“Splunk has a single purpose in life: ingest machine data and help analyze and visualize that data. The breadth of the data sources that Splunk can ingest data from is broad and deep and it does an exemplary job at handling structured data. It does a great job at handling unstructured data. Breaking data into key/value pairs so that it can be searched is relatively painless.”
“Official training, even CBT, is expensive so not many people are able to get certified. This leads/causes the users to make use of the most basic functionality only.
It is a challenge to manage the environment in such a way, that one’s log, even with the bandwidth license, isn’t exceeded. Splunk has moved towards not applying hard caps in data ingestion, and this will help us in the future.
However, I’d like an easier way to flag certain source log files as non-critical and have Splunk automatically disable those event sources when the license capacity exceeds an arbitrary value.”
“The threat protection network is the most valuable feature because when you get an offense, you can actually trace it back to where it originated from, how it originated, and why.”
“From my point of view, they should improve the backup procedures. QRadar does not allow sending backups by FTP or SFTP, limiting the tool. I had to make a script but it is a manual process. It would be great to have it automated.”
“We use several features extensively; logging, vulnerability scanning, file integrity monitoring, and threat information.
It has allowed us to centralize our logging. We had used previous products and found AlienVault centralized the logging for our security. Additionally, we are better able to meet our compliance needs.”
“The report section needs to be improved. Most of the correlation rules are based on the NIDS event, which needs to be improved. In other words, we have to use the device logs also.”
“One of the most valuable features is the Active List/Session List capability.
Multiple use cases were only possible to be created due to this feature list. The feature list allows us to input data dynamically to list it as a rule action.
For example: If you need to take a Source IP from an IPS event and put it in an ActiveList suspicious IP, you can create another rule for AntiVirus events where it only matches IPs within that list.”
“They need to improve the Web UI, similar to how it is done with Splunk.
ArcSight is still using a Java app to do analytics. ArcSight Express is using HTML5, which is good. However, the capabilities of ArcSight Express are not good when the data grows.”
“The ability to write my own parsers for the devices that are not supported by Fortinet is the most valuable feature. It’s impossible to find an application that supports every device/manufacturer that we have. Thus, being able to write my own parsers for device logs, allows for greater scalability.”
“The UI, while presents data in a very informative way, suffers from too much clutter hindering usability. While this is a personal opinion, when compared against the likes of IBM, Splunk, and even LogRhythm, the AccelOps UI does not excite. We hope that Fortinet brings to fore its UI maturity to AccelOps, thereby becoming much more savvy.”
“RSA NetWitness is a SIEM and real-time network traffic solution. It collects logs/packets and applies a set of alerting, reporting and analysis rules on them. Thus, it provides the enterprise with a full visibility of the networks and activities of the systems…
For example, it provides detection of the attacks in early stages (brute-force attacks), by which the attackers try to gain access to the systems, by trying to log in using different usernames and passwords (might be in a dictionary).”
Silva elaborates that “Through correlation rules, it finds malware that compromised the computer that anti-virus and other security solutions do not find.”
In a second review that Silva wrote about McAfee Enterprise Security Manager, he notes that “the disk space needed for events is not clear. In all clients, we had at least more than 100GB free that we could not use...I suggest that you configure the data archive prior to deployment because once the partition is detached, it will be deleted and you can lose a week’s worth of events. You don't know when it will be deleted because even with a lot of space disk the partition is detached.”
“Anomaly dashboards provide the possibility to find zero-day attacks. This feature is built based on the second - search/filters. It's great and very useful because I would first find out if search/filter can give me the data that I needed. If not, I have the possibility to change it e.g. using regex or made search/filter fine-tuning.
And when I have search/filter tested and know that it will catch information that I want see on the chart, then I implement search/filter in the new Anomaly Dashboard.”
“The integration UI and modules deployment can improve. In my opinion, the web interface can manage all the functionalities and configurations; no Java desktop app is necessary.
