Skip to Navigation
Skip to Navigation
Introducing G2.ai, the future of software buying.
Try now
G2 - Business Software Reviews
Search software
Software
Expand/Collapse Software
AI Agents
Services
Expand/Collapse Services
G2 for Business
Expand/Collapse vendor
For Marketers
Enhance your G2 profile and reach in-market buyers
For Sales
Find, engage, and convert in-market buyers
For Services
Reach companies that need you, when they’re ready to buy
For Investments
Gain access to real-time software trends
For Developers
Use our Developer Portal to test API data
Deals
Language Selector
EN
Choose a language
Deutsch
Français
Português
Español
Italiano
Leave a Review
Join or Log In
Search
Search Software and Services
Language Selector
Choose a language
Deutsch
Français
Português
Español
Italiano
Expand/Collapse
Home
...
All Categories
Security Information And Event Management (Siem) Software Discussions
Security Information And Event Management (Siem) Software Discussions
Share
All Security Information And Event Management (Siem) Software Discussions
Search
Most Commented
Most Helpful
Pinned by G2
Newest
All Discussions
Discussions with Comments
Pinned by G2
Discussions without Comments
Filter
Filter
Filter by
Expand/Collapse
Sort by
Most Commented
Most Helpful
Pinned by G2
Newest
Filter by
All Discussions
Discussions with Comments
Pinned by G2
Discussions without Comments
Posted within
Microsoft Sentinel
0
2
What is Microsoft Sentinel used for?
What is Microsoft Sentinel used for?
Security Orchestration, Automation, and Response (SOAR) Software
Security Information and Event Management (SIEM) Software
3
people commented
RS
Rudhra Sekar S.
FS
DS
Pinned by G2 as a
common question.
Posted within
Securonix Security Operations and Analytics Platform
0
1
What is Securonix Security Operations and Analytics Platform used for?
What is Securonix Security Operations and Analytics Platform used for?
Cloud Security Monitoring and Analytics Software
Network Traffic Analysis (NTA) Software
User and Entity Behavior Analytics (UEBA) Software
Security Orchestration, Automation, and Response (SOAR) Software
Security Information and Event Management (SIEM) Software
Identity Threat Detection and Response (ITDR) Software
Show More
1
person commented
PM
Pritam M.
Pinned by G2 as a
common question.
Posted within
Palo Alto Cortex XSIAM
0
1
What does QRadar stand for?
What does QRadar stand for?
Cloud Security Monitoring and Analytics Software
User and Entity Behavior Analytics (UEBA) Software
Digital Forensics Software
Network Traffic Analysis (NTA) Software
Incident Response Software
Security Information and Event Management (SIEM) Software
Extended Detection and Response (XDR) Platforms
Security Orchestration, Automation, and Response (SOAR) Software
Data Breach Notification Software
Endpoint Detection & Response (EDR) Software
Risk-based Vulnerability Management Software
Show More
1
person commented
VG
Vishal G.
Pinned by G2 as a
common question.
Posted within
Graylog
0
0
What is your experience with Graylog in managing log data, and what features do you find most use...
What is your experience with Graylog in managing log data, and what features do you find most useful?
Security Information and Event Management (SIEM) Software
Log Analysis Software
Log Monitoring Software
1
person commented
AS
Allen S.
Pinned by G2 as a
common question.
Posted within
LevelBlue USM Anywhere
0
0
How has AlienVault USM supported your cybersecurity efforts, and what features do you rely on most?
How has AlienVault USM supported your cybersecurity efforts, and what features do you rely on most?
Cloud Compliance Software
Intrusion Detection and Prevention Systems (IDPS)
Vulnerability Scanner Software
Incident Response Software
Security Information and Event Management (SIEM) Software
Show More
Pinned by G2 as a
common question.
Posted within
Pandora FMS
0
0
What are the benefits and drawbacks of using Pandora FMS for IT monitoring?
What are the benefits and drawbacks of using Pandora FMS for IT monitoring?
