• Categories

    • Loading categories...

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Security Information and Event Management

Security Information and Event Management (SIEM) Reviews and Ratings

What is Security Information and Event Management (SIEM)?

Security information and event management (SIEM) is a configurable system of record that collects, aggregates and analyzes security event data from on-premises and cloud environments. SIEM processes security event data for the purposes of threat detection, investigation and response. It natively supports data normalization and offers user-configurable detection content and reporting to orchestrate threat mitigation and satisfy compliance requirements. These solutions are delivered via a SaaS platform or client-hosted on-premises or private cloud.

The security information and event management (SIEM) system must assist with:

1. Aggregating and normalizing data from various IT and operational technology (OT) environments.

2. Designing and executing near real-time monitoring and alerting content.

3. Enriching and investigating security events of interest.

4. Supporting manual and automated response actions.

5. Maintaining and reporting on current and historical event data.

Learn More About This Category
How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of ManageEngine ADAudit Plus
ManageEngine ADAudit Plus
Logo of Gurucul Next-Gen SIEM
Gurucul Next-Gen SIEM
Logo of Falcon Next-Gen SIEM
Falcon Next-Gen SIEM
For 50M-1B USD Companies
Logo of FortiSIEM
FortiSIEM
Logo of Gurucul Next-Gen SIEM
Gurucul Next-Gen SIEM
Logo of Splunk Enterprise Security
Splunk Enterprise Security
For North America
Logo of Logpoint SIEM
Logpoint SIEM
Logo of Gurucul Next-Gen SIEM
Gurucul Next-Gen SIEM
Logo of Falcon Next-Gen SIEM
Falcon Next-Gen SIEM
Integration & Deployment
Logo of Gurucul Next-Gen SIEM
Gurucul Next-Gen SIEM
Logo of Securonix Unified Defense SIEM
Securonix Unified Defense SIEM
Logo of ManageEngine EventLog Analyzer
ManageEngine EventLog Analyzer

Product Listings

Filter by

Products 1 - 20 of 104
Sort by
Logo of Splunk Enterprise

Splunk Enterprise

By Cisco Systems (Splunk)

4.4
(1018 Ratings)

Splunk operates in the realm of digital security and observability to facilitate safer and more resilient digital infrastructures. The company delivers a unified platform equipped with capabilities to maintain the secure operations of an organization, insulating it against potential digital disruptions.

Show More Details
Logo of LogRhythm SIEM

LogRhythm SIEM

By Exabeam

4.3
(715 Ratings)

Exabeam is a global entity in the cybersecurity landscape focused on enhancing security operations. The main business problem it addresses involves combating cyber threats and defending against cyberattacks. Leveraging the potency of cloud-scale security log management, behavioral analytics and automated investigation mechanisms, it effectively counteracts insider threats, nation states, and various forms of cyber criminals. The firm maintains a comprehensive understanding of normal behavior, adapting as this baseline shifts, which empowers security operations teams with a complete perspective on incidents for swift and thorough response.

Show More Details
Logo of IBM Security QRadar SIEM

IBM Security QRadar SIEM

By IBM

4.3
(656 Ratings)

IBM is a well-established entity focused on technology and development. The primary mission revolves around fostering technological growth and enhancing infrastructure, achieved through focused developments and consulting services. By encouraging inventiveness and innovation, it is geared towards facilitating the transition of theoretical ideas into practical realities, thus improving global functionalities. IBM brings about transformation by creating advanced solutions that reshape and redefine the world.

Show More Details
Logo of Splunk Enterprise Security

Splunk Enterprise Security

By Cisco Systems (Splunk)

4.5
(541 Ratings)

Splunk operates in the realm of digital security and observability to facilitate safer and more resilient digital infrastructures. The company delivers a unified platform equipped with capabilities to maintain the secure operations of an organization, insulating it against potential digital disruptions.

