---
description: Discover the best SIEM Tools for your organisation. Compare top SIEM Tools tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Best SIEM Tools - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [SIEM Tools](https://www.softwareadvice.co.uk/directory/4725/siem/software)

# SIEM Tools

Canonical: https://www.softwareadvice.co.uk/directory/4725/siem/software

Page: 1 / 3\
Next: [Next page](https://www.softwareadvice.co.uk/directory/4725/siem/software?page=2)

-----

## Products

1. [Heimdal Threat-hunting & Action Center](https://www.softwareadvice.co.uk/software/399929/heimdal-threat-hunting-and-action-center) (0 reviews) — The Heimdal Threat-Hunting and Action Center is threat intelligence solution that is designed to manage and respond t...
2. [Logmanager](https://www.softwareadvice.co.uk/software/521028/Logmanager) — 5.0/5 (16 reviews) — Logmanager is a log management and analysis tool that centralizes the aggregation of log data from various sources, e...
3. [EventSentry](https://www.softwareadvice.co.uk/software/382512/eventsentry) — 5.0/5 (22 reviews) — EventSentry is an on-premise network monitoring solution that helps businesses monitor the performance of their IP-ba...
4. [ManageEngine Log360](https://www.softwareadvice.co.uk/software/435342/manageengine-log360) — 4.7/5 (26 reviews) — Log360 is a SIEM or security analytics solution that helps you combat threats on premises, in the cloud, or in a hybr...
5. [Google Cloud](https://www.softwareadvice.co.uk/software/172144/google-cloud-platform) — 4.7/5 (2249 reviews) — Google Cloud is a suite of cloud computing services that allows businesses to build, deploy, and scale applications. ...
6. [Datadog](https://www.softwareadvice.co.uk/software/101405/datadog) — 4.6/5 (357 reviews) — Datadog is the monitoring, security and analytics platform for developers, IT operations teams, security engineers an...
7. [JumpCloud Directory Platform](https://www.softwareadvice.co.uk/software/180508/jumpcloud-directory-as-a-service) — 4.6/5 (264 reviews) — JumpCloud Directory-as-a-Service is an IT Management software, which helps businesses of all sizes manage devices or ...
8. [Splunk Enterprise](https://www.softwareadvice.co.uk/software/234262/splunk-enterprise) — 4.6/5 (259 reviews) — The Splunk Enterprise platform allows users to process and index most forms of data in their native format. It includ...
9. [SentinelOne](https://www.softwareadvice.co.uk/software/363019/sentinelone) — 4.8/5 (109 reviews) — Designed with Fortune 500 and Global 2000 companies in mind, SentinelOne is a leading autonomous cybersecurity platfo...
10. [Elastic Stack](https://www.softwareadvice.co.uk/software/132343/elasticsearch) — 4.6/5 (70 reviews) — Built on a foundation of free and open, Elasticsearch, Logstash, Kibana, and Beats pave the way for diverse use cases...
11. [Lookout](https://www.softwareadvice.co.uk/software/379029/lookout) — 4.7/5 (69 reviews) — Lookout is an integrated endpoint security and secure access service edge (SSE) solution designed to protect business...
12. [ConnectWise SIEM](https://www.softwareadvice.co.uk/software/118233/perch-security) — 4.6/5 (52 reviews) — ConnectWise SIEM (formerly Perch) is a threat detection and response management solution that allows organizations to...
13. [IBM Security QRadar](https://www.softwareadvice.co.uk/software/390310/ibm-security-qradar) — 4.5/5 (35 reviews) — Designed for businesses in automotive, consumer goods, banking, healthcare and other industries, IBM Security QRadar ...
14. [Sumo Logic](https://www.softwareadvice.co.uk/software/80463/sumo-logic) — 4.6/5 (33 reviews) — Sumo Logic is a cloud-based log management platform that helps small to large businesses create, manage and archive e...
15. [Graylog](https://www.softwareadvice.co.uk/software/346476/graylog) — 4.6/5 (32 reviews) — Graylog is an open, AI-powered SIEM and log management platform built for security and IT teams that need clear visib...
16. [Logz.io](https://www.softwareadvice.co.uk/software/165988/logz-io) — 4.6/5 (30 reviews) — Logz.io is a cloud-based log management and log analysis solution with alerts and machine-learning algorithms. It bas...
