Was this helpful?

(0) (0)

Announcing the Top Rated Security Information and Event Management Software for 2019

April 3rd, 2019 7 min read

TrustRadius Top Rated

Today, we awarded the 2019 TrustRadius Top Rated badges for Security Information and Event Management (SIEM) Software. The TrustRadius Top Rated awards are the most trusted in the industry because they are an unbiased reflection of customer sentiment, based solely on user feedback and satisfaction scores. Top Rated awards are the voice of the market and are not influenced by analyst opinion, the vendor’s company size, popularity, or status as a TrustRadius customer.

Security Information and Event Management (SIEM) Software

Enterprise data centers generate enormous amounts of plaintext log data from applications, firewalls, virus filters, and other system. Although these logs often contain critically important security information, the sheer volume of data makes it infeasible for human analysts to process them. SIEM software solves this problem by aggregating, correlating, and analyzing the data from these log files. It then identifies important events and potential network security threats. By providing quick access to relevant log information, SIEM software enables security analysts to better respond to attacks, prevent future attacks, and comply with data security regulations. Common features of SIEM software include data collation, correlation, and normalization; integration with identity and access management tools; customizable dashboards and data views; and automated threat detection. Recently, vendors have started incorporating machine learning capabilities into SIEM products, enabling new features such as pattern-based alerts, self-managing databases, and suggestions for addressing security threats.

Buyers of SIEM software should consider their organization’s scale and data security requirements. Smaller organizations with less sensitive data may value SIEM products with easy deployment and low upkeep. Larger businesses and organizations subject to stricter information security regulations may benefit more from SIEM software with advanced security features, complex reporting capability, and tools for handling larger datasets.

Here are the winners:

IBM QRadar

ibm qradar tr score

IBM QRadar is an SIEM solution focused on meeting enterprise needs. Its data aggregation system can collect and analyze data across multiple large environments, including SaaS and IaaS systems. IBM QRadar includes automatic threat detection and tracking, alert prioritization, and log normalization features. It integrates with third-party software through both pre-built and custom extensions, and offers compliance packages for GDPR, HIPAA, and other data security regulations. IBM QRadar can be deployed as hardware on-premise, as cloud-based software, or as virtual hardware. A sizable majority (64%) of IBM QRadar users on TrustRadius are from enterprises. Reviewers value QRadars’s comprehensive logging and analysis, easy integration with existing systems, and automated threat monitoring and response features.

“You can integrate IBM QRadar SIEM to collect logs from active directories, Exchange, SWIFT, core-banking, internet banking, DLP, proxy, and firewalls. It’s easy to assure the integrity of logs and create offenses to monitor important and critical events from all critical systems, services, and devices from your organisation.”

Verified User | Supervisor in Information Technology | Banking Company

[easy-tweet tweet=”IBM QRadar: It’s easy to assure the integrity of logs. ” user=”trustradius” template=”qlite”]

Splunk Enterprise

splunk tr score

Splunk Enterprise is an enterprise SIEM solution with machine learning features and a proprietary querying language. It offers customizable data dashboards, real-time alerts and reporting, administrative overviews for onsite deployments, compliance reporting and certification, and normalization features. Splunk Enterprise can be taught to ingest multiple data types, both from files and from API calls. It features built-in integrations with third-party software like Excel. Downloadable extensions provide additional features and integrations with platforms such as Cisco, Amazon AWS, and Palo Alto. Users from enterprises make up a majority of  (59%) Splunk Enterprise users on TrustRadius. Reviewers highlight Splunk Enterprise’s efficient and robust log querying via its custom search language, detailed schedulable reports, and system performance monitoring tools.

“Splunk is an excellent logging platform, allowing for short and long term log storage with top tier indexing and searching capabilities…Splunk has helped our operations personnel to identify issues quickly and helped lead to quicker resolutions of those issues.”

Verified User | Engineer in Engineering | Financial Services Company

[easy-tweet tweet=”Splunk has helped our operations personnel to identify issues quickly” user=”trustradius” template=”qlite”]

AlienVault USM

alienvault tr score

AlienVault USM is a cloud-based SIEM solution with options for businesses offering managed security and compliance services. It automatically syncs with AlienVault’s Open Threat Exchange (OTX), enabling users to share cyberattack, threat, and vulnerability information to help defend against ongoing attacks and prevent future breaches. AlienVault USM also includes asset discovery, threat detection, vulnerability scanning, activity and event analysis, response automation, and reporting features. It can aggregate, normalize, and analyze data from cloud applications, on-premises hardware and virtual machines, and remote endpoints. It also offers compliance tools for multiple data security standards, including HIPAA and GDPR. A majority (52%) of AlienVault USM reviewers on TrustRadius are from midsize companies. Reviewers value AlienVault USM’s communal security through OTX, built-in vulnerability scanning, and ease of deployment and scaling.

“The open threat exchange integration enables the USM to use all the latest threat indicators to correlate against incoming threats without the need to manually add rules to your USM…[It] took less than 2 hours to get the system up and running and collecting threat intelligence, and then it was a matter of fine tuning the system.”

Scott Holland | CEO | Computer & Network Security Company

[easy-tweet tweet=”AlienVault USM: Less than 2 hours to get the system up, running and collecting threat intelligence” user=”trustradius” template=”qlite”]

Congratulations to the winners of the Top Rated Security Information and Event Management Software Award!

Top Rated Criteria

Products included in the 2019 Top Rated Security Information and Event Management Software list must have been in the top tier of their category TrustMap as of March 15th, 2019. To qualify for the Security Information and Event Management Software Top Rated Award, products must have at least 10 reviews written within the past year, a TRScore of at least 7.5 out of 10, and must receive at least 1.5% of the traffic in their category.  Every reviewer is verified and every review is vetted before publication. Products are plotted on the TrustMap based on end-user data, including users’ likelihood to recommend scores as well as buyer research patterns. To learn more about TrustMaps and Top Rated methodology, check out this page.

Was this helpful?

(0) (0)

TrustRadius Weekly