Show More Details
Logo of Trellix Enterprise Security Manager

Trellix Enterprise Security Manager

By Trellix

4.4
(463 Ratings)

Trellix operates as an international entity devoted to reshaping the cybersecurity landscape. The key business issue the company addresses revolves around the escalation of sophisticated threats challenging organizations today. To combat this, Trellix offers an open and native detection and response platform, building a secure and resilient operational structure. The company embraces machine learning and automation, drawing upon the proficiency of its security professionals and an expansive partner ecosystem to deliver technological advancements. The application of their expertise serves to benefit an extensive user base comprising numerous business and government organizations.

Show More Details
Logo of Securonix Unified Defense SIEM

Securonix Unified Defense SIEM

By Securonix

4.7
(422 Ratings)
customers choice 2024

Securonix mission is to secure the world by staying ahead of cyber threats. The Securonix platform provides organizations with an AI-Reinforced threat detection, investigation, and response (TDIR) solution built with a cybersecurity mesh architecture on a highly scalable data cloud. Our solution delivers a frictionless CyberOps experience and enables organizations to scale up their security operations and keep up with evolving threats.

Securonix provides precise, fast and efficient threat detection, investigation, and response capabilities. It leverages an AI-reinforced cloud native platform to apply advanced analytics and AI to the challenges of threat detection and response. Securonix is multi-cloud, built on open standards and is agnostic to clouds, data lakes and other security solutions, integrating into any environment to provide a frictionless TDIR experience.

Show More Details
Logo of Elastic Security

Elastic Security

By Elastic

4.5
(405 Ratings)

Elastic enables organizations to securely harness search-powered AI so anyone can find the answers they need in real-time using all their data, at scale. By integrating AI with search technology, it facilitates the discovery of actionable insights from large volumes of both structured and unstructured data, addressing the need for real-time, scalable data processing.

Our Elasticsearch Platform delivers search-powered AI for observability, security and search. Companies can now solve real-time business problems and achieve better business outcomes by taking advantage of massive amounts of structured and unstructured data, securing and protecting private information more effectively, and optimizing infrastructure and talent resources more efficiently.

Elastic’s complete, easy-to-use cloud-based platform offers solutions in search, security, and observability, aimed at aiding businesses in leveraging AI technology securely and effectively.

Show More Details
Logo of InsightIDR

InsightIDR

By Rapid7

4.4
(370 Ratings)

Rapid7, Inc. aims to create a safer digital world by simplifying and making cybersecurity simpler and more accessible. Rapid7 empowers security professionals worldwide to manage a modern attack surface through its technology, research, and broad, strategic expertise. Rapid7’s comprehensive security solutions help over 11,000 customers unite cloud risk management with threat detection and response to reduce attack surfaces and eliminate threats quickly and precisely.

Show More Details
Logo of Logpoint SIEM

Logpoint SIEM

By Logpoint

4.2
(370 Ratings)

Logpoint is a cybersecurity firm established in 2012 to address complex digital security challenges. Its platform helps organizations cope with ever-changing digital threats, delivering advanced cybersecurity solutions to facilitate business growth. Rather than only reacting to existing trends in cybersecurity, Logpoint seeks to shape them by incorporating cutting-edge technologies to provide timely insights into potential threats. Recognizing the importance of collaboration, Logpoint designs solutions that remain relevant to the ongoing challenges Businesses face in their digital operations.

Show More Details
Logo of Falcon Next-Gen SIEM

Falcon Next-Gen SIEM

By CrowdStrike

4.6
(359 Ratings)

CrowdStrike is a recognized entity in the cybersecurity space, specializing in enterprise risk management through the innovative application of technology. The company focuses primarily on protecting essential business risk areas such as endpoints, cloud workloads, identity, and data. Employing the state-of-the-art CrowdStrike Security Cloud and advanced AI technology, the firm provides effective solutions. Its CrowdStrike Falcon platform uses real-time indications of attack, threat intelligence, telemetry enhanced from diverse enterprise sources, and evolving adversary knowhow for high-grade detection, automated protection and healing, advanced threat tracking, and efficient vulnerability visibility. The Falcon platform, designed in the cloud with a singular lightweight-agent architecture, offers swift deployment, unique protection and performance, and reduced complexity. Therefore, CrowdStrike delivers a significant value proposition right from the beginning.

