Overview
What is Securonix Next-Generation SIEM?
Securonix headquartered in Addison offers the Securonix Next-Generation SIEM deployment, combining log management as well as user and entity behavior analytics (UEBA), for a complete SOC solution.
Securonix Review
A SIEM with unrivaled speed, flexibility and scalability!
Securonix Next-Gen SIEM, a flexible cloud-native solution fit to detect modern cyber threats
Next Gen SIEM with all the Right Features
Securonix Next-Generation SIEM - Data Visualized Efficiently
Best underrated SIEM in market with next-gen features and premium support
Popular Features
- Centralized event and log data collection (6)9.090%
- Correlation (6)8.888%
- Deployment flexibility (6)8.888%
- Event and log normalization/management (6)8.686%
Pricing
What is Securonix Next-Generation SIEM?
Securonix headquartered in Addison offers the Securonix Next-Generation SIEM deployment, combining log management as well as user and entity behavior analytics (UEBA), for a complete SOC solution.
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
75 people also want pricing
Alternatives Pricing
What is Microsoft Sentinel?
Microsoft Sentinel (formerly Azure Sentinel) is designed as a birds-eye view across the enterprise. It is presented as a security information and event management (SIEM) solution for proactive threat detection, investigation, and response.
What is Trellix Helix?
Trellix Helix (formerly FireEye Helix) is a SIEM solution providing a non-malware threat detection solution.
Features
Security Information and Event Management (SIEM)
Security Information and Event Management is a category of security software that allows security analysts to look at a more comprehensive view of security logs and events than would be possible by looking at the log files of individual, point security tools
- 9Centralized event and log data collection(6) Ratings
Effectiveness of real-time centralized event and log data collection
- 8.8Correlation(6) Ratings
Correlation of logs and events to pinpoint significant threats
- 8.6Event and log normalization/management(6) Ratings
Ability to normalize event syntax so that logs can be compared and are machine-understandable
- 8.8Deployment flexibility(6) Ratings
Ability to tune system to maximize threat detection and minimize false positives
- 8.9Integration with Identity and Access Management Tools(6) Ratings
Integration with access control tools like Active Directory and LDAP
- 8.6Custom dashboards and workspaces(6) Ratings
dashboards that can be customized to meet the needs of specific groups
- 8.8Host and network-based intrusion detection(5) Ratings
Ability to detect both endpoint intrusion and network ingress detection
- 8.5Data integration/API management(6) Ratings
Ease and quality of data integrations between SIEM and other systems
- 8.9Behavioral analytics and baselining(6) Ratings
How effectively activity and behavior baselines are established and maintained
- 9Rules-based and algorithmic detection thresholds(6) Ratings
Effectiveness of manually-established rules and algorithmically-determined detection thresholds
- 7.4Response orchestration and automation(5) Ratings
Quality of built-in response orchestration and automation in Next-Gen SIEM
- 8.9Reporting and compliance management(5) Ratings
Ease and quality of reporting and compliance functions
- 9Incident indexing/searching(6) Ratings
Effectiveness of searching across structured and unstructured events and incidents within SIEM
Product Details
- About
- Tech Details
- FAQs
What is Securonix Next-Generation SIEM?
Securonix Next-Generation SIEM Technical Details
Operating Systems | Unspecified |
---|---|
Mobile Application | No |
Frequently Asked Questions
Comparisons
Compare with
Reviews and Ratings
(9)Community Insights
- Pros
- Cons
UEBA Feature: Users have found the UEBA feature of Securonix Next-Generation SIEM particularly helpful, with many reviewers stating that it allows organizations to baseline and understand the typical behaviors of their user base. This capability enables easy identification of anomalous behavior for further investigation by IT/Security personnel.
Flexible Dashboarding: Reviewers appreciate the flexibility and customization options provided by Securonix Next-Generation SIEM's dashboarding feature. This granular and flexible view of ingested data enables users to identify trends and gain useful insights for informed decision-making.