17. [Sematext Cloud](https://www.softwareadvice.co.uk/software/95450/sematext-cloud) — 4.8/5 (29 reviews) — Sematext gives businesses full-stack visibility by exposing performance issues, quickly and easily, through a single ...
18. [Netsurion](https://www.softwareadvice.co.uk/software/134470/eventtracker) — 3.6/5 (23 reviews) — Netsurion Managed Threat Protection provides the necessary synergy between people, process, and technology to truly d...
19. [Logsign Unified SO Platform](https://www.softwareadvice.co.uk/software/443075/logsign) — 4.9/5 (18 reviews) — Logsign Unified SO Platform, recognized by Gartner in their Magic Quadrant for SIEM for the past two years, delivers ...
20. [ALog Series](https://www.softwareadvice.co.uk/software/327572/alog-converter) — 4.7/5 (15 reviews) — ALog Series is a cloud-based and on-premise log management solution that assists enterprises with log extraction, con...
21. [USM Anywhere](https://www.softwareadvice.co.uk/software/124618/alienvalut-usm) — 4.4/5 (14 reviews) — USM Anywhere is a cloud-based security platform which helps midsize to large enterprises with risk detection, vulnera...
22. [Elastic Security](https://www.softwareadvice.co.uk/software/351891/kibana) — 4.8/5 (14 reviews) — Unify SIEM, endpoint security, and cloud security Elastic Security modernizes security operations — enabling analytic...
23. [Blumira](https://www.softwareadvice.co.uk/software/210259/blumira) — 4.9/5 (14 reviews) — Blumira’s cloud SIEM platform offers both automated threat detection and response, enabling organizations of any size...
24. [FortiSIEM](https://www.softwareadvice.co.uk/software/224719/fortisiem) — 4.5/5 (12 reviews) — FortiSIEM is a security Information and event management (SIEM) platform, which enables businesses to detect unusual ...
25. [OpenText Core Behavioral Signals](https://www.softwareadvice.co.uk/software/395295/arcsight) — 4.1/5 (12 reviews) — ArcSight is a behavioral analytics and vulnerability management solution that helps businesses detect, investigate an...

-----

Page: 1 / 3\
Next: [Next page](https://www.softwareadvice.co.uk/directory/4725/siem/software?page=2)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.co.uk/directory/4329/cloud-security/software)
- [SOAR Tools](https://www.softwareadvice.co.uk/directory/4421/soar/software)
- [Network Security Software](https://www.softwareadvice.co.uk/directory/4170/network-security/software)
- [Cybersecurity Software](https://www.softwareadvice.co.uk/directory/4643/cybersecurity/software)
- [XDR Platforms (Extended Detection & Response)](https://www.softwareadvice.co.uk/directory/4754/xdr-software/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.uk/directory/4725/siem/software)
- [All Categories](https://www.softwareadvice.co.uk/directory)

## This page is available in the following languages

| Locale | URL |
| de | <https://www.softwareadvice.de/directory/4725/siem/software> |
| en | <https://www.softwareadvice.com/siem/> |
| en-AU | <https://www.softwareadvice.com.au/directory/4725/siem/software> |
| en-GB | <https://www.softwareadvice.co.uk/directory/4725/siem/software> |
| en-IE | <https://www.softwareadvice.ie/directory/4725/siem/software> |
| en-NZ | <https://www.softwareadvice.co.nz/directory/4725/siem/software> |
| fr | <https://www.softwareadvice.fr/directory/4725/siem/software> |

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice UK","address":{"@type":"PostalAddress","addressLocality":"Egham","addressRegion":"ENG","postalCode":"TW20 9AH","streetAddress":"Tamesis, The Glanty, Staines-upon-Thames Egham TW20 9AH United Kingdom"},"description":"Software Advice helps businesses in the UK find the best software with confidence. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.uk","url":"https://www.softwareadvice.co.uk/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@id":"https://www.softwareadvice.co.uk/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice UK","url":"https://www.softwareadvice.co.uk/","@id":"https://www.softwareadvice.co.uk/#website","@type":"WebSite","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.uk/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"SIEM Tools","description":"Discover the best SIEM Tools for your organisation. Compare top SIEM Tools tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.uk/directory/4725/siem/software","about":{"@id":"https://www.softwareadvice.co.uk/directory/4725/siem/software#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.uk/directory/4725/siem/software#breadcrumblist"},"@id":"https://www.softwareadvice.co.uk/directory/4725/siem/software#webpage","@type":["WebPage","CollectionPage"],"mainEntity":{"@id":"https://www.softwareadvice.co.uk/directory/4725/siem/software#itemlist"},"publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"},"inLanguage":"en-GB","isPartOf":{"@id":"https://www.softwareadvice.co.uk/#website"}},{"@id":"https://www.softwareadvice.co.uk/directory/4725/siem/software#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"SIEM Tools","position":2,"item":"https://www.softwareadvice.co.uk/directory/4725/siem/software","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Best SIEM Tools - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@id":"https://www.softwareadvice.co.uk/directory/4725/siem/software#itemlist","@type":"ItemList","itemListElement":[{"name":"Heimdal Threat-hunting & Action Center","position":1,"description":"The Heimdal Threat-Hunting and Action Center is threat intelligence solution that is designed to manage and respond to cyber threats. It offers real-time visibility across the entire digital landscape, helping security teams stay vigilant and eliminate the possibility of threats slipping past undetected. With pre-computed risk scores, indicators, and detailed attack analysis, security teams can swiftly zone in on threats using built-in knowledge base and forensics analytics.