Show More Details
Logo of SolarWinds Security Event Manager (SEM)

SolarWinds Security Event Manager (SEM)

By SolarWinds

4.2
(305 Ratings)

SolarWinds (NYSE:SWI) provides simple, powerful, secure observability and IT management software built to enable customers to accelerate their digital transformation. Our solutions provide organizations worldwide—regardless of type, size, or complexity—with a comprehensive and unified view of today’s modern, distributed, and hybrid environments. We continuously engage with IT service and operations professionals, DevOps and SecOps professionals, and database administrators (DBAs) to understand the challenges they face in maintaining high-performing and highly available hybrid IT infrastructures, applications, and environments. The insights we gain from them, in places like our THWACK community, help us to address customers’ needs in solutions for observability, IT service management, application performance, and database management now and in the future.

Show More Details
Logo of FortiSIEM

FortiSIEM

By Fortinet

4.8
(268 Ratings)
customers choice 2024

Founded more than 20 years ago in Sunnyvale, California, Fortinet continues to be a driving force in the evolution of cybersecurity and the convergence of networking and security. Securing people, devices, and data everywhere is our mission. To that end, our portfolio of over 50 enterprise-grade products is the largest integrated offering available, delivering proven cybersecurity everywhere you need it. More than 680,000 customers trust Fortinet solutions, which are among the most deployed, most patented, and most validated in the industry.

Show More Details
Logo of Splunk Cloud Platform

Splunk Cloud Platform

By Cisco Systems (Splunk)

4.3
(268 Ratings)

Splunk operates in the realm of digital security and observability to facilitate safer and more resilient digital infrastructures. The company delivers a unified platform equipped with capabilities to maintain the secure operations of an organization, insulating it against potential digital disruptions.

Show More Details
Logo of Exabeam Fusion

Exabeam Fusion

By Exabeam

4.5
(255 Ratings)

Exabeam is a global entity in the cybersecurity landscape focused on enhancing security operations. The main business problem it addresses involves combating cyber threats and defending against cyberattacks. Leveraging the potency of cloud-scale security log management, behavioral analytics and automated investigation mechanisms, it effectively counteracts insider threats, nation states, and various forms of cyber criminals. The firm maintains a comprehensive understanding of normal behavior, adapting as this baseline shifts, which empowers security operations teams with a complete perspective on incidents for swift and thorough response.

Show More Details
Logo of OpenText Enterprise Security Manager

OpenText Enterprise Security Manager

By OpenText

4.4
(254 Ratings)

OpenText powers and protects information. As a global information management provider for businesses, OpenText tools span content management, Artificial Intelligence (AI), cybersecurity, cloud, and business networks. For over 30 years, OpenText has helped organizations manage and protect their data and documents while modernizing their information architecture. Its integrated hub connects information across departments and applications to enhance employee experience, productivity, and collaboration, while making information structured and searchable through AI, machine learning, and semantic search. In addition, OpenText delivers endpoint security and digital life protection solutions to safeguard businesses against cyberattacks and data breaches.

Show More Details
Logo of ManageEngine ADAudit Plus

ManageEngine ADAudit Plus

By ManageEngine

4.5
(252 Ratings)

As the enterprise IT management division of Zoho Corp., ManageEngine empowers you to take control of your IT, from your security, networks, and servers to your applications, service desk, Active Directory, desktops, and mobile devices.

Show More Details
Logo of Graylog Security

Graylog Security

By Graylog

4.5
(235 Ratings)

Deployed in over 50,000 installations worldwide, Graylog captures, stores, and analyzes terabytes of machine data in real-time to detect threats faster, investigate issues efficiently, and simplify compliance—without drowning in noise. Graylog delivers an affordable, flexible architecture that meets the evolving needs of IT and security teams—whether hosted by us, on-premises, or in your cloud. Started as an open-source project, it has grown into a platform offering SIEM, API Security, and Enterprise Log Management with built-in SOAR capabilities to automate and accelerate response. Graylog’s machine learning, real-time monitoring, and AI-assisted investigation tools streamline workflows, reduce alert fatigue, and optimize security operations. With a vision of a secure digital world, we provide threat detection and response that delivers a strong analyst experience while maintaining cost efficiency, ensuring organizations stay ahead of ever-evolving cyber threats.

