SIEM Software

Find the best SIEM Software for your business. Compare product reviews and features to build your list.

What is SIEM Software?

Filter Results (20)

Product Rating

Users

Deployment

Features

Why Capterra is free

EventLog Analyzer is a comprehensive log management solution withreal-time threat detection and analysis. It can correlate disparate events happening across your network and also has a built-in threat intelligence and incident management platform. It offers predefined audit reports to help track activity happening in databases, web servers, Windows devices, network perimeter devices, and more. It also assists in meeting compliance regulations like the PCI DSS, SOX, HIPAA, FISMA, and GDPR. Learn more about EventLog Analyzer

EventLog Analyzer is a comprehensive log management solution that provides multiple security capabilities in one unified platform. Learn more about EventLog Analyzer

Log360

by ManageEngine

Log360, an integrated solution that combines ADAudit Plus and EventLog Analyzer into a single console, is the one-stop solution for all log management & network security challenges. It offers real-time log collection, analysis, correlation, & archiving abilities that help protect confidential data, thwart internal security threats, & combat external attacks. To help meet the most needed security, auditing, & compliance demands, it comes prepackaged over 1,200 predefined reports & alert criteria. Learn more about Log360

Log360, a comprehensive SIEM solution that helps defend internal and external security attacks with log management ability. Learn more about Log360

Hybrid SIEM solution combining real-time (event) log monitoring with FIM, SW/HW inventory and more for an integrated approach to increase network security. Unique security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what's available from raw events. A dynamic release cycle constantly adds features for timely challenges like Ransomware. Learn more about EventSentry

Real-Time Log & Event Log Hybrid SIEM monitoring solution with system monitoring, inventory and network monitoring capabilities. Learn more about EventSentry

Sumo Logic simplifies how you collect and analyze machine data so that your team gets the insights they need to drive the best customer experience on your application. With the Sumo Logic service, you can accelerate modern application delivery, monitor and troubleshoot in real time and improve your security and compliance posture. Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides Continuous Intelligence. Learn more about Sumo Logic

Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides Continuous Intelligence. Learn more about Sumo Logic

Software that lets you search and analyze all your IT infrastructure data from a single location in real time. Learn more about Splunk

Software that lets you search and analyze all your IT infrastructure data from a single location in real time. Learn more about Splunk

EventTracker

by EventTracker

By owning both the technology and the expertise, we quickly deliver advanced threat protection and security orchestration. Learn more about EventTracker

By owning both the technology and the expertise, we quickly deliver advanced threat protection and security orchestration. Learn more about EventTracker

Security management platform offering fully integrated security controls for threat detection and compliance management. Learn more about AlienVault USM

Security management platform offering fully integrated security controls for threat detection and compliance management. Learn more about AlienVault USM

Threat lifecycle management solution that comes with log management, security automation and orchestration, and SIEM functionality. Learn more about LogRhythm Enterprise

Threat lifecycle management solution that comes with log management, security automation and orchestration, and SIEM functionality. Learn more about LogRhythm Enterprise

Identify and Respond to Security Events in Real Time Learn more about Powertech Event Manager

Identify and Respond to Security Events in Real Time Learn more about Powertech Event Manager

Makes it easier to identify and respond to suspicious activity by proactively correlating security events and managing logs. Learn more about CorreLog Solution Suite

Makes it easier to identify and respond to suspicious activity by proactively correlating security events and managing logs. Learn more about CorreLog Solution Suite

A horizontally scalable SIEM solution that lets you handle structured-unstructured logs, query faster and perform high speed analytics. Learn more about DNIF

A horizontally scalable SIEM solution that lets you handle structured-unstructured logs, query faster and perform high speed analytics. Learn more about DNIF

FortiSIEM

by Fortinet

Scalable SIEM solution that provides performance, security, and availability monitoring to detect and remediate security threats. Learn more about FortiSIEM

Scalable SIEM solution that provides performance, security, and availability monitoring to detect and remediate security threats. Learn more about FortiSIEM

InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches. Learn more about InsightIDR

InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches. Learn more about InsightIDR

LogPoint

by LogPoint

LogPoint is an effective and valuable SIEM solution for enterprises of all sizes because of its unique design and rich features. Learn more about LogPoint

LogPoint is an effective and valuable SIEM solution for enterprises of all sizes because of its unique design and rich features. Learn more about LogPoint

For SaaS developers: stop being interrupted by alerts. Events are prioritized and filtered to your preferences. Learn more about Ropig

For SaaS developers: stop being interrupted by alerts. Events are prioritized and filtered to your preferences. Learn more about Ropig

Security Information and Event Management solution that helps security teams detect cyber threats and accelerate incident response. Learn more about RSA NetWitness Logs and Packets

Security Information and Event Management solution that helps security teams detect cyber threats and accelerate incident response. Learn more about RSA NetWitness Logs and Packets

Security management and operations platform with detection, analytics, and response capabilities. Learn more about Security Intelligence Platform

Security management and operations platform with detection, analytics, and response capabilities. Learn more about Security Intelligence Platform

SIEMStorm

by BlackStratus

Network security solution that provides MSSPs with advanced vulnerability correlation and real-time attack visualization capabilities. Learn more about SIEMStorm

Network security solution that provides MSSPs with advanced vulnerability correlation and real-time attack visualization capabilities. Learn more about SIEMStorm

Snare

by InterSect Alliance International

SIEM and log monitoring software suite with centralized log data collection, real-time alerting, and forensic analysis tools. Learn more about Snare

SIEM and log monitoring software suite with centralized log data collection, real-time alerting, and forensic analysis tools. Learn more about Snare

Simplify security risk and compliance management with powerful correlation engine, big data analytics, and enhanced reporting. Learn more about Trustwave SIEM Enterprise

Simplify security risk and compliance management with powerful correlation engine, big data analytics, and enhanced reporting. Learn more about Trustwave SIEM Enterprise

Filter Results (20)

Product Rating

Users

Deployment

Features


What is SIEM Software?

SIEM software applies security event management and security information management capabilities to identifying potential threats and resolving security incidents.