\n\nThe platform brings a re-imagined SecOps toolkit under one roof, providing security teams with a comprehensive view of their IT landscape and enabling them to make quick decisions on the fly. The action center allows for one-click remediation, empowering security professionals to respond to threats with confidence. It also offers detailed information to further investigate incidents and threats.\n\nFor SecOps and IT professionals, it provides a single pane of glass for intelligence, hunting, and response, eliminating alert fatigue and manual investigations. Security leaders can bring security health to the boardroom with one dashboard, pre-compute risks, address security and skills gaps, and minimize organizational risk and maintain compliance. Managed security providers can manage multiple customers globally without efficiency or resource drainage, protect at-risk customers without delay, and resolve issues using actionable controls.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fdee4377-1380-43e0-9b9b-2fda8d5855e3.png","url":"https://www.softwareadvice.co.uk/software/399929/heimdal-threat-hunting-and-action-center","@type":"ListItem"},{"name":"Logmanager","position":2,"description":"Logmanager is a log management and analysis tool that centralizes the aggregation of log data from various sources, enables alert creation, and provides analytical features to support effective incident investigation.\n\nWith unmatched ease of use, peerless functionality, and flexibility, Logmanager radically simplifies response to cyberthreats, legal compliance, and troubleshooting.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/af42b723-e499-4fc8-8e65-36584c3d983f.png","url":"https://www.softwareadvice.co.uk/software/521028/Logmanager","@type":"ListItem"},{"name":"EventSentry","position":3,"description":"EventSentry is an on-premise network monitoring solution that helps businesses monitor the performance of their IP-based devices such as routers, switches and workstations. EventSentry offers four core functionalities: managing logs, monitoring server health, managing compliances and monitoring network performance. The solution enables users to view and monitor their server health in real time through a performance dashboard.\n\n\nEventSentry offers a real-time device monitoring tool that sends alerts to administrators as soon as any new device is connected or an existing device is removed from the network. The administrator can remotely monitor the status of each device and bring any device online or offline via a central console. EventSentry also sends critical alerts and automatically consolidates activity logs in one central place.\n\n\nEventSentry enables businesses to comply with various government and industry regulations such as PCI, HIPAA, SOX, FISMA and more. It also offers reporting and analytics tools.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2e9d656e-2f63-4cc5-b2ea-51878679d73f.png","url":"https://www.softwareadvice.co.uk/software/382512/eventsentry","@type":"ListItem"},{"name":"ManageEngine Log360","position":4,"description":"Log360 is a SIEM or security analytics solution that helps you combat threats on premises, in the cloud, or in a hybrid environment. It also helps organizations adhere to compliance mandates such as PCI DSS, HIPAA, GDPR and more. You can customize the solution to cater to your unique use cases and protect your sensitive data.\n\nWith Log360, you can monitor and audit activities that occur in your Active Directory, network devices, employee workstations, file servers, databases, Microsoft 365 environment, cloud services and more. Log360 correlates log data from different devices to detect complex attack patterns and advanced persistent threats. The solution also comes with a machine learning based behavioral analytics that detects user and entity behavior anomalies, and couples them with a risk score. The security analytics are presented in the form of more than 1000 pre-defined, actionable reports. Log forensics can be performed to get to the root cause of a security challenge.\n\nThe built-in incident management system allows you to automate the remediation response with intelligent workflows and integrations with popular ticketing tools.\n\nThe solution can be installed on-premises and is also available on the cloud as Log360 Cloud.  Support is offered via phone, email and other online resources.\n\nHere's what Log360 can do for you:\n\n1. Identify malicious communications with blacklisted \n    IPs, URLs, and domains by corroborating data from \n    threat intelligence services.