The Java app functions can be migrated to the web interface. On the other hand, WMI integration can be improved by removing the WECS collector. Sentinel Node can include all the functions. If an escenary needs more power, just deploy another Sentinel node (all in one) that can help in multiples use cases, not just WECS.”
IT Director at a construction company with 51-200 employees
Vendor
Jul 12, 2017
I am really surprised that SolarWinds Log and Event Manager was not included in this discussion. LEM as its referred to no days, is a great SIEM tool. The Log monitoring more than meets our needs, reporting is fast and easy, and it has improved our security 100 time over.
Hi, in my opinion, because it is still the best at giving you visibility of what's happening in your IT infrastructure, and at detecting threats.
Visibility and detection may seem simple tasks. but actually, they require a lot of capabilities in understanding, integrating, logging, and alarms from a huge multitude of devices. Such tasks go under the line of log ingestion, normalization, etc., and that is far from easy. QRadar has done a lot of work in that direction.
Another aspect is event correlation. And here, either you write the correlation rules yourself, spending $$$$ of professional services, and by the way, it'll take forever to test, implement and maintain up to date, or your access to a very long list of preset correlation rules, that are already available and waiting to be activated.
Finally, visibility and threat detection is just the beginning of a journey pointed at becoming aware of what's happening in your IT and taking relevant and effective action. There are several other technologies that have to be used to minimize exposure, and contain, and remediate relations to an attack. I believe IBM has a few of those, that can be integrated. But whichever you use at the end of this journey, if the original feed is not correct, not relevant, or not complete, you missed your goal in the first place.My 5 cents :)VS
Team Lead - Information Security at a computer software company with 10,001+ employees
Feb 6, 2022
The IBM support can be better. It's an aspect that needs improvement. In future iterations, I'd like to see an advance in office management, the out-of-the-box use cases that are provided. That needs to be part of the requirement.
IM Operations Manager at a tech services company with 1,001-5,000 employees
Apr 25, 2022
IBM QRadar Advisor with Watson could be more user-friendly. You need some skills and understanding of what you're looking at, especially if you're going to draw down specific information. Massive improvement is required in reporting. IBM QRadar Advisor with Watson is not a tool that is known for its reporting capability. It's a highly operational tool that you use for monitoring, you can sit and you can watch your alerts, whether it's flows or EPS, and you set up your playbooks directly. It is not a reporting tool. It is the worst possible tool to ever expect any reporting. It's unfortunate it's not a great reporting tool. In a future release, there could be a bit more intelligence in terms of predictive accuracy and overall predictions. I haven't been too close in the last two, three, or four months, but I certainly would expect that their technology would be simplified to provide predictive analytics as opposed to retrospective looking back and analyzing past historic data.
Today, Security Information and Event Management (SIEM) solutions play a pivotal role in bolstering organizational defenses against an array of cybersecurity threats. Through the lens of real-world success stories and an evaluation of top SIEM technologies, this comprehensive article illustrates the transformative impact of SIEM systems across industries and highlights leading solutions, includ...
Enterprise Cloud and AI Security Architect at a security firm with 10,001+ employees
Feb 6, 2025
Apart from these, Google Chronicle SIEM is also the best solution for threat hunting and threat detection. We can also use Google Chronicle (Google SecOps) as a SIEM tool and even can be integrated with Mandiant ( third-party tool) for real-time threat intelligence. Google Chronicle is a cloud security service in GCP.
Download our free Security Information and Event Management (SIEM) Report and find out what your peers are saying about Splunk, IBM, Exabeam, and more! Updated: January 2026.
I am really surprised that SolarWinds Log and Event Manager was not included in this discussion. LEM as its referred to no days, is a great SIEM tool. The Log monitoring more than meets our needs, reporting is fast and easy, and it has improved our security 100 time over.
ye :LogRhythm is missing in the list
LogRhythm is missing in the list