Show More Details
Logo of Microsoft Sentinel

Microsoft Sentinel

By Microsoft

4.6
(201 Ratings)

Microsoft enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more. Microsoft is dedicated to advancing human and organizational achievement.

Microsoft Security helps protect people and data against cyberthreats to give peace of mind.

Show More Details
Logo of ManageEngine EventLog Analyzer

ManageEngine EventLog Analyzer

By ManageEngine

4.4
(164 Ratings)

As the enterprise IT management division of Zoho Corp., ManageEngine empowers you to take control of your IT, from your security, networks, and servers to your applications, service desk, Active Directory, desktops, and mobile devices.

Show More Details
Logo of Sumo Logic SaaS Log Analytics Platform

Sumo Logic SaaS Log Analytics Platform

By Sumo Logic

4.4
(152 Ratings)

Sumo Logic, Inc. unifies and analyzes enterprise data, translating it into actionable insights through one AI-powered cloud-native log analytics platform. This single source of truth enables Dev, Sec and Ops teams to simplify complexity, collaborate efficiently and accelerate data-driven decisions that drive business value. More than 2,400 customers around the world rely on the Sumo Logic SaaS Log Analytics Platform for trusted insights to ensure application reliability, secure and protect against modern security threats, and gain insights into their cloud infrastructures.

Show More Details

Features of Security Information and Event Management

Updated November 2025

Mandatory Features:

  • Ability to investigate, evidence and report on discovered security alerts generated by active detection content

  • Report generation to support business, compliance and audit needs as required

  • Ability for end-users to self-develop, modify and maintain threat detection use cases utilizing correlation-, analytic- and signature-based methods

  • Capability to create and customize detection and response content

  • Collection of infrastructure details and security-relevant data from a wide range of assets located on-premises and/or in cloud infrastructure

  • Flexible data retention options for storing essential event data long term and/or making it available for long-term searching

  • Vendor-provided content for security detection and response (analytics, data normalization, collection correlation, and enrichment and reporting) for both native and non-native solutions

  • Client-created workflow augmentation capability to support incident response activities and reporting

Peer Lessons Learned for Security Information and Event Management

Published November 2024

These lessons focuses on the responses to the questions: “If you could start over, what would your organization do differently?” and “What one piece of advice would you give other prospective customers?”

Peer Lessons Learned for Security Information and Event ManagementLessons learned by your peers shared on Gartner Peer Insights for Security Information and Event ManagementPeer Lessons Learned for Security Information and EventManagementLesson 1LESSON1Define Use Cases via Security Assessments toAlign the SIEM Platform With Business GoalsLesson 2LESSON2Leverage POC and Integration Testing to Selectthe Best SIEM Platform VendorLesson 3LESSON3Utilize Vendor Resources and CommunitySupport for Optimal SIEM Platform TrainingLesson 4LESSON4Plan Data Sources and Strategize CloudAdoption to Manage the SIEM PlatformComplexityLesson 5LESSON5Streamline the SIEM Platform ImplementationWith a Strategic Partner and In-House Supportn = 606Source: Reviews (606) submitted to Gartner Peer InsightsID: 5923175Gartner ®
Read Full Insights

Gartner Research

Magic Quadrant for Security Information and Event ManagementCritical Capabilities for Security Information and Event Management
Gartner Peer Insights 'Voice of the Customer': Security Information and Event Management

Top Trending Products

Microsoft SentinelInfraskope SIEM+Splunk EnterpriseManageEngine Log360ManageEngine ADAudit PlusFalcon Next-Gen SIEMSplunk Cloud PlatformGoogle SecOpsInsightIDRIBM Security QRadar SIEM

Popular Product Comparisons

Microsoft Sentinel vs Splunk Enterprise SecuritySplunk Enterprise vs Wazuh - The Open Source Security PlatformOpen XDR Platform vs Wazuh - The Open Source Security PlatformElastic Security vs Wazuh - The Open Source Security PlatformMicrosoft Sentinel vs Wazuh - The Open Source Security Platform

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2025 Gartner, Inc. and/or its affiliates.

All rights reserved.