Observability Solution Suites Software
Enterprise Monitoring Software
Server Monitoring Software
Log Monitoring Software
Cloud Infrastructure Monitoring Software
Application Performance Monitoring (APM) Tools
network monitoring software
Database Monitoring Tools
Hardware Monitoring Software
help desk software
IT Alerting Software
IT Service Management Tools
Remote Desktop Software
Remote Monitoring & Management (RMM) Software
Security Information and Event Management (SIEM) Software
Show More
Pinned by G2 as a
common question.
Posted within
Blumira Automated Detection & Response
0
0
What are the benefits and drawbacks of using Blumira for threat detection?
What are the benefits and drawbacks of using Blumira for threat detection?
Network Detection and Response (NDR) Software
Cloud Security Monitoring and Analytics Software
Security Orchestration, Automation, and Response (SOAR) Software
Log Monitoring Software
Managed Detection and Response (MDR) Software
Intrusion Detection and Prevention Systems (IDPS)
Cloud Infrastructure Monitoring Software
Incident Response Software
Security Information and Event Management (SIEM) Software
Extended Detection and Response (XDR) Platforms
Show More
Pinned by G2 as a
common question.
Posted within
Logpoint
0
0
What is your experience with Logpoint for SIEM, and what do you recommend for new users?
What is your experience with Logpoint for SIEM, and what do you recommend for new users?
Log Monitoring Software
Log Analysis Software
Security Information and Event Management (SIEM) Software
Security Orchestration, Automation, and Response (SOAR) Software
Incident Response Software
Threat Intelligence Software
User and Entity Behavior Analytics (UEBA) Software
SAP Store Software
Show More
Pinned by G2 as a
common question.
Posted within
Splunk Enterprise
0
0
What is Splunk Enterprise used for?
What is Splunk Enterprise used for?
Enterprise Monitoring Software
Hardware Monitoring Software
AIOps Tools
ServiceNow Marketplace Apps
Log Analysis Software
Security Information and Event Management (SIEM) Software
Customer Data Platforms (CDP)
Show More
1
person commented
JG
Jabraj G.
Pinned by G2 as a
common question.
Posted within
Logz.io
0
0
What is Logz.io used for?
What is Logz.io used for?
Cloud Infrastructure Monitoring Software
Log Analysis Software
Security Information and Event Management (SIEM) Software
Application Performance Monitoring (APM) Tools
Log Monitoring Software
Observability Solution Suites Software
Show More
1
person commented
MV
Michele v.
Pinned by G2 as a
common question.
Posted within
Graylog
0
0
What is Graylog used for?
What is Graylog used for?
Security Information and Event Management (SIEM) Software
Log Analysis Software
Log Monitoring Software
Pinned by G2 as a
common question.
Posted within
LevelBlue USM Anywhere
0
0
What is AlienVault USM (from AT&T Cybersecurity) used for?
What is AlienVault USM (from AT&T Cybersecurity) used for?
Security Risk Analysis Software
Vulnerability Scanner Software
Incident Response Software
Security Information and Event Management (SIEM) Software
Cloud Compliance Software
Intrusion Detection and Prevention Systems (IDPS)
Show More
Pinned by G2 as a
common question.
Posted within
SolarWinds Security Observability
0
0
What is SolarWinds Security Event Manager used for?
What is SolarWinds Security Event Manager used for?
Security Information and Event Management (SIEM) Software
Pinned by G2 as a
common question.
Posted within
InsightIDR
0
0
What is InsightIDR used for?
What is InsightIDR used for?
Network Detection and Response (NDR) Software
User and Entity Behavior Analytics (UEBA) Software
Network Traffic Analysis (NTA) Software
Incident Response Software
Security Information and Event Management (SIEM) Software
Extended Detection and Response (XDR) Platforms
Show More
Pinned by G2 as a
common question.
Posted within
Logpoint
0
0
What is LogPoint used for?
What is LogPoint used for?
Log Monitoring Software
Log Analysis Software
Security Information and Event Management (SIEM) Software
Security Orchestration, Automation, and Response (SOAR) Software
Incident Response Software
Threat Intelligence Software
User and Entity Behavior Analytics (UEBA) Software
SAP Store Software
Show More
Pinned by G2 as a
common question.
Posted within
EventSentry
0
0
What is EventSentry used for?
What is EventSentry used for?
Security Information and Event Management (SIEM) Software
Log Analysis Software
Pinned by G2 as a
common question.