Data Collection from Various Log Sources: Many users have praised Securonix Next-Generation SIEM's ability to collect data from various log sources. This comprehensive log aggregation and correlation feature enhances the platform's effectiveness in incident management and threat detection.
Steep Learning Curve: Many users have mentioned a steep learning curve for the platform, indicating that it has been challenging for them to become proficient in using it. This suggests that the platform may require more intuitive and user-friendly interfaces, as well as comprehensive documentation and tutorials to help users navigate through the complexities of the system.
Difficult Analytics Development: Several users have found it difficult to develop their own analytics due to the depth and complexity of the analytics engine. This indicates a need for simplified tools or features that can assist users in easily configuring and customizing their analytics without requiring extensive technical expertise.
Lack of Support Response Time: Users have expressed dissatisfaction with the support response time, citing delays or unsatisfactory assistance. To address this issue, improvements should be made in terms of faster response times from customer support teams, better communication channels, and efficient ticket management systems to ensure timely resolution of user queries and issues.
Attribute Ratings
Reviews
(1-5 of 5)- Collect data from just about any log source.
- Provides lightning fast searching across large data-sets.
- Provides in-depth analytics across both micro and macro time frames using threat models.
- There is a steep learning curve for the platform.
- Developing your own analytics can be challenging due to the depth and complexity of the analytics engine.
- Centralized event and log data collection
- 100%10.0
- Correlation
- 80%8.0
- Event and log normalization/management
- 80%8.0
- Deployment flexibility
- 100%10.0
- Integration with Identity and Access Management Tools
- 90%9.0
- Custom dashboards and workspaces
- 70%7.0
- Host and network-based intrusion detection
- 100%10.0
- Log retention
- 100%10.0
- Data integration/API management
- 100%10.0
- Behavioral analytics and baselining
- 100%10.0
- Rules-based and algorithmic detection thresholds
- 100%10.0
- Response orchestration and automation
- 60%6.0
- Reporting and compliance management
- 100%10.0
- Incident indexing/searching
- 100%10.0
- We have been able to more than double the amount of clients we provide our managed security service to since moving to Securonix.
- We can quickly and more accurately provide clients with the security data that they request.
Securonix Next-Gen SIEM, a flexible cloud-native solution fit to detect modern cyber threats
- User & Entity Behavioral Analytics (UEBA) is an area Securonix Next-Generation SIEM performs particularly well. This allows an organization to baseline and understand the typical behaviors of their user base and easily identify anomalous behavior worthy of their valuable IT/Security people's time to investigate.
- Flexible and Customizable Dashboarding is an area Securonix Next-Generation SIEM performs particularly well. This allows an organization a very granular and flexible view of the data being ingested by the SIEM to help drive out trends and other 'at-a-glance' useful insights that can be leveraged to drive action.
- Securonix Next-Gen SIEM Role Based Access Controls (RBAC) could be a bit better. It currently allows for so much granularity that it's too complex & difficult to configure. Distilled and better defined RBAC would benefit the product.
- Centralized event and log data collection
- 100%10.0
- Correlation
- 100%10.0
- Event and log normalization/management
- 100%10.0
- Deployment flexibility
- 100%10.0
- Integration with Identity and Access Management Tools
- 100%10.0
- Custom dashboards and workspaces
- 100%10.0
- Host and network-based intrusion detection
- 100%10.0
- Log retention
- 100%10.0
- Data integration/API management
- 100%10.0
- Behavioral analytics and baselining
- 100%10.0
- Rules-based and algorithmic detection thresholds
- 100%10.0
- Response orchestration and automation
- N/AN/A
- Reporting and compliance management
- N/AN/A
- Incident indexing/searching
- 100%10.0
- Securonix Next-Generation SIEM has reduced our overall operational costs by helping our team focus on the most pertinent security monitoring concerns first and by reducing the typical signal-to-noise ratio that is common amongst SIEMs not leveraging User & Entity Behavioral Analytics (UEBA) technology.
