determined?Information
This description is provided by the seller.

IT solution providers are the first—and often only—line of defense for every kind of business in every part of the world. Whether managing mom-and-pop businesses or high-profile clients, providing pre

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
ConnectWise Cybersecurity Management – Network features and usability ratings that predict user satisfaction
8.3
Activity Monitoring
Average: 9.0
8.3
Data Examination
Average: 8.5
6.7
Ease of Use
Average: 8.6
8.3
Log Management
Average: 9.0
Seller Details
Year Founded
1982
HQ Location
Tampa, FL
Twitter
@ConnectWise
14,938 Twitter followers
LinkedIn® Page
www.linkedin.com
3,473 employees on LinkedIn®
Phone
800-671-6898