Posted within
FortiSIEM
0
0
What is FortiSIEM used for?
What is FortiSIEM used for?
Security Information and Event Management (SIEM) Software
Pinned by G2 as a
common question.
Posted within
Netsurion EventTracker
0
0
What is Netsurion EventTracker used for?
What is Netsurion EventTracker used for?
Managed Detection and Response (MDR) Software
Security Information and Event Management (SIEM) Software
Extended Detection and Response (XDR) Platforms
Pinned by G2 as a
common question.
Posted within
DICE Central Station
0
0
What is DICE Central Station used for?
What is DICE Central Station used for?
Security Information and Event Management (SIEM) Software
Physical Security Software
Pinned by G2 as a
common question.
Posted within
Logsign Unified SO Platform
0
0
What is Logsign Next-Gen SIEM used for?
What is Logsign Next-Gen SIEM used for?
Security Information and Event Management (SIEM) Software
Pinned by G2 as a
common question.
Posted within
Devo
0
0
What is Devo used for?
What is Devo used for?
Security Orchestration, Automation, and Response (SOAR) Software
Security Information and Event Management (SIEM) Software
Pinned by G2 as a
common question.
Posted within
LogLogic SIEM
0
0
What is LogLogic SIEM used for?
What is LogLogic SIEM used for?
Security Information and Event Management (SIEM) Software
Pinned by G2 as a
common question.
Posted within
CyberMaxx
0
0
What is CyberMaxx Managed Security Service used for?
What is CyberMaxx Managed Security Service used for?
Managed Detection and Response (MDR) Software
Security Information and Event Management (SIEM) Software
1
person commented
CyberMaxx
Pinned by G2 as a
common question.
Posted within
Splunk User Behavior Analytics
0
0
What is Splunk User Behavior Analytics used for?
What is Splunk User Behavior Analytics used for?
User and Entity Behavior Analytics (UEBA) Software
Insider Threat Management (ITM) Software
Security Information and Event Management (SIEM) Software
Machine Learning Software
Pinned by G2 as a
common question.
Posted within
Palo Alto Cortex XSIAM
0
0
What is IBM Security ReaQta used for?
What is IBM Security ReaQta used for?
Endpoint Detection & Response (EDR) Software
Risk-based Vulnerability Management Software
Security Information and Event Management (SIEM) Software
Cloud Security Monitoring and Analytics Software
User and Entity Behavior Analytics (UEBA) Software
Digital Forensics Software
Network Traffic Analysis (NTA) Software
Incident Response Software
Extended Detection and Response (XDR) Platforms
Security Orchestration, Automation, and Response (SOAR) Software
Data Breach Notification Software
Show More
Pinned by G2 as a
common question.
Posted within
OpenText NetIQ Sentinel
0
0
What is NetIQ Sentinel used for?
What is NetIQ Sentinel used for?
Security Information and Event Management (SIEM) Software
Pinned by G2 as a
common question.
Posted within
OpenText ArcSight Intelligence
0
0
What is Micro Focus ArcSight Intelligence used for?
What is Micro Focus ArcSight Intelligence used for?
Security Information and Event Management (SIEM) Software
Pinned by G2 as a
common question.
Posted within
Total Security Management (TSM)
0
0
What is Total Security Management (TSM) used for?
What is Total Security Management (TSM) used for?
Security Information and Event Management (SIEM) Software
Pinned by G2 as a
common question.
Posted within
SOCVue Security Monitoring
0
0
What is SOCVue Security Monitoring used for?
What is SOCVue Security Monitoring used for?
Security Information and Event Management (SIEM) Software
Pinned by G2 as a
common question.
Posted within
Panther
0
0
What is Panther used for?
What is Panther used for?
Cloud Security Monitoring and Analytics Software
Log Analysis Software
Security Information and Event Management (SIEM) Software
1
person commented
MD
Mimoh D.
Pinned by G2 as a
common question.
Posted within
Sumo Logic
0
0
What is Cloud SOAR used for?
What is Cloud SOAR used for?
Security Orchestration, Automation, and Response (SOAR) Software
Cloud Security Monitoring and Analytics Software
Log Monitoring Software
Cloud Infrastructure Monitoring Software
Container Monitoring Tools
Log Analysis Software
Incident Response Software
Security Information and Event Management (SIEM) Software
Application Performance Monitoring (APM) Tools
Observability Solution Suites Software
Show More
Pinned by G2 as a
common question.
