Published: 25 June 2024
Summary
SIEM technology provides a configurable system of record, an investigative workbench, and support for compliance and governance. Security and risk management leaders with identified requirements and use cases for SIEM implementation can evaluate critical capabilities in their selection processes.
Included in Full Research
Overview
Key Findings
Gartner clients are increasingly looking for security information management (SIEM) solutions to monitor and integrate with modern infrastructure. These can include infrastructure as a service (IaaS), SaaS, third-party subscriptions and internal development of applications that are critical to their business and operations.
Organizations have become more distributed in the way they store, recall and process data. As the volume of data continues to increase, they are looking for alternative approaches, such as data lakes and federated data repositories, to drive down costs while trying to align data velocity with value in their threat detection, investigation and response (TDIR)-capable
Clients can log in to view the entire
document.
- Devo
- Elastic
- Exabeam
- Fortinet
- Google
- Gurucul
- Huawei
- IBM
- Logpoint
- LogRhythm
- Logz.io
- ManageEngine
- Microsoft
- NetWitness
- Odyssey
- OpenText
- QAX
- Rapid7
- Securonix
- Splunk
- Sumo Logic
- Venustech
- Architecture and Deployment
- Data Collection
- Add-On Components
- Content
- Compatibility
- Integration
- Roadmap
- User Interface
- Out-of-the-Box SIEM
- Customizable SIEM
- Threat Detection, Investigation and Response
Critical Capabilities Methodology