Try our new research platform with insights from 80,000+ expert users
2017-07-06T07:07:00Z

New SIEM Reviews 2017

it_user326337 - PeerSpot reviewer
  • 4
Published:Jul 6, 2017
Product comparison that may be of interest to you
PeerSpot user

3 Comments

it_user652953 - PeerSpot reviewer
Vendor
2017-07-12T12:11:07Z
Jul 12, 2017
AG
Real User
Top 10
2017-07-15T04:58:09Z
Jul 15, 2017
Vendor
2017-07-12T14:15:05Z
Jul 12, 2017
Find out what your peers are saying about Splunk, Wazuh, Datadog and others in Log Management. Updated: January 2025.
832,138 professionals have used our research since 2012.
Related Questions
Liam Brandt - PeerSpot reviewer
Mar 22, 2023
Mar 22, 2023
I´m not sure about this affirmation. There are a lot of other tools used.
See 2 answers
VS
Mar 14, 2023
Hi, in my opinion, because it is still the best at giving you visibility of what's happening in your IT infrastructure, and at detecting threats. Visibility and detection may seem simple tasks. but actually, they require a lot of capabilities in understanding, integrating, logging, and alarms from a huge multitude of devices. Such tasks go under the line of log ingestion, normalization, etc., and that is far from easy. QRadar has done a lot of work in that direction. Another aspect is event correlation. And here, either you write the correlation rules yourself, spending $$$$ of professional services, and by the way, it'll take forever to test, implement and maintain up to date, or your access to a very long list of preset correlation rules, that are already available and waiting to be activated. Finally, visibility and threat detection is just the beginning of a journey pointed at becoming aware of what's happening in your IT and taking relevant and effective action. There are several other technologies that have to be used to minimize exposure, and contain, and remediate relations to an attack. I believe IBM has a few of those, that can be integrated. But whichever you use at the end of this journey, if the original feed is not correct, not relevant, or not complete, you missed your goal in the first place.My 5 cents :)VS
Jairo Willian Pereira - PeerSpot reviewer
Mar 22, 2023
I´m not sure about this affirmation. There are a lot of other tools used.
Miriam Tover - PeerSpot reviewer
Oct 18, 2022
Oct 18, 2022
The solution can be improved by lowering the cost and bettering their technical support.
2 out of 5 answers
reviewer1136397 - PeerSpot reviewer
Feb 6, 2022
The IBM support can be better. It's an aspect that needs improvement. In future iterations, I'd like to see an advance in office management, the out-of-the-box use cases that are provided. That needs to be part of the requirement.
reviewer1846212 - PeerSpot reviewer
Apr 25, 2022
IBM QRadar Advisor with Watson could be more user-friendly. You need some skills and understanding of what you're looking at, especially if you're going to draw down specific information. Massive improvement is required in reporting. IBM QRadar Advisor with Watson is not a tool that is known for its reporting capability. It's a highly operational tool that you use for monitoring, you can sit and you can watch your alerts, whether it's flows or EPS, and you set up your playbooks directly. It is not a reporting tool. It is the worst possible tool to ever expect any reporting. It's unfortunate it's not a great reporting tool. In a future release, there could be a bit more intelligence in terms of predictive accuracy and overall predictions. I haven't been too close in the last two, three, or four months, but I certainly would expect that their technology would be simplified to provide predictive analytics as opposed to retrospective looking back and analyzing past historic data.
Related Articles
Julia Miller - PeerSpot reviewer
Mar 19, 2024
Mar 19, 2024
Today, Security Information and Event Management (SIEM) solutions play a pivotal role in bolstering organizational defenses against an array of cybersecurity threats. Through the lens of real-world success stories and an evaluation of top SIEM technologies, this comprehensive article illustrates the transformative impact of SIEM systems across industries and highlights leading solutions, includ...
LW
Aug 20, 2023
Aug 20, 2023
Managing system logs effectively is paramount to maximizing smooth operations and security, as well as helping IT teams make informed decisions. Log management encompasses a range of practices that involve collecting, analyzing, and storing log data generated by various applications, servers, and network devices. This data, often referred to as the "digital breadcrumbs" of an organization, offe...
LW
Aug 1, 2023
Aug 1, 2023
In technology-driven, enterprise-scale IT environments, the management of log data from varied sources has become indispensable. Log management tools help ensure secure and efficient operations through five key components: log collection, storage, analysis, correlation, and reporting. In what follows, we look at these key components, explain the processes involved in each, and explain why they ...
Product Comparisons
Related Articles
Julia Miller - PeerSpot reviewer
Mar 19, 2024
Top SIEM Solutions & Success Stories: Strengthening Cybersecurity in Diverse Industries
Today, Security Information and Event Management (SIEM) solutions play a pivotal role in bolsteri...
LW
Aug 20, 2023
Log Management Best Practices
Managing system logs effectively is paramount to maximizing smooth operations and security, as we...
Download Free Report
Download our free Security Information and Event Management (SIEM) Report and find out what your peers are saying about Splunk, IBM, LogRhythm, and more! Updated: January 2025.
DOWNLOAD NOW
832,138 professionals have used our research since 2012.