Next Gen SIEM with all the Right Features
- UEBA
- Contexualization
- Out of the box Violations
- Reporting
- Some data mismatching in parsing
- More OOTB Log sources
- Centralized event and log data collection
- 90%9.0
- Correlation
- 100%10.0
- Event and log normalization/management
- 90%9.0
- Deployment flexibility
- 90%9.0
- Integration with Identity and Access Management Tools
- 100%10.0
- Custom dashboards and workspaces
- 100%10.0
- Host and network-based intrusion detection
- 90%9.0
- Log retention
- 90%9.0
- Data integration/API management
- 90%9.0
- Behavioral analytics and baselining
- 100%10.0
- Rules-based and algorithmic detection thresholds
- 90%9.0
- Response orchestration and automation
- 100%10.0
- Reporting and compliance management
- 100%10.0
- Incident indexing/searching
- 100%10.0
- Faster Deployment
- Easy log source Integration
- A robust automated response mechanism via Playbooks.
- Thorough documentation on search query syntax.
- Built-in Graph/chart creation based on query results.
- A quick and responsive support team.
- Grant customers to ability to rename mapped attributes.
- Further clarification on Access Control via Roles vs. Groups.
- Improved default reports.
- Centralized event and log data collection
- 100%10.0
- Correlation
- 100%10.0
- Event and log normalization/management
- 100%10.0
- Deployment flexibility
- 100%10.0
- Integration with Identity and Access Management Tools
- 100%10.0
- Custom dashboards and workspaces
- 100%10.0
- Host and network-based intrusion detection
- 100%10.0
- Log retention
- 100%10.0
- Data integration/API management
- 100%10.0
- Behavioral analytics and baselining
- 100%10.0
- Rules-based and algorithmic detection thresholds
- 100%10.0
- Response orchestration and automation
- 100%10.0
- Reporting and compliance management
- 100%10.0
- Incident indexing/searching
- 100%10.0
- Securonix Next-Generation SIEM has reduced the amount of overhead required for environment monitoring by 15%!
- Log aggregation and correlation
- User entity behavior analytics
- Incident management
- Third-party tools integration
- On-premises and cloud log ingestion
- Log ingestion in any format
- Support for log parsing, correlation
- Out-of-box use cases
- Email/text notifications
- Viewing raw logs with Securonix Jupyter
- Securonix support portal for ticket creation
- Reporting output
- Support response time
With the new update to Jupyter, the Securonix team has added many new features that will help a security analyst as well as the team to achieve their goal efficiently.
The ability to easily ingest logs, apply parsing techniques using the ML capabilities, and correlating with user data makes a good use case for any business purpose.
For log intake from network security devices like next-gen firewalls and routers, the SIEM already comes with out-of-box policies. The SIEM team works to fine tune the policies as per the environment.
- Centralized event and log data collection
- 100%10.0
- Correlation
- 100%10.0
- Event and log normalization/management
- 90%9.0
- Deployment flexibility
- 80%8.0
- Integration with Identity and Access Management Tools
- 90%9.0
- Custom dashboards and workspaces
- 90%9.0
- Host and network-based intrusion detection
- 90%9.0
- Log retention
- 90%9.0
- Data integration/API management
- 90%9.0
- Behavioral analytics and baselining
- 80%8.0
- Rules-based and algorithmic detection thresholds
- 100%10.0
- Response orchestration and automation
- 80%8.0
- Reporting and compliance management
- 80%8.0
- Incident indexing/searching
- 90%9.0
- Improved security monitoring
- Better management of the identified risk
- Log retention
For any bugs/enhancement/troubleshooting, we can raise a ticket in Securonix Support Portal. Based on the severity of the ticket, the support team is prompt in responding to the incident.
For any urgent escalations, the Technical Account Manager is available for support as well.
With the Securonix Jupyter update, the feature set is fine tuned for efficient implementation. The SOAR platform will complete the product for automated response on top of the alerting capabilities.
The primary factor for selecting a SIEM will include the support model. While implementing and currently using Securonix Next-Generation SIEM in our environment, we have experienced the best support provided by the SIEM team in all aspects.