SIEM combineert SIM (security information management) en SEM (security event management) functies in één security information en event management system: SIEM.
Owner
SIEM tools
Listly by Jan van van Bon
SIEM combines SIM (security information management) and SEM (security event management) functions into one security information and event management system.
=== This list is created in the context of knowledge sharing. For that reason we support the SURVUZ Foundation. But in the end, nothing beats face-to-face meetings, so we sponsor ConnectingFriends ===
IBM QRadar Security Intelligence Platform provides a unified architecture for integrating SIEM solutions for advanced threat protection.
Splunk
Splunk Inc. provides the leading platform for Operational Intelligence. Customers use Splunk to search, monitor, analyze and visualize machine data.
Discover the HP ArcSight ESM software solution, an enterprise security management system for event correlation, compliance monitoring and compliance reporting.
NetIQ provides proven IT system management, security management, and performance management software for the modern enterprise.
Trustwave helps businesses fight cybercrime, protect data and reduce security risk. We give organizations the services and technologies they need to transform the way they plan, prepare, integrate and manage their information security and compliance programs.
Within minutes of installing the USM product, our asset discovery features - Active Network Scanning, Passive Network Monitoring, Asset Inventory, Host-based Software Inventory - will provide you visibility into the assets on your network, what software is installed on them, how they're configured, any potential vulnerabilities and active threats being executed against them.
AccelOps
SIEM software and network monitoring solutions for cloud and virtualized infrastructures are available online at AccelOps. Start your free trial today.
The most reliable security information event management (SIEM) products & solutions. Test our technologies by downloading our virtual SIEM system for free!
EventTracker software provide complete solution for SIEM, IT Compliance audit, Log Management Tool, IT Security and System monitoring.
Intel Security combines the security expertise of McAfee with the innovation, performance, and trust of Intel, with the goal of delivering integrated security solutions across every architecture from chip to cloud.
LogRhythm
LogRhythm provides log and event management, log analysis, SIEM and automated remediation, for enterprise-class organizations, offering an integrated solution for monitoring and compliance.
Enable the mass utilization of your company's natural resources. ANY data format (structured and unstructured)...you can stream it, push it, pull it, or let us go grab it for you. Oh, by the way, you can send us UNLIMITED amounts of big data.
SolarWinds
SolarWinds® Log & Event Manager - Collect, manage, search, and correlate logs to improve security, enhance troubleshooting, and pass compliance audits.
LogLogic is a centralized log data management solution that supplies the fuel for operation intelligence.
See how SecurityCenter or SecurityCenter Continuous View can work for your organization. Schedule a Demo Business and executive ready security metrics. Get immediate sales assistance or more information on SecurityCenter Continuous View.
FairWarning solutions deliver data protection and governance for mission critical applications such as Electronic Health Records and cloud-based applications such as Salesforce.
LookWise
Lookwise solutions is a company dedicated to developing products that respond to the needs of organizations in the management of security, Big Data and regulatory compliance.
Get to the bottom of the situation. With Tripwire Log Center, you get a combination of details from suspicious events across your enterprise devices with in-depth knowledge from Tripwire Enterprise and Tripwire IP360. This tight integration of security controls allows you to better prioritize security threats based on real risks.
Tango/04
We identify, alert and resolve problems in critical Online Services and Business Processes, helping your business to run smoothly, without interruptions, in a safe environment with extreme visibility.
The Huntsman Enterprise SIEM: Shortens the time from threat detection to resolution Automates the collection of contextual information relating to a threat Speeds up the investigative process Delivers precise security information to operations, management and audit stakeholders.
Your organizations IT infrastructure generate huge amount of logs every day and these machine generated logs have vital information that can provide powerful insights and network security intelligence into user behaviors, network anomalies, system downtime, policy violations, internal threats, regulatory compliance, etc.
MacAfee
Our high performance, powerful SIEM brings event, threat and risk data together to provide strong security intelligence, rapid incident response, seamless log management and extensible compliance reporting. Our high performance, powerful SIEM brings event, threat and risk data together to provide strong security intelligence, rapid incident response, seamless log management and extensible compliance reporting.
Symantec
Check out how Symantec Endpoint Protection performs against competing solutions. Small Business Test Results Enterprise Test Results Measuring the Performance of Endpoint Security Solutions This recorded webcast examines how performance of security solutions should be measured as well as the true performance cost of endpoint security.
Alert Logic
Alert Logic Log Manager™ collects and normalizes your data, while our 24x7 expert monitoring and analysis adds human intelligence to find key insights.
CorreLog, Inc., a privately held corporation, has produced software and framework components used successfully by hundreds of private and government entities worldwide. We are the leading independent software vendor offering solutions that seamlessly connect mainframe and distributed SIEM technologies for one view of cross-platform IT security.