Posted within
Splunk Cloud Platform
0
0
What is Splunk Cloud Platform used for?
What is Splunk Cloud Platform used for?
Enterprise Monitoring Software
Hardware Monitoring Software
AIOps Tools
Log Analysis Software
Security Information and Event Management (SIEM) Software
Customer Data Platforms (CDP)
Show More
Pinned by G2 as a
common question.
Posted within
Observe
0
0
What is Observe used for?
What is Observe used for?
IT Alerting Software
Log Analysis Software
Security Information and Event Management (SIEM) Software
Application Performance Monitoring (APM) Tools
Observability Solution Suites Software
Cloud Infrastructure Monitoring Software
Show More
Pinned by G2 as a
common question.
Posted within
BMC AMI Command Center for Security
0
0
What is BMC AMI Command Center for Security used for?
What is BMC AMI Command Center for Security used for?
Security Information and Event Management (SIEM) Software
Pinned by G2 as a
common question.
Posted within
Vijilan Threat Respond
0
0
What is Vijilan Threat Respond used for?
What is Vijilan Threat Respond used for?
Risk-based Vulnerability Management Software
Managed Detection and Response (MDR) Software
Security Information and Event Management (SIEM) Software
Cloud Detection and Response (CDR) Software
Pinned by G2 as a
common question.
Posted within
Splunk Enterprise
0
0
What is the difference between Splunk Enterprise and Splunk Enterprise Security?
What is the difference between Splunk Enterprise and Splunk Enterprise Security?
Enterprise Monitoring Software
Hardware Monitoring Software
AIOps Platforms
ServiceNow Marketplace Apps
Log Analysis Software
Security Information and Event Management (SIEM) Software
Customer Data Platforms (CDP)
Show More
1
person commented
SM
Sunil M.
Pinned by G2 as a
common question.
Posted within
Datadog
0
0
How good is Datadog?
How good is Datadog?
Enterprise Monitoring Software
Log Monitoring Software
AIOps Platforms
Network Traffic Analysis (NTA) Software
Database Monitoring Tools
IoT Device Management Software
IoT Analytics Software
Website Monitoring Software
Cloud Infrastructure Monitoring Software
IT Alerting Software
Container Monitoring Software
Log Analysis Software
Incident Response Software
Security Information and Event Management (SIEM) Software
API Marketplaces
Application Performance Monitoring (APM) Tools
network monitoring software
Server Monitoring Software
Observability Solution Suites Software
Show More
Pinned by G2 as a
common question.
Posted within
Maltego
0
0
How good is Maltego?
How good is Maltego?
Threat Intelligence Software
Brand Protection Software
Investigation Management Software
Anti Money Laundering Software
Fraud Detection Software
Incident Response Software
Security Information and Event Management (SIEM) Software
Digital Forensics Software
Data Mapping Software
Security Orchestration, Automation, and Response (SOAR) Software
Mind Mapping Software
Disinformation Detection Tools
Insider Threat Management (ITM) Software
Network Detection and Response (NDR) Software
Attack Surface Management Software
Analytics Platforms
Show More
1
person commented
NZ
Norakmal Z.
Pinned by G2 as a
common question.
Posted within
LogRhythm SIEM
0
0
What are some SIEM tools?
What are some SIEM tools?
Incident Response Software
Security Information and Event Management (SIEM) Software
Extended Detection and Response (XDR) Platforms
Pinned by G2 as a
common question.
Posted within
McAfee Enterprise Security Manager
0
0
What is ERC in SIEM?
What is ERC in SIEM?
Security Information and Event Management (SIEM) Software
Pinned by G2 as a
common question.
Posted within
Blumira Automated Detection & Response
0
0
What is cloud SIEM?
What is cloud SIEM?
Network Detection and Response (NDR) Software
Cloud Security Monitoring and Analytics Software
Security Orchestration, Automation, and Response (SOAR) Software
Log Monitoring Software
Intrusion Detection and Prevention Systems (IDPS)
Cloud Infrastructure Monitoring Software
Incident Response Software
Security Information and Event Management (SIEM) Software
Managed Detection and Response (MDR) Software
Show More
Pinned by G2 as a
common question.
