Try our new research platform with insights from 80,000+ expert users

Top SIEM Solutions & Success Stories: Strengthening Cybersecurity in Diverse Industries

Julia Miller - PeerSpot reviewer
Community Director at PeerSpot
  • 138
Published:Mar 19, 2024
Product comparison that may be of interest to you
PeerSpot user

1 Comment

Last commented on Feb 6, 2025
Atul-Yadav - PeerSpot reviewer
Enterprise Cloud and AI Security Architect at a security firm with 10,001+ employees
Real User
Top 5Leaderboard
Feb 6, 2025
Find out what your peers are saying about Splunk, Wazuh, IBM and others in Security Information and Event Management (SIEM). Updated: January 2026.
881,082 professionals have used our research since 2012.
Related Questions
Ammar Jibarah - PeerSpot reviewer
D&T Manager - Security Assurance at Aramex
Feb 4, 2025
Feb 4, 2025
I prefer Microsoft Sentinel Over Palo Alto Networks Cortex XSOAR. Microsoft Sentinel is a Cloud native SIEM that provides intelligent security analytics for your entire enterprise, powered by AI. Users report that Microsoft Sentinel excels in Log Management with a score of 8.8, while Palo Alto Networks Cortex XSOAR has a lower score of 8.1 in Log Monitoring, indicating that Sentinel may provid...
See 2 answers
AS
Member of the board at Data Security Solutions
Jun 14, 2023
Why not try Logpoint instead?;) 
Atul-Yadav - PeerSpot reviewer
Enterprise Cloud and AI Security Architect at a security firm with 10,001+ employees
Feb 4, 2025
I prefer Microsoft Sentinel Over Palo Alto Networks Cortex XSOAR. Microsoft Sentinel is a Cloud native SIEM that provides intelligent security analytics for your entire enterprise, powered by AI. Users report that Microsoft Sentinel excels in Log Management with a score of 8.8, while Palo Alto Networks Cortex XSOAR has a lower score of 8.1 in Log Monitoring, indicating that Sentinel may provide a more robust solution for managing logs effectively.
Liam Brandt - PeerSpot reviewer
Works at Catalyic Consulting (Pvt.) Ltd
Mar 22, 2023
Mar 22, 2023
I´m not sure about this affirmation. There are a lot of other tools used.
See 2 answers
VS
Works at RAS Unipers
Mar 14, 2023
Hi, in my opinion, because it is still the best at giving you visibility of what's happening in your IT infrastructure, and at detecting threats. Visibility and detection may seem simple tasks. but actually, they require a lot of capabilities in understanding, integrating, logging, and alarms from a huge multitude of devices. Such tasks go under the line of log ingestion, normalization, etc., and that is far from easy. QRadar has done a lot of work in that direction. Another aspect is event correlation. And here, either you write the correlation rules yourself, spending $$$$ of professional services, and by the way, it'll take forever to test, implement and maintain up to date, or your access to a very long list of preset correlation rules, that are already available and waiting to be activated. Finally, visibility and threat detection is just the beginning of a journey pointed at becoming aware of what's happening in your IT and taking relevant and effective action. There are several other technologies that have to be used to minimize exposure, and contain, and remediate relations to an attack. I believe IBM has a few of those, that can be integrated. But whichever you use at the end of this journey, if the original feed is not correct, not relevant, or not complete, you missed your goal in the first place.My 5 cents :)VS
Jairo Willian Pereira - PeerSpot reviewer
Information Security Manager at a retailer with 10,001+ employees
Mar 22, 2023
I´m not sure about this affirmation. There are a lot of other tools used.
Product Comparisons
Download Free Report
Download our free Security Information and Event Management (SIEM) Report and find out what your peers are saying about Microsoft, Splunk, IBM, and more! Updated: January 2026.
DOWNLOAD NOW
881,082 professionals have used our research since 2012.