\n\n2. Monitor widely-used public cloud platforms, \n    including Amazon Web Services (AWS), Microsoft \n    Azure, and Salesforce.\n\n3. Monitor file and folder creation, deletion, \n    modification, and permission changes in Windows file \n    servers, NetApp file servers, EMC file servers, Linux \n    and more.\n\n4. Monitor and audit critical Active Directory changes in \n    real time.\n\nManageEngine also offers Onboarding for Log360 which is our holistic solution implementation service by experts for your unique business requirements. Get onboarding services here \nhttps://www.manageengine.com/onboarding/iam-and-siem-onboarding.html?utm_source=Softwareadvice&utm_medium=onboardingl&utm_campaign=product_listing_default","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/da71bee5-cb9b-4189-af5f-2d22ba015486.png","url":"https://www.softwareadvice.co.uk/software/435342/manageengine-log360","@type":"ListItem"},{"name":"Google Cloud","position":5,"description":"Google Cloud is a suite of cloud computing services that allows businesses to build, deploy, and scale applications. The platform caters to a wide range of industries, such as retail, financial services, healthcare, media, telecommunications, gaming, manufacturing, supply chain, government, education, and automotive.\n\nAt the core of Google Cloud is its technology through which businesses can build, deploy apps, and analyze data. The platform offers Gemini 20 and Google Agentspace. This includes AI agents, AI-enabled search, and NotebookLM for enterprises. Vertex AI is the fully managed AI platform enhanced by Gemini. It provides access to multiple foundation models. This empowers organizations to build and scale generative AI applications. Contact Center AI also delivers virtual agents and conversational AI products like Speech-to-Text to enhance customer service.\n\nGoogle Cloud's infrastructure includes Compute Engine. The platform features Google Kubernetes Engine and Cloud Run for automatically deploying, scaling, and managing containers. Cloud SQL is a fully-managed database service for MySQL, PostgreSQL, and SQL Server. AlloyDB for PostgreSQL allows enterprises to scale workloads and build generative AI apps. Businesses can also leverage BigQuery for analytics at scale, and Looker, a platform for BI data applications and embedded analytics.\n\nFeaturing G-Suite and GCP, Google Cloud provides a set of solutions provides secure storage options, integrated data analytics products and computation options. With its G-Suite platform, users can establish team chats and collaborate on projects through productivity tools like Google Docs, Hangouts, Calendar and Drive. Also, G-Suite provides customization options for Gmail accounts of users.\n\nGCP data centers all around the globe consist of physical assets which include computers, hard drives and other virtual machines that help streamline distribution of resources, which provides redundancy in case of any failure or latency reduction. Providing Global, regional and zonal resources, GCP has managed to bring people into a serverless environment which has eliminated the need for any infrastructure.The AppEngine on GCP helps scale the system to automatically provide the required resources.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2a3d334e-5a74-46a0-bfa0-70b4915098da.png","url":"https://www.softwareadvice.co.uk/software/172144/google-cloud-platform","@type":"ListItem"},{"name":"Datadog","position":6,"description":"Datadog is the monitoring, security and analytics platform for developers, IT operations teams, security engineers and business users in the cloud age. \n\nDatadog's SaaS platform integrates and automates infrastructure monitoring, application performance monitoring and log management to provide unified, real-time observability of our customers' entire technology stack.\n\nDatadog is used by organizations of all sizes and across a wide range of industries to enable digital transformation and cloud migration, drive collaboration among development, operations, security and business teams, accelerate time to market for applications, reduce time to problem resolution, secure applications and infrastructure, understand user behavior and track key business metrics.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/680c6e55-5ae3-4b54-8408-36deb18d3660.png","url":"https://www.softwareadvice.co.uk/software/101405/datadog","@type":"ListItem"},{"name":"JumpCloud Directory Platform","position":7,"description":"JumpCloud Directory-as-a-Service is an IT Management software, which helps businesses of all sizes manage devices or workstations including Windows, MacOS, and Linux, access to IT resources, and user identities. The solution provides a centralized identity, which allows administrators to manage system security policies, multi-factor authentication processes, and public SSH keys.\n\n\nProfessionals can utilize its self-service portal to execute commands across multiple servers, control file storage infrastructure, and manage users as an individual or as part of groups. JumpCloud Directory-as-a-Service provides single sign-on functionality to access various applications including Slack, Zendesk, Meraki, GitHub, Dropbox, and more. Additionally, enables managers to monitor employees’ activities across multiple endpoints.\n\n\nJumpCloud Directory-as-a-Service offers an application programming interface (API), which lets businesses integrate the system with several third-party applications such as G-Suite, Azure Active Directory, Workday, and more. Pricing is based on monthly and annual subscriptions and support is extended via FAQs, knowledgebase, email, and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7818866c-4066-4078-ba1a-03c0e105f11d.png","url":"https://www.softwareadvice.co.uk/software/180508/jumpcloud-directory-as-a-service","@type":"ListItem"},{"name":"Splunk Enterprise","position":8,"description":"The Splunk Enterprise platform allows users to process and index most forms of data in their native format. It includes data indexing tools, which enable users to locate specific data across large data sets.\n\n\nThe software is designed to serve users with limited technical expertise. A key selling point is the platform's scalability, which allows it to grow with the amount of data it is needed to process; up to at least 100 terabytes per day. To ensure users always have access to their data, even in the event of a system disruption, this platform features built-in failover and disaster recovery capabilities.\n\n\nDeployment options include both on-premise and SaaS (Software as a Service). Subscription pricing is based on the amount of data indexed per day, and pricing decreases as the amount of data indexed increases. There are perpetual and term license pricing options as well.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c935ef6d-e80a-4f64-8b46-1864f7d1e6e3.png","url":"https://www.softwareadvice.co.uk/software/234262/splunk-enterprise","@type":"ListItem"},{"name":"SentinelOne","position":9,"description":"Designed with Fortune 500 and Global 2000 companies in mind, SentinelOne is a leading autonomous cybersecurity platform specializing in AI-powered endpoint protection. \n\nThe autonomous agent platform allows users to detect threats across multiple vectors and resolve system attacks. SentinelOne's endpoint detection and response (EDR) module automates mitigation of bugs/issues and ensure immunity against newly discovered threats. Additionally, the artificial intelligence (AI)-based solution performs recurring scans to detect various threats including malware, trojans, worms and more, preserving end-user productivity within the organization.\n\n\nSentinelOne allows integration with various third-party applications such as Tanium, Splunk, Okta, Fortinet and BigFix. The application can also be deployed in an on-premise environment. Pricing is available on annual subscription and support is extended via documentation, phone and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/dbe48f25-9e50-4c70-bc05-1f84a811f2df.png","url":"https://www.softwareadvice.co.uk/software/363019/sentinelone","@type":"ListItem"},{"name":"Elastic Stack","position":10,"description":"Built on a foundation of free and open, Elasticsearch, Logstash, Kibana, and Beats pave the way for diverse use cases that start with logging and span as far as your imagination takes you. Elastic features like machine learning, security, and reporting compound that value — and since they’re made for Elastic, you'll only find them from us. \n \nReliably and securely take data from any source, in any format, then search, analyze, and visualize it in real time.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8d372ebb-6358-4dc6-b756-c71f4e5b405c.png","url":"https://www.softwareadvice.co.uk/software/132343/elasticsearch","@type":"ListItem"},{"name":"Lookout","position":11,"description":"Lookout is an integrated endpoint security and secure access service edge (SSE) solution designed to protect business data. It provides unified insights to help businesses identify threats, such as mobile phishing and ransomware, and implement security policies. Lookout can increase visibility and provide protection for teams who are working remotely while using mobile devices and cloud technology.\n\nLookout works as a single security platform that protects data from endpoints to the cloud, without the need for multiple standalone solutions. It includes real-time protection for phishing attacks, custom web filtering for inappropriate web content, data protection in email, SaaS, and IaaS applications, plus more. \n\nPricing information is provided on request by Lookout. Support is available via an FAQ page, online portal, and other resources.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/764d1f7c-5498-40f5-8da4-941ec7ddb41c.png","url":"https://www.softwareadvice.co.uk/software/379029/lookout","@type":"ListItem"},{"name":"ConnectWise SIEM","position":12,"description":"ConnectWise SIEM (formerly Perch) is a threat detection and response management solution that allows organizations to design, deploy and manage custom cybersecurity programs. The platform includes a threat hunting functionality with drill-down capabilities, which assist administrators with evaluating threat alerts, logs and related information.\n\n\nConnectWise SIEM allows enterprises to detect potential threats, security issues and malicious activities across the network and connected devices via a unified portal. IT professionals can gain visibility into Windows logs, active assets, HIPAA and PCI DSS compliance, networking status and other metrics via a dashboard. Additionally, users can evaluate issues, instance and other events through real-time alerts and store the information in a repository for future reference.\n\n\nConnectWise SIEM supports integration with a variety of third-party applications such as G Suite, Microsoft teams, Cisco, Salesforce, Bitdefender, Freshdesk, and more. Pricing includes monthly subscriptions and support is provided via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d34dcfe8-0d4f-4a8b-8316-e96618c26019.png","url":"https://www.softwareadvice.co.uk/software/118233/perch-security","@type":"ListItem"},{"name":"IBM Security QRadar","position":13,"description":"Designed for businesses in automotive, consumer goods, banking, healthcare and other industries, IBM Security QRadar is a security information and event management (SIEM) solution that helps track and handle cyber threats across endpoints, networks, cloud environments and more. Key features include artificial intelligence (AI), threat investigation, incident timelines, root cause analysis, threat prioritization, remediation management and third-party integration. Additionally, it also provides customer support through email, phone, chat and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8bfbb52a-6855-48b0-aae3-1dcf0feddef4.png","url":"https://www.softwareadvice.co.uk/software/390310/ibm-security-qradar","@type":"ListItem"},{"name":"Sumo Logic","position":14,"description":"Sumo Logic is a cloud-based log management platform that helps small to large businesses create, manage and archive event logs for auditing, issue tracking and compliance. The centralized platform comes with real-time analytics module for users to identify, investigate and resolve cyber threats, data breaches, and compliance negligence. \n\n\nDesigned for professionals in development, engineering, IT, customer success, product, data science, security sectors, features of Sumo Logic include multiple user profiles, access controls, auto-scheduled searches, real-time alerts, identification of potential threats, custom reports and more. The system allows users to break data into silos and improve collaboration through shareable dashboards, reports and custom searches.\n\n\nSumo Logic comes with an application programming interface, which allows enterprises to modify as well as integrate the platform with several third-party software such as Artifactory, MongoDB, Data Volume, CrowdStrike, Apache, Google Apps, Heroku, Microsoft SQL Server, and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/831933d9-71e3-4cff-81b6-34e39e50bcb2.png","url":"https://www.softwareadvice.co.uk/software/80463/sumo-logic","@type":"ListItem"},{"name":"Graylog","position":15,"description":"Graylog is an open, AI-powered SIEM and log management platform built for security and IT teams that need clear visibility, effective threat detection, and predictable costs—without unnecessary complexity or vendor lock-in.\n\nGraylog centralizes logs, security telemetry, and operational data from cloud, on-prem, and hybrid environments into a single platform. With built-in parsing, normalization, correlation, and threat intelligence enrichment, teams gain immediate context into activity across their infrastructure, applications, and networks.\n\nDesigned for organizations with limited security resources, Graylog reduces alert noise through practical, explainable AI, entity-centric risk prioritization, and guided investigation workflows. Analysts can quickly move from alert to context to response, focusing on real threats instead of sorting through high volumes of low-value alerts.\n\nCost control is a core part of the platform. Selective ingestion and intelligent data tiering ensure organizations only pay for the data they actively analyze, while still retaining historical logs for audits, investigations, and compliance needs. This approach keeps SIEM costs predictable as data volumes grow.\n\nGraylog supports flexible deployment models, including self-managed, cloud, and hybrid environments, and integrates openly with existing security and IT tools. Powerful search, customizable dashboards, real-time alerts, and automated reporting enable both security operations and IT operations teams to work from the same source of truth.\n\nBuilt to scale without sacrificing usability, Graylog helps teams improve detection, speed investigations, and maintain control over their data—making it a practical choice for organizations that want strong security outcomes without added operational burden.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2523d9c6-bdeb-4d29-aacb-ceb6fc2d480c.png","url":"https://www.softwareadvice.co.uk/software/346476/graylog","@type":"ListItem"},{"name":"Logz.io","position":16,"description":"Logz.io is a cloud-based log management and log analysis solution with alerts and machine-learning algorithms. It based on open-source log analysis platform the ELK Stack (Elasticsearch, Logstash, Kibana). Key features include alerts, user controls, log parsing, live trails, audit trails, archiving and ELK apps.\n\n\nUsers can create alerts for log messages and get notified via email or a messaging app using endpoints. Logz.io provides automatic parsing capability with MySQL, MongoDB, Jenkins, HAProxy and Nagios logs.\n\n\nLogz.io allows users to share visualizations and dashboards with team members, and they can manage team members rights to access data. It also supports Single Sign-On, Okta and OneLogin.\n\n\nLogz.io is HIPPA, SOC 2 Type 2, PCI Level 1, GDPR and ISO27001 compliant. It also provides a variety of built-in integrations with major applications and platforms including AWS, Docker, Ruby, Python and Java.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3ee2f193-1f20-4e82-84e4-4bd9bed34c7c.png","url":"https://www.softwareadvice.co.uk/software/165988/logz-io","@type":"ListItem"},{"name":"Sematext Cloud","position":17,"description":"Sematext gives businesses full-stack visibility by exposing performance issues, quickly and easily, through a single cloud or on-premise solution. Sematext Cloud is a cloud monitoring solution that helps businesses of all sizes track application performance, manage logs, monitor servers and more on a centralized platform. \n\n\nSematext Cloud's IT inventory management functionality enables team members to track assets, identify version discrepancies, and maintain audit logs of all packages. Additionally, administrators can configure alert rules and filter alert logs based on multiple criteria, including time, app and severity. The database monitoring module lets employees detect failures, raise database queries, and monitor wait events, among other processes.\n\n\nSematext Cloud comes with an application programming interface (API), which allows businesses to integrate the system with several third-party solutions, including Docker, Apache Tomcat, Solr, and Kafka. It is available for free, on monthly subscriptions, per hour basis and per-monitor basis. Support is extended via live chat, phone, email, video tutorials and documentation.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/07cda797-42a5-42bb-91db-9dae5e236190.png","url":"https://www.softwareadvice.co.uk/software/95450/sematext-cloud","@type":"ListItem"},{"name":"Netsurion","position":18,"description":"Netsurion Managed Threat Protection provides the necessary synergy between people, process, and \ntechnology to truly deliver world-class cybersecurity today. What does this mean to you and your business? \nTo be covered today, you have to prevent, detect, and respond to active threats and even predict future \nattacks before they happen. Yet even more than ever, your business relies on digital and remote capabilities. You \nneed to run fast and lean but cannot afford to risk gaps in cybersecurity.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7425e21c-45d3-4792-a80a-eaf5f6229329.png","url":"https://www.softwareadvice.co.uk/software/134470/eventtracker","@type":"ListItem"},{"name":"Logsign Unified SO Platform","position":19,"description":"Logsign Unified SO Platform, recognized by Gartner in their Magic Quadrant for SIEM for the past two years, delivers comprehensive threat detection, investigation, and response (TDIR) through integrated next-gen SIEM, threat intelligence, UEBA, and SOAR capabilities. Consolidate your security data, gain actionable insights, and automate responses for streamlined defense against threats. The platform seamlessly integrates with your existing security software, leveraging our vast integration library to expand functionality and provide a comprehensive security management experience.\n\nLogsign is a global vendor specializing in providing comprehensive cybersecurity solutions that enable organizations to enhance their cyber resilience, reduce risk, and streamline security processes while decreasing HR and operational chaos. Logsign consistently offers an efficient, user-friendly, and seamless platform and employs the latest technologies to establish secure, resilient, and compliant environments while providing organizations with comprehensive visibility into their IT infrastructure, enhancing threat detection capabilities, and streamlining response efforts. In today's complex threat landscape, Logsign ensures that businesses have a robust cybersecurity posture in place, proactively safeguarding their systems, data, and digital assets. With a presence on four continents and a customer base of over 600 enterprises and governmental institutions. Logsign also has high ratings on Gartner Peer Insight and G2 sites.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fee10e18-5e80-4454-b8db-eea6049bb544.png","url":"https://www.softwareadvice.co.uk/software/443075/logsign","@type":"ListItem"},{"name":"ALog Series","position":20,"description":"ALog Series is a cloud-based and on-premise log management solution that assists enterprises with log extraction, context analysis and summary. It offers a search engine which helps users search, report, and manage time-series data. \n\nWith ALog Series, professionals can identify anomalies and deviations in data through artificial intelligence without setting any threshold values. ALog ConVerter analyzes event logs and configures settings in advance to receive automated alerts. \n\nUsers can also automate audits and monitoring via the report monitoring feature.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/01a24a46-0558-4b60-92c1-f7da02ae22cf.png","url":"https://www.softwareadvice.co.uk/software/327572/alog-converter","@type":"ListItem"},{"name":"USM Anywhere","position":21,"description":"USM Anywhere is a cloud-based security platform which helps midsize to large enterprises with risk detection, vulnerability assessment, security monitoring and threat response.\n\n\nThe security platform enables users to collect and detect information such as software services, number of users logged in and the operating system of assets. It comes with an active scanner, which lets users scan for known vulnerabilities, and an intrusion-detection system to conduct file integrity monitoring, gather operating system logs and perform rootkit checking. Further, its behavioral monitoring capability includes netflow information, bandwidth and traffic capture.\n\n\nAdditionally, USM users can participate in the open threat exchange (OTX) threat-sharing network and identify known malicious attackers. The solution integrates with third-party applications such as Jira, Office 365, Amazon Web Services, Palo Alto Networks and more.\n\n\nUSM Anywhere is available on a monthly subscription basis and comes with online and phone support.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/adf53927-f31f-47c4-be11-26cf1c8cdde6.png","url":"https://www.softwareadvice.co.uk/software/124618/alienvalut-usm","@type":"ListItem"},{"name":"Elastic Security","position":22,"description":"Unify SIEM, endpoint security, and cloud security\nElastic Security modernizes security operations — enabling analytics across years of data, automating key processes, and bringing native endpoint security to every host.\n\nElastic Security equips teams to prevent, detect, and respond to threats at cloud speed and scale — securing business operations with a unified, open platform.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/53396c75-0ce3-4fee-9847-2753a85c1704.png","url":"https://www.softwareadvice.co.uk/software/351891/kibana","@type":"ListItem"},{"name":"Blumira","position":23,"description":"Blumira’s cloud SIEM platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It eases the burden of alert fatigue, complexity of log management and lack of IT visibility. \n\nBlumira's cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Office 365, G Suite, Crowdstrike, Okta, Palo Alto, Cisco FTD and many others. Try Blumira for free at blumira.com/trial.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1f785f6b-2d00-4843-af80-9503cad7d2b7.jpeg","url":"https://www.softwareadvice.co.uk/software/210259/blumira","@type":"ListItem"},{"name":"FortiSIEM","position":24,"description":"FortiSIEM is a security Information and event management (SIEM) platform, which enables businesses to detect unusual user and entity behavior through data collection, correlation, remediation and automated response. The system monitors performance and availability across CPU, storage, memory and configuration changes.\n\nFortiSIEM collects and analyzes data from various sources such as performance metrics, security alerts, configuration changes and logs. Supervisors can provide custom role-based access to staff members and track user and device risk scores on a dashboard. Additionally, it offers pre-defined reports for enterprises to ensure compliance with Sarbanes–Oxley (SOX) Act, Health Insurance Portability and Accountability Act (HIPAA) and various other regulations.\n\nFortiSIEM integrates with several third-party systems such as ServiceNow, ConnectWise and more. Pricing is available on request and support is extended via documentation, phone and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ae8e018b-a59c-4c57-aef2-618d41018846.png","url":"https://www.softwareadvice.co.uk/software/224719/fortisiem","@type":"ListItem"},{"name":"OpenText Core Behavioral Signals","position":25,"description":"ArcSight is a behavioral analytics and vulnerability management solution that helps businesses detect, investigate and respond to threats and anomalies from within a unified platform. It lets team members utilize machine learning algorithms to identify threats, such as account misuse, data exfiltration, infected hosts, internal recon, and snooping.\n\nArcSight's timeline view enables IT professionals to view entities in chronological order with associated risk scores. With the built-in dashboard, staff members can access raw events that triggered an alert and enter additional queries on a centralized platform. Additionally, it allows team members to extract and observe behavior across entities, such as machines, users, servers, printers and IP addresses.\n\nArcSight comes with an application programming interface (API), which lets businesses integrate the platform with several third-party solutions. Pricing is available on request and support is extended via documentation, email, and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f9134b0f-ff86-4ba3-9f8c-fbdbca3a6fe8.jpeg","url":"https://www.softwareadvice.co.uk/software/395295/arcsight","@type":"ListItem"}],"numberOfItems":25}
</script>