Posted within
OpenText ArcSight Enterprise Security Manager (ESM)
0
0
What is ESM in Siem?
What is ESM in Siem?
Security Information and Event Management (SIEM) Software
Pinned by G2 as a
common question.
Posted within
Check Point SmartEvent Event Management
0
0
What does an event management website do?
What does an event management website do?
Digital Forensics Software
Security Information and Event Management (SIEM) Software
Incident Response Software
Pinned by G2 as a
common question.
Posted within
Microsoft Sentinel
0
0
Why should I use Azure Sentinel?
Why should I use Azure Sentinel?
Security Orchestration, Automation, and Response (SOAR) Software
Security Information and Event Management (SIEM) Software
1
person commented
FB
FABIAN RODRIGO B.
Pinned by G2 as a
common question.
Posted within
Sumo Logic
0
0
Is Sumo Logic a SIEM?
Is Sumo Logic a SIEM?
Cloud Security Monitoring and Analytics Software
Log Monitoring Software
Cloud Infrastructure Monitoring Software
Container Monitoring Software
Log Analysis Software
Incident Response Software
Security Information and Event Management (SIEM) Software
Application Performance Monitoring (APM) Tools
Security Orchestration, Automation, and Response (SOAR) Software
Observability Solution Suites Software
Show More
Pinned by G2 as a
common question.
Posted within
McAfee Event Receiver
0
0
What is McAfee Elm?
What is McAfee Elm?
Security Information and Event Management (SIEM) Software
Pinned by G2 as a
common question.
Posted within
Exabeam New-Scale Fusion
0
0
What are the components of SIEM?
What are the components of SIEM?
Security Orchestration, Automation, and Response (SOAR) Software
Security Information and Event Management (SIEM) Software
Threat Intelligence Software
User and Entity Behavior Analytics (UEBA) Software
1
person commented
FM
Falah M.
Pinned by G2 as a
common question.
Posted within
NetWitness Platform
0
0
What is one of the biggest differentiators for RSA NetWitness platform?
What is one of the biggest differentiators for RSA NetWitness platform?
Extended Detection and Response (XDR) Platforms
Network Detection and Response (NDR) Software
User and Entity Behavior Analytics (UEBA) Software
Security Orchestration, Automation, and Response (SOAR) Software
Security Information and Event Management (SIEM) Software
Show More
Pinned by G2 as a
common question.
Posted within
OSSIM (Open Source)
0
0
Is AlienVault Ossim free?
Is AlienVault Ossim free?
Security Information and Event Management (SIEM) Software
Pinned by G2 as a
common question.
Posted within
ManageEngine ADAudit Plus
0
0
What does AD audit do?
What does AD audit do?
Network Detection and Response (NDR) Software
Cloud Security Monitoring and Analytics Software
User and Entity Behavior Analytics (UEBA) Software
Log Analysis Software
Security Information and Event Management (SIEM) Software
Show More
Pinned by G2 as a
common question.
‹ Prev
‹ Prev
1
2
3
4
Next ›
Next ›
Top Contributors in Security Information and Event Management (SIEM) Software
1
JD
Loading...
Jack D.
4 pts
2
JG
Loading...
Jeremy G.
Product Marketing Manager
3 pts
3
JP
Loading...
Jose P.
Cyber Security Analyst II
3 pts
4
DY
Loading...
DHEVAN Y.
2 pts
5
VG
Loading...
Vishal G.
Senior System Engineer
2 pts
Popular Discussions without Comments
0
1
How can i decrypt ssl traffic with the most strongest cipher?
0
1
Can we sent logs to cloud by creating ipsec tunnel on firewalls ?
0
1
Nothing
0
1
As of now no questions regarding this
0
1
Which is the best plan to use if the organization size is less than 10 members?
Hunting for software
insights
?
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.
G2 - Business Software Reviews
Create an account
Already have an account?
Log in
G2 - Business Software Reviews
Create an account
Already have an account?
Log in
or continue with
LinkedIn
Google
Google
By proceeding, you agree to our
Terms of Use